Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      How to Keep Your Mobile Data Safe

      This situation is far too familiar, and with the rising use of personal devices for work purposes, it has led to too many businesses becoming vulnerable to threats. Fortunately, there are steps to help mitigate the damage if your devices are ever absconded with.

      1. Suspend any Financial Permissions to the Device
      One of the biggest benefits of mobile and online banking and finance management is the security that financial institutions enforce before allowing access. However, many of the security measures are easily circumvented by a user and their device’s password management. If a device is stolen, there’s a good chance that the thief will still be allowed to access many online accounts and make purchases on your (or your company’s) dime if password management is activated.

      If your online accounts show signs of unauthorized use, reach out to the bank or lender immediately and explain the situation. They should have a fraud department whose job it is to handle exactly this kind of circumstance, and they will most likely refund the lost money. You should still babysit your finances, however, as the bank might not initially pay attention to smaller transactions.

      2. Wipe ALL Passwords
      Yes, ALL passwords. Whether it was a mobile device or a laptop that was stolen from you, you need to access all accounts literally as soon as humanly possible and change every single password you have. On a second device, log into your browser and access any password manager you may be using, including the browser’s native capabilities or a utility like LastPass. This is unfortunate, but necessary: you need to systematically go through and delete every password from the password manager, uninstalling it. You also need to go to every site you have an account with and change your credentials to it. While this in undeniably a pain to deal with, it is less of a pain than a stolen account.

      3. Make Sure Browser Sync is Deactivated
      If you happen to use a browser like Chrome or Firefox across multiple devices, you need to disable it before you start changing your passwords and credentials. Otherwise, any of your changes will automatically transfer over to the stolen device, rendering any of your efforts to block access thus far useless. So, once you’ve wiped the password for each account you have, turn off syncing. In Chrome, you can do this by accessing Settings > Advanced sync settings > Choose what to sync. Deselect everything and set a new password to encrypt your synced data. Then you are safe to start the password resetting process.

      Secondary Measures
      When it comes to finding a device that has been stolen, there are a few ways to make it easier to recover afterwards.

      Note Your Serial Numbers
      One of the most difficult parts of recovering a stolen laptop (or other device) that the police have recovered is proving that it belongs to you. However, if you keep a record of all of your devices and their serial numbers, you will be prepared to stake a claim to your devices once they are recovered.

      To find your device’s identifying information, access Control Panel > System and Security > See the name of this computer. From there, you can take a screenshot that you can keep for your records.

      You can also take pictures of the device itself, recording any identifying features and the like that could help to confirm that, should the computer be stolen and recovered, it belongs to you.

      Keep Your Data Backup Updated
      Unfortunately, many thieves know that it just makes more sense to wipe a stolen computer as quickly as possible - it makes it that much harder to find, after all. Plus, many thieves will use a secondhand shop as an unwitting fence to get rid of the hot device. These stores also will wipe the device before selling it. While this is good for your data security, it isn’t great for your data continuity… unless you’ve taken precautions and have maintained a data backup. Having a data backup means that, even if the thief wipes your valuable data, you haven’t lost the most valuable part of the device.

      If your business finds itself in one of these positions, and you need assistance with any of these steps, we can help. Reach out to Techworks Consulting today at 631-285-1527.

      Learn More

      Tech Term: Router

      An Introduction to the Router
      It’s been nearly 50 years since the router was developed. Today’s router technology has matured to become an integral component in all types of communications. From data to voice to video, the router is a core piece of technology for almost everyone.

      The first router was developed by BBN in the late 1960s. Called the Interface Message Processor, it was built for use on the ARPAnet, which was an early predecessor of the Internet. It was quickly improved upon and in 1981, Bill Yeager, of the Stanford Knowledge System Laboratory, developed the code behind the first multiple-protocol router. Interest in Yeager’s concept led Len Bosack and Sandy Lerner to develop the first Local Area Network (LAN) and in 1984 the pair launched Cisco Systems, which is currently the largest networking company in the world.

      What Is a Router?
      The simplest definition of a router is: a device that acts as a tunnel to the other devices on a network, supplying them with the means to communicate with each other. Today, most routers have wireless capabilities allowing this to be done without connecting the machines to the router.

      Despite being called a wireless router, there are typically two wires that will always be connected to it. One is obviously the power cord, while the second comes from the modem. The modem, of course, is the piece of hardware that allows connection to the Internet.

      How Does It Work?
      Once all the wires are connected, your router will emit a signal that usually travels between 90 and 300 meters; it is device-dependent. When you connect a device to a Wi-Fi connection, the signal is sent from the router. Many products, including smartphones, laptops, and tablets have Wi-Fi connections built in, but more than that, these days a lot of consumer goods now come with connectivity. Internet of Things devices continue to grow in number, so when picking a router, you’ll likely have to take that into account.

      Options and Features
      Like every other piece of technology, the more features and options a router has, the better it is. Here are a few options and features that modern routers have aboard that can make a difference for your data dissemination and protection.

        1. Dual-band Wi-Fi - Today most wireless routers have dual-band Wi-Fi, since the traditional 2.4GHz frequency is used in so many places that it can be a problem. Today’s routers come with both 2.4 and 5GHz.
        2. Wireless On/Off Toggle - There may be times when you have to disable your Wi-Fi network (i.e. troubleshooting interference) and having a dedicated on/off button can come in handy.
        3. Detachable antennas - Many routers come without visible antennas, instead opting for internal antennae. Sometimes you need more range, however. That’s why buying one with detachable antennas give you more flexibility and signal coverage.
        4. IPv6 Support - The Internet’s supply of IPv4 addresses has been exhausted, so having support for IPv6 sites is mandatory if you plan on keeping your router for any length of time.

      If you are looking for help with your organization's wireless network, start by calling the IT professionals at Techworks Consulting at 631-285-1527.

      Learn More

      How the CLOUD Act Will Affect Your Security

      The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

      What Does This Mean?
      At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

      Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

      In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

      The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

      Below is a short explanation for what changes the CLOUD Act will bring about:

      • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
      • Allows foreign nations to demand records saved and stored by American companies.
      • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
      • Allows foreign police to obtain and collect data without notifying the party.
      • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

      The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

      “Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

      Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      Oh no. You slap your pockets in a sudden panic, but you only confirm what you suddenly feared: you’ve lost your mobile device, the one with all of your business data on it. You haven’t an idea where you might have left it - all you know is that it’s just... gone....

      Latest News

      Techworks Consulting, Inc. Recognized for Excellence in Managed IT Services

      MSP 500 award 2018 small

      Techworks Consulting, Inc. announced today that CRN®, a brand of The Channel Company, has named Techworks Consulting to its 2018 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.

      Read more ...

      Send Us a Message