Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      4 Internal Threats Every Business Owner Should Understand

      A lot of times, the problems a company has with its network and infrastructure come from the inside. There are countless ways your employees can cause a major security problem for your business. They include:

      Retribution - Disgruntled employees can often be a problem for a business. This is no more evident than in its IT. If the employee is dissatisfied with elements of their job, they could conceivably take it out on the business. They can delete information, deliberately bring malware onto your network, or just be blatantly negligent to situations and your network can end up having many major problems. Moreover, if an employee is crafty enough, he/she could conceivably hide their betrayal; or worse yet, access the network after they’ve left the company.

      To handle issues like this, promptly removing access to the network after a former employee leaves the company is one way to mitigate issues; while constantly monitoring workstation behavior can give you a precise idea on just how these types of issues can be unleashed in the first place.

      Trickery - Hackers today realize that a frontal assault on a business network is mostly impossible, so they attempt to get in any way they can. If your employees haven’t been properly trained to decipher the telltale signs of a social engineering attack, they could put your company in a lot of danger.
      Having a strategy to train your staff on the best practices of handling emails and extensions can go a long way toward keeping malware and unwanted visitors off of your network. The more they know how to protect themselves, the better they can protect your business.

      Subversive Activities - The computers that your employees use are essential for productivity, sure, but they are also attached to one of the biggest distractions in human history: the Internet. Since there is an endless amount of content online, sometimes viewing that content can get in the way of their productivity. Some employees will go even further, viewing content that is highly inappropriate for work and could pick something up along the way, putting your network in jeopardy.

      To ward against this, content filtering is a great option. It gives you the opportunity to block certain websites by a per user basis. By being able to control the content that your employees can access, you can eliminate a lot of distractions, while also controlling your network against the threats third-party sites can bring.

      Leaking Data - Some employees could want to take information out of the sanctity of your network. Some are simply looking to be productive outside of the office, while some may just be looking to take data for personal or professional gain. Whatever their reason, it can be a big issue when people’s personal information is at stake.

      One solution to this is hosting information in a secure cloud server with dedicated access control. Giving your employees the option to do more away from the office is a great strategy, while preventing them from accessing information they don’t need can go a long way toward protecting that information and your network.

      If you would like more information about how to mitigate threats to your network and data, contact the certified professionals at Techworks Consulting today at 631-285-1527.

      Learn More

      Tip of the Week: Why Shutting Down a Computer Takes So Long

      Why is Shutdown So Slow?
      To fully appreciate why it takes such a relatively long time for a computer to shut down, it helps to examine the process as a whole. Any computer relies on a wide variety of moving parts, so to speak, and there is a level of organization to the shutdown process that protects these many components. A full shutdown allows the RAM to empty itself, the hard drive to wipe its virtual memory, remove all caches and close out all active applications, and finally deactivate the operating system.

      If your computer is forced to shut down without the opportunity to go through these processes, or in the middle of some important task, you could easily experience file corruption and errors when you try to start it back up again.

      The Steps of a Proper Shutdown
      We briefly touched upon the shutdown process above, but it helps to see the complete list of steps (while remembering that, although it isn’t an instantaneous shut down process, it does go pretty fast) to appreciate the lengths that programmers and developers have gone to ensure your computer is protected.

      First, upon activation of the shutdown process, any applications that are opened are checked to ensure that their data has been saved. If not, the process is interrupted until the user instructs the computer what to do. The computer then allows all services and programs to shut down and confirm that they have closed, before removing the no-longer-needed program data. Then a log is made of anything unusual for the user to reference if the next startup doesn’t go smoothly, and all users are logged out of the system. Then, the user-level operating system is deactivated, any pending updates are installed, and the machine is finally turned off completely.

      Speeding Up Shutdown
      Of course, there are a few ways to assist this process in going faster, although most are fairly complex and should only be attempted by an IT professional. One simpler way is to make sure that your programs are all closed out before you begin shutdown, as this streamlines a few of the computer’s initial shutdown procedures. It can also help to not shut down your workstation all the time, but to instead restart it. This helps the computer cleanse itself of extra, unnecessary memory, increasing its speed overall.

      For more tips, tricks, and best practices, make sure you make a point of coming back to the Techworks Consulting blog!

