Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      Here Is a List of this Year’s Most Devastating Hacks

      Today, we’ve compiled some statistics that give these threats context, as well as a list of some of the most devastating hacks from the first half of 2018. Hopefully, these lists will put into perspective just how important building a network security strategy is for your company. Here are some statistics to help reinforce just how important cybersecurity is:

      • In 2017 over 130 large-scale breaches were reported, a 27 percent increase over 2016.
      • Nearly 1-in-3 organization have experienced some sort of cyberattack in the past.
      • Cryptojacking (stealing cryptocurrency) increased 8,500 percent in 2017.
      • 100,000 organizations were infected with the WannaCry ransomware (400,000 machines).
      • 5.4 billion WannaCry attacks were blocked in 2017.
      • The average monetary cost of a malware attack is $2.4 million.
      • The average time cost of a malware is 50 days.
      • Ransomware cost organization’s over $5 billion in 2017.
      • 20 percent of cyberattacks come from China, 11 percent from the United States, and six percent from the Russian Federation.
      • Phone numbers are the most leaked information.
      • 21 percent of files are completely unprotected.
      • 41 percent of companies have over 1,000 sensitive files left unprotected.
      • Ransomware is growing at 350 percent annually.
      • IoT-based attacks are growing at about 500 percent per year.
      • Ransomware attacks are expected to quadruple by 2020.
      • 7.7 percent of web requests lead to malware.
      • There were 54 percent more types of malware in 2017 than there were in 2016.
      • The cybersecurity market will be worth over $1 trillion by 2025.

      If that isn’t scary enough, below are some of the attacks that have taken place in 2018. We’ve broken them down into public (individuals, governments, etc.), and private (businesses). Keep in mind all these events took place before the calendar turned to July:

      Public
      January

      • The Department of Homeland Security was affected by a data breach that exposed information about 247,167 current and former employees.

      March

      • Atlanta, Georgia was targeted by a ransomware attack called SamSam. This resulted in a massive problem for their municipal infrastructure. The ransom price given was $51,000, but Atlanta’s leadership refused to meet these demands. Overall, the numbers show that Atlanta has spent more than 10 times that number in the fallout of the attack. Some estimates place the actual cost of this event at nearly $20 million.
      • India’s national ID database, Aadhaar, leaked data of over a billion people. This is one of the largest data breaches in history. A user could pay 500 rupees, equal to about $7, to get the login credentials that allowed anyone to enter a person’s 12-digit code for their personal information. For 300 rupees, or about $4.20, users could also access software that could print an ID card for anyone associated with the database.
      • Cambridge Analytica, a data analytics company that U.S. President Donald Trump used to help his campaign, harvested personal information from over 50 million Facebook users without asking for their permission. Facebook hasn’t called this a data breach, but Cambridge Analytica has since been banned from using the service thanks to this event.

      June

      • A hack of a U.S. Government-funded active shooter training center exposed the personal data of thousands of U.S. law enforcement officials. This also exposed which police departments aren’t able to respond to an active shooter situation.

      Private
      January

      • 280,000 Medicaid records were exposed when a hacker attacked the Oklahoma State University Center for Health Sciences. Among the information exposed were patient names, provider names, and full names for affected individuals.

      February

      • An unsecured server owned by Bongo International, a company acquired by FedEx, leaked over a hundred-thousand files of FedEx customers. Some of the information leaked included names, drivers’ licenses, national ID cards, voting cards, and utility bills.

      March

      • Orbitz, a travel booking site, fell victim to a security vulnerability that exposed 880,000 customers’ payment card information. There was also about two whole years of customer data stolen from their server.
      • French news site L’Express left a database that wasn’t password-protected up for weeks, despite being warned about the security issues regarding this.
      • 134,512 records regarding patients and financial records at the St. Peter’s Surgery and Endoscopy Center in Albany, NY were accessed by hackers.
      • MyFitnessPal, an application used by Under Armor, exposed about 150 million people’s personal information to threats.
      • The WannaCry ransomware claimed another victim in Boeing, which stated that “a few machines” were protected by Microsoft’s 2017 patch.

      May

      • Thanks to Twitter storing user passwords in a plaintext file that may have been exposed by internal company staff, the social media titan had to force hundreds of millions of users to change their password.
      • An unauthenticated API found on T-Mobile’s website exposed the personal information of all their customers simply through the use of their cell phone number. The following information was made available: full name, address, account numbers, and tax IDs.
      • A bug found in Atlassian development software titles Jira and Confluence paved the way for hackers to sneak into IT infrastructure of several companies and one U.S. government agency.
      • Rail Europe, a popular server used by American travelers to acquire rail tickets, experienced a three-month data breach that exposed credit card information to hackers.

      June

      • A marketing company named Exactis had 340 million records stolen from it, but what’s most shocking about this is that they had accumulated information about nearly every American out there. In response to the breach, there was a class action lawsuit made against the company.
      • Adidas’s website was hacked, resulting in a loss of a few million users’ personal and credit card information.
      • A hacker collective called Magecart initiated a campaign to skim at least 800 e-commerce sites, including Ticketmaster, for sensitive information.

      These lists are meant to be a reminder about just how bad it can get for a company if they aren’t diligently approaching their network’s security. If your organization needs help avoiding the pitfalls that would make them just another statistic, reach out to the professional technicians at Techworks Consulting. We can help you put in motion a security strategy that will work to mitigate threats and keep you off lists like this one. Call us today at 631-285-1527.

