Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      Tip of the Week: Taking Your Password Practices to the Next Level

      Don’t Neglect the Tried and True Rules

      While we want a password to be easy to remember, we also don’t want it to be easy to guess. This is why we can’t help but shake our heads at the top-15 results of an analysis of data collected from the security website Have I Been Pwned:

      1. 123456 
      2. 123456789 
      3. qwerty 
      4. password
      5. 1111111 
      6. 12345678 
      7. abc123 
      8. 1234567 
      9.  Password1
      10. 12345 
      11. 1234567890
      12. 1123123 
      13. 000000 
      14. Iloveyou
      15. 1234 

      Many of these passwords clearly break some of the cardinal rules of password security, such as ensuring that there is a mix of character types included in the password, making sure that the password is of sufficient length, or using obvious words, like “qwerty” or “password.”

      What’s worse, it is probably a safe bet that many of the owners of these passwords had a tendency to recycle them across their accounts, putting more of their accounts at risk. None of this is a good thing for security, of course. 

      You definitely should not be using the same password to get into different accounts. This is not a good practice. The reason is pretty easy to explain: If a password were to be compromised for one account, that would mean that multiple accounts would be compromised. 

      A Proven Means of Securing Your Accounts

      There are several different ideas about how to do this. One means is to use a passphrase - a series of random words, rather than characters, that is both significantly more secure than most passwords and is easier for a user to remember.

      However, as is so often the case, you can start to encounter difficulties once the human element is introduced. We, as a species, tend to gravitate towards patterns, so we have difficulties creating a truly random series of words in our own.

      To counter this, an IT professional named Arnold Reinhold developed Diceware, a reliable means of generating a passphrase for yourself.

      Referencing the Diceware word list, roll five dice (or one die, five times) and find the corresponding word to the values you rolled. Repeat this process until you have a total of six or seven words, and you’ve got your passphrase.

      Why the dice? Simple - it makes it much more random, even than a user “randomly” selecting words from the list of potential words to include.

      A Demonstration

      Let’s say we were to use this method now, and rolled the following number sets:

          • 21633
          • 16521
          • 31336
          • 13263
          • 52452
          • 33535

      Referencing the word list, this gives us the following words...

          • Criss
          • Choke
          • Gluing
          • Bambi
          • Rust
          • Ice

      ...and, as a result, our passphrase.

      The webcomic xkcd provides an illustrated explanation of why passphrases are so effective:

      However, many users will understandably hesitate to use passphrases, because this means that - assuming they subscribe to best practices - they will have to remember a series of six completely random words for each of their accounts.

      This is where password managers prove their worth. Utilizing a password manager to save your passphrases, and securing it with one, allows you to optimally secure your accounts without the need to worry about forgetting all of your access credentials.

      For more means of improving your business’ use of technology, subscribe to our blog, or reach out to us directly at 631-285-1527.

      Learn More

      Some of the Worst Data Breaches Since September

      This year we decided to keep a detailed ledger of all of the major data breaches to see where organizations dealing with these issues are going wrong. Here is a comprehensive list from the beginning of September. 

      September

      9/5 

      Providence Health Plan - 122,000 members of the Providence Health Plan had personal information leaked when an unauthorized party accessed the company’s servers. Information that was stolen included plan member names, addresses, email addresses, dates of birth, Social Security numbers, member ID numbers, and subscriber numbers.

      Facebook - Facebook had an unprotected server with over 419 million records accessed.  Users had their Facebook’s user ID and phone number exposed. In some cases, user’s names, genders, and locations were also leaked.

      9/16

      Dealer Leader, LLC. - 198 million prospective car buyers were left exposed by an unprotected server. The information that was left out there included names, email addresses, phone numbers, addresses, and IPs.

      9/27

      DoorDash - The popular food delivery app had 4.9 million customers’ information breached by a third-party. The information left exposed included the names, delivery addresses, phone numbers, hashed passwords, order history, and the last four numbers of each’s credit card number. In the same hack, over 100,000 delivery drivers had their driver's license information leaked. 

      9/30

      Zynga - The mobile game maker, Zynga, the developer of popular mobile games such as Farmville and Words with Friends has announced that 218 million players had their data exposed after their network was breached by a hacker.  The company had player names, email addresses, login IDs, phone numbers, Facebook IDs and more left exposed.

      October

      10/17 

      Methodist Hospitals of Indiana - The Methodist Hospitals of Indiana fell victim to an email phishing scam and it allowed hackers to steal 68,000 records that included names, addresses, dates of birth, Social Security numbers, driver’s licenses, and more. 