      Learn More

      Amazon’s Alexa Is Entering the Workplace

      Before You Invest…
      One of the first things you want to do before investing in Alexa as a virtual assistant is to consider the lack of privacy that a user gets when using it. This goes for most virtual assistants out there. Your office needs to be considerate of what they say around the virtual assistant, as you never know what it could tell other people. You could potentially create an uncomfortable situation that accomplishes the exact opposite of what you intended.

      Therefore, it’s critical that you take various steps toward minimizing the trouble that a virtual assistant like Alexa could provide for your organization. Some of these steps include disabling voice shopping and enabling PIN security. You should also set up your Alexa so that only a specific voice profile can use the device. This keeps only authorized users from being understood by the device.

      Alexa Manages Your Meetings
      Once you’ve ironed out the privacy issues sufficiently, you can add your calendar to your Alexa so that it can help you manage appointments. To set this up, go to alexa.amazon.com or open up the Alexa application. Go to Settings > Calendar. Alexa has compatibility with common business suites like G Suite, Google Calendar, Microsoft Outlook, Office 365, and even iCloud, making it a versatile solution no matter your business’ preferred solutions. Once these have been added, you can create an event by saying, “Alexa, add an event to my calendar.” Alexa can read back your events for the day and answer any questions related to your calendar.

      Alexa for Business

      Amazon is capitalizing on the popularity of Echo to create a successful product with Alexa. Nowadays, Amazon issues Echo devices that have Alexa for Business built right into them. Thanks to this, business professionals can take advantage of Alexa’s new capabilities. These include:

      • Performing queries on local databases
      • Providing access to sales data
      • Checking and managing inventory
      • Ordering supplies
      • Setting reminders
      • Managing lists
      • Controlling AV equipment
      • Initiating phone calls
      • Notifying support for IT & building maintenance

      Amazon has even taken their development of new technology a step further by considering enterprise-level security and management that integrates enrollment tools that can help you manage access to your critical systems. This is part of the Amazon Web Services division, and as such, organizations will have to pay for any devices separately, but the cost of management remains static according to the Alexa for Business model.

      Alexa for Business is being used by several large businesses that have found a way to make it profitable for them, so the possibility is still there for your organization as well. Amazon’s power play to make the best, most efficient virtual assistant out there is being heard all throughout the industry, so it would be foolish not to at least consider the thought.

      The Alexa Skills Kit
      Even if someone who isn’t associated with an Alexa for Business-sponsored company can take advantage of several features built into the Amazon Echo, Echo Dot, or Tap, to create their own personal assistant. Here are some of the apps included in the Skills Kit:

      • Conference Manager: This app is built by Vonage, and it allows your Google Calendar to tell you what your next conference call is. It can also connect you to your call by calling any of your Alexa-enabled devices. It supports many different conferencing options, including Cisco WebEx Meeting Center, Citrix GoToMeeting, and Vonage Business.
      • Scheduling Assistant: Alexa can also schedule meetings, thanks to the integration of an automated app called the FreeBusy Scheduling Assistant. It can see if a person is available and schedule a conference call for when all available parties can meet. This app also integrates with Google Calendar, Exchange, Outlook, and Office 365.
      • Email Assistant: Thanks to the productivity software developer EasilyDo, Email Assistant for Alexa can help travelers confirm reserved times by crawling through their inbox and collecting all important information for an at-a-glance look.
      • Chat Bot for Slack: Development for Slack is on the way, but third-party integration will have to suffice in the meantime. This app can update your communications and collaboration platform whenever the data needs to be updated, keeping your organization as recent as can be.
      • Edit Docs: You can create documents, sheets, and slides, as well as edit them and list your most utilized files with this app.
      • Mastermind: This app is used primarily for communications. Alexa can be connected to the user’s smartphone so that it can send and receive text messages, make calls, or view call information.

      How would your business use Alexa? Let us know in the comments.

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from t...

      Latest News

      Techworks Consulting, Inc. Recognized for Excellence in Managed IT Services

      MSP 500 award 2018 small

      Techworks Consulting, Inc. announced today that CRN®, a brand of The Channel Company, has named Techworks Consulting to its 2018 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.

      Read more ...

      Send Us a Message