      Learn More

      Tip of the Week: How to Spot a Scam

      Tech support scams are only too common, as blending phishing with social engineering has proven to be an effective means of scamming users. Today, our tip will cover how to recognize some of these scams so that they may be avoided… but first, it is important to recognize that scams like these are a serious problem everywhere, and not just for those targeted.

      An Issue Around The World
      These scams target users all over the world, although the impact is most clearly felt by users in China, India, and the United States. Regardless, other regions are also subjected to tech support scams - and India gets hit with a double-whammy.

      The service-and-support-rep-in-India stereotype has its roots in a truly unfortunate reality. The level of competition in the job market is astronomical in India, especially for the generation that should be entering the workforce right about now. For example, a state-owned bank received over one and a half million applications for just one and a half thousand job openings. This job shortage affects even those with high qualifications. Someone could have a Master’s degree in business administration and have to fight for a position as a street sweeper.

      Circumstances like these make any job opportunity to inherently be too good to pass up, even if your work comes at the expense of others.

      Indian call centers use these circumstances to their advantage, using a secretive and convoluted process to hire those young people in search of a job, often not even revealing the identity of their employer. Applicants are often charged money for their attendance at interviews and job trainings, only being given a start date if they are accepted.

      Many of these positions, however, are not the customer support jobs that were expected. Instead of providing customer service, these recruits are used as the initiators of a scam. They call their target and deliver the scam’s pitch, whatever it may be, and send their newly terrified connection to a senior scamming employee who ends the scam. These workers are soon stuck in an unenviable position: their pay is usually terrible and the emotional burden significant, yet there aren’t really any other avenues to make money in the overburdened job market.

      As a result, it isn’t long before these scammers, themselves exploited, embrace their position and apply themselves to exploiting others simply to fulfill their need to survive.

      Spotting Scams
      Unfortunately, even if you feel for the person on the other end of a scam call, you need to protect yourself and your business from their influence. To do so, you need to be able to identify these scams. Below are a few tips for doing so:

      • Who’s On the Line? - Basic rule of thumb: if you get a call from someone claiming to be from “Microsoft” or any other technology brand, it’s almost a sure bet that they aren’t. These organizations aren’t in the habit of reaching out to people first, despite what your (potentially spoofed) caller ID might tell you.
      • Not Something You Want Linked to You - Scammers are also fond of using links, sharing them in an email to send the user to a website that displays plenty of falsified pop-up warnings. These links shouldn’t be clicked, and if you do inadvertently or are presented with a pop-up alert message, restart your computer. Other scammers will use search engines against their victims, using sponsored ads to target those looking for help by appearing at the top of results pages. While Google has put the kibosh on Remote Support IT advertisements, these links should still be avoided as they haven’t stopped everything.
      • Keep Control - Many scammers will pose as an IT resource and request remote access to a computer. Unless you know for a fact that someone from a third party is completely trustworthy, never surrender your computer to anyone. Doing so could easily allow a scammer to steal your data, or do something worse.

      The Easiest Way to Avoid Scams
      If you just so happen to have a trusted IT resource on your side, you won’t have to worry about scams like these - after all, you can have your provider check any claims and thereby protect your business from fraudsters. Techworks Consulting can be that trusted IT provider for you. Give us a call at 631-285-1527 to learn more, and in the meantime, tell us about any scams you’ve spotted in the comments!

      Learn More

      Can You Afford Your IT Initiatives?

      How to Approach Your IT Spending
      It might seem like IT is simply another cost of doing business, but we urge you to resist the temptation to lump it in with resources like electricity and air conditioning. Instead, you should consider how your technology (and its current state of being) affect your organization in the grand scheme of things. If your technology doesn’t work properly, your employee morale could suffer, as well as productivity slowing to a halt. Your income could be affected as well, creating a major issue for your business.

      An IT budget needs to take a lot of information into account. There are countless costs that can be associated with information technology, and that’s without mentioning what it takes to train your staff to actually take advantage of these solutions. The right IT budget will also include even minor inconveniences that come from setbacks you could potentially increase. For example, are you paying too much for a multifaceted solution when in reality you only need one of its features? Are you throwing away money on unused solutions that could be better spent elsewhere within your organization? Even if you have technology solutions for your business, they are only as effective as the way you’re using them.

      Overall, you should consider your IT budget an investment. Some of it might be seen as a business expense, but overall, much of the spending will be dedicated to eliminating waste and unnecessary expenses. No matter how you see it, your IT should be used to put your business in a positive financial situation.

      Encouraging Financial Wellbeing with an IT Budget
      If you don’t know how to proceed with developing an IT budget, we’ve put together a list of topics to consider:

      • Have a set budget for your IT: If you’re going to implement solutions, you should have a set budget for your IT that cannot be exceeded so as to preserve funds for other endeavors. Invest in business-enhancing solutions: Whether it’s boosting productivity or protecting against threats, you’re trying to improve your organization. Your IT budget should be dedicated to preserving this status-quo.
      • Don’t shoot from the hip: If you’re not investing in IT properly, you could wind up in a nasty situation where your IT spending is actually holding you back. You should invest funds to where they need to go, but most importantly where they can make you more money.

      Does your business need help with managing an IT budget? Techworks Consulting can help. To learn more, reach out to us at 631-285-1527.

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      Every business owner needs to consider how to approach network security. This is especially true with the litany of threats that face their organization’s network from simply being connected to the Internet. It may sound like an overstatement at first, but when you consider ...

      Latest News

      Techworks Consulting, Inc. Recognized for Excellence in Managed IT Services

      MSP 500 award 2018 small

      Techworks Consulting, Inc. announced today that CRN®, a brand of The Channel Company, has named Techworks Consulting to its 2018 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.

      Read more ...

      Send Us a Message