Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      Fix Any Bit of Data Leakage

      Many organizations have a lot to lose through data leakage, where it makes its way out of your protected infrastructure and into an unprotected environment. To make sure your operations aren’t affected by these complications, you need to ensure that data leakage is something that can’t occur. The first step to making this happen is understanding why and how your data is leaking.

      The Three Kinds of Data Leaks

      All types of data leakage can be attributed to one of the following categories:

      • At Rest: Data that is in storage, waiting to be accessed. If your data is stolen from a database or from a workstation, your data is stolen while at rest.
      • In Transit: Data stolen while in transit is intercepted on its way to a particular location. This can happen if sensitive information is left unprotected in an email or in your web traffic.
      • In Use: This kind of data leakage happens while the data is being actively used. The way this happens is if an insider threat is able to take screenshots or documents out of the office where they don’t belong.

      Securing Your Data Against Leaks

      There are several methods of keeping data leakage to a minimum. First, you need to educate your users about the risks associated with data leakage. While you might be aware of the data that should and shouldn’t be shared, this doesn’t mean that your employees know too. It’s your job to make sure that your employees are aware of how they can keep data from leaking into the wild.

      You can also implement IT solutions to keep data leaks from influencing operations. Here are a few of them:

      • Encryption: Encryption is the biggest way you can keep your data safe. It effectively renders any data stolen from your organization indecipherable without the proper decryption key.
      • Content Filters: You can prevent certain threats from even making their way to your infrastructure with the right content filtering solution. These can also alert the administrator of suspicious data transfers.
      • Access Control: The fewer people who have access to data, the fewer the chances that they will leak it, either intentionally or on accident. Keeping close watch on data access and permissions is one way you can cut down on unnecessary risk.

      Hopefully you can use these tips and tricks to minimize data leakage for your organization. To learn more, reach out to us at 631-285-1527.

      Learn More

      Tip of the Week: Rely Less on Your Printer

      Here are some ways you can adapt your office’s printing tendencies to match your goals.

      Putting Together a Print Policy

      Any policies or procedures you put together for your organization’s printing policy should be documented, in language that is both clear and concise, in a location where it’s readily accessible to your staff. It should include all of the following:

      • How many prints each department/user should make in a given period of time.
      • Which documents can be printed in color, and which should remain in greyscale.
      • Which documents should be produced in hardcopy, and which can remain digital.
      • Which pages from a given document actually need to be printed, and which can be omitted from the hardcopy.
      • The cases in which double-sided printing is an option.
      • Whether or not a document has received an initial proofreading.

      These guidelines should be preferable ranges that you can change and adapt rather than those that remain static. You can never know when your business will require that you have hard copies of documents, so don’t be afraid to throw away the printing caps when you need to. That being said, placing a cap on your business’ printing will naturally save you quite a bit of capital through simple awareness of resources.

      Using Network Printers with Print Management Software

      This kind of organic decrease in printing will only get you so far. It’s more economical to invest in a network-attached printer that the entire office shares. This is great for your organization’s printing policy because it can give you key insights into your organization’s printing habits and provide ways to decrease waste. It also decreases the number of devices that need to be maintained.

      Techworks Consulting can provide your organization with a plethora of ways to take advantage of the latest printing technology. To learn more, reach out to us at 631-285-1527.

      Learn More

      USB PC Killer Terrorizes Private College

      Unfortunately, sometimes diligence isn’t enough, as exemplified by recent events at the College of Saint Rose in Albany, NY. The capital-based college was struck in early April 2019 by a rash of computer vandalism. Vishwanath Akuthota, a postgraduate alum, pled guilty to charges of using a device known as a USB Killer to permanently disable 59 Windows campus computers, as well as seven Apple computers. This act ultimately cost the college a total of $58,371 to replace these devices.

      Akuthota, an Indian national in the United States on a student visa, used his iPhone to film himself using USB Killer to destroy the computers. As a result, he faces a $250,000 fine and ten years in prison.

      Understanding USB Killer

      USB Killer is a specially made thumb drive that draws power from the USB port, charging a capacitor within the device, then releasing that power back into the USB port. This overloads the components, burning them out and breaking the machine. The USB Killer is freely available online, apparently intended to be used as a surge protection test.

      Where Your Biggest Risk Lies

      Naturally, no business looks to have this kind of catastrophe happen. Unfortunately, USB Killer is particularly difficult to resist - but that doesn’t mean that there aren’t things you can do to help prevent the various kinds of employee-related security breaches. An independent study revealed that, in 2018, over two-thirds of data breaches were the result of an employee’s actions - whether they were negligent in their duties, were directly responsible for the data theft, or actively sabotaged the company.

      That’s right - your employees are the ones who are most likely to put your business at risk. Now, this is not to say that your employees are actively working against you - only a quarter of data breaches were caused by the actions of employees, either current or former - but you still need to keep your network and infrastructure protected against the kinds of situations that could put your data at risk through the actions of your team.

      How to Keep Your IT Protected from Your Staff’s Actions

      The best way to approach these kinds of issues is to identify and mitigate them before they have an effect. This will require a two-fold approach: for your staff to be properly trained, and for you to have the tools necessary to monitor your business’ technology.

      This is to help cover all of your bases. The better your staff is trained, the more prepared they will be to properly utilize the solutions you provide them with, making fewer and less severe errors as a result. However, the better your staff is trained, the more willing they will likely be to take liberties with these systems - liberties that they wouldn’t have otherwise. A comprehensive monitoring strategy will help you to keep your business, its infrastructure, and its data safe and productive.

      To learn more about protecting your business through proper staff training and security solutions, reach out to the team at Techworks Consulting by calling 631-285-1527.

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      How valuable is the data that you’ve collected during your time in business? What would it mean if it were to leak somewhere beyond your control? Today we’ll discuss ways to control your data leakage.

      Latest News

      Techworks Consulting Donates Computer Equipment to Children and Families in Need

      In collaboration with The Child Center of NY and City National Rochdale, Techworks provided time and equipment to donate to underserved families and children.

      twcgivesback1

      Read more ...

      Send Us a Message