      10/21

      Autoclerk - Autoclerk, a hotel property management software developer had an open database infiltrated exposing data that included names, dates of birth, home addresses, phone numbers, dates of travel, travel costs, room numbers, and some masked credit card details of hundreds of thousands of guests. 

      10/22

      Kalispell Regional Healthcare - Over 130,000 Social Security numbers, addresses, medical record numbers, dates of birth, medical histories and treatment information, and names of treating physicians were exposed by hackers.

      10/26

      Adobe - Data was exposed that included email addresses, usernames, location, Adobe product licenses, account creation dates, and payment statuses. 7.5 million users were affected.

      10/27

      Network Solutions - The world’s oldest domain name provider has exposed in a hack. Millions of individual’s data that include names, addresses, phone numbers, email addresses, and service information were compromised.

      November 

      11/9 

      Texas Health Resources - The Texas-based health care provider reported a data breach where 82,000 patient records were exposed. Included in the breach were names, addresses, email information, health information, and more. 

      11/16 

      Magic the Gathering - The popular online strategy game has reported that an unsecured website database has exposed 452,000 player records that include names, usernames, and more. 

      11/18

      State of Louisiana - The State of Louisiana has been a victim of a ransomware attack that took down many state agencies’ servers. Although no data is said to be lost, the state’s crucial computing infrastructure was down for several days as systems were restored from backup.

      Even though there are only 7.7 billion people on the planet, over 8 billion records have been exposed in the first 10 months of 2019. If you would like help keeping your business’ data secure and redundant, reach out to the IT professionals at Techworks Consulting today at 631-285-1527.

      Learn More

      Automation Plays a Critical Role in Cybersecurity

      The global cost of cybercrime is on the rise, and is now estimated to be near $600 billion total. Cyberattacks are becoming more frequent which means your cybersecurity needs to be more vigilant. Automation is what is causing these frequent attacks, and the only way to combat this is to fight fire with fire. 

      There are a few ways automation does just that. 

      Security Automation Has Become Intelligent

      Data needs to be processed and analyzed in order to become usable information. Often times, the rate in which data needs to be processed simply cannot be achieved manually. This inability to meet required data processing rates can leave your business vulnerable. 

      Look at it this way. Every device on your network, from your workstations, to your servers, to your firewall, your antivirus, and everything else that handles cybersecurity, all generate logs of what goes through them. These logs can help you determine problems and threats on the network, but there tends to be so much data in the logs to go through that a single person can’t be thorough enough to catch everything.

      Automation can utilize machine learning and spot anomalies and only report the important things back to IT. This system can also be set up to automatically isolate a device from the rest of the network as soon as a potential problem is detected, to prevent it from spreading.

      Automation processes data at a rate which cannot be matched by employees. More so, automation has the ability to learn and adapt. This makes the accuracy in which it processes data unsurpassable.

      Automation Cybersecurity Beneficiaries 

      Where does automation provide the greatest value in advancing your business’ cybersecurity? 

      Data-Supported Interfaces

      Without data organization or processing, drawing conclusions or making predictions is a difficult task. Reading and comprehending the data that has been organized by automation ensures you will catch threats more effectively. 

      A Stronger Defense Than Offence

      Cybersecurity is almost like a game of football. However, if your defense fails the cybercriminal doesn’t get a point on the scoreboard. Instead, they receive all of your data, and your business will experience devastating effects. Cybersecurity relies on defending against threats before they make it far enough down the field. Automation utilizes machine learning and rapid processing rates to protect your business from threats you otherwise never would have seen coming. 

      Detecting Threats

      When automation is utilized, your business will be able to detect faults in your cybersecurity. Even if your IT staff is on site for eight hours a day, five days a week, if a fault is detected, time is of the essence. You don’t want your business’ data being served on a silver platter over the weekend if a fault is detected and nobody is available to react to the insecurity.

      Techworks Consulting is your local leading expert in cybersecurity. Implementing automation does not need to feel like a troublesome task, in fact it can be quite simple. Our experts have the know-how to optimize your cybersecurity strategy, so call us today at 631-285-1527!

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      Passwords… can be annoying, if we’re being honest. They are, however, also incredibly important to your business’ overall security strategy. We’ve all heard the suggestions on how to create secure passwords. As it turns out, there is more to modern security then that. Let’s ...

      Latest News

      Techworks Consulting Donates Computer Equipment to Children and Families in Need

      In collaboration with The Child Center of NY and City National Rochdale, Techworks provided time and equipment to donate to underserved families and children.

      twcgivesback1

      Read more ...

      Send Us a Message