Your IT Solution Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Network Infrastructure

Limiting downtime and optimizing the network of your new location or upgrading your existing one.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At Techworks Consulting, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

  • Do you have questions about our IT solutions and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
  • First Name *
  • Last Name
  • Phone *
  • Comments

      What Our Clients Say

      • Techworks came to my rescue!
        Career Smarts

        Techworks came to my rescue! I needed to get all my computers back up and working in order to carry on my small business. I would definitely recommend them to any company!

      • John's Farms

        Got a problem, need professional help, call Techworks!

      • Child Center of New York

        Techworks has been fantastic to work with. Responsive, professional, sense of humor when needed! I am very pleased with how they communicate and solve IT challenges. First class act!

      • National Response Corporation (NRC)

        Your engineer was excellent in helping me resolve an outstanding issue at one of our remote sites. He was extremely knowledgeable, and very courteous and polite as we worked to resolve the issue. Every time I work with Techworks, I receive top-notch service, and I have always been satisfied with the outcome. I wish working with all my other vendors and consultants was as easy.

      • Communication Strategy Group
        Communication Strategy Group

        Techworks managed our migration to Office 365 without disrupting our workflow. They were professional and consultative in their approach -- offering suggestions for process improvement along the way. I highly recommend them to other local Long Island small businesses who are growing and need new technology solutions for their businesses.

      • Brooklyn Kindergarten Society
        Brooklyn Kindergarten Society

        Quick response; problem solved. Life should always be so easy. Thanks.

      • Richard E. Zacharoff LLC
        Richard E. Zacharoff & Associates LLC

        Always courteous, efficient and get the job done in a timely manner.

      Latest Blogs

      Some of the Value that Cloud Computing Offers

      The cloud provides all manner of benefits to your business, including user productivity and efficiency. Here are some of the best ways you can take full advantage of the cloud.

      Asset Virtualization
      If your organization uses lots of different hardware and software, you can create virtual environments where they are stored and accessed as needed. This can be anything from a server operating system to a software solution. Basically, you’re storing these assets on someone else’s computer where they can be accessed at a later date from any of your connected devices. It’s definitely easier than installing an application on each of your workstations or purchasing multiple servers for each individual operating system.

      Software that is stored in the cloud is much more accessible to your organization’s employees. Basically, you store the application in the cloud so that it can be accessed on just about any device. In most cases, this can be anything ranging from a smartphone to a full-fledged desktop. Some applications like Gmail and Microsoft Office 365 can be accessed on just about any device, allowing for seamless productivity. Hardware virtualization also provides your organization with the opportunity to consolidate your server infrastructure, further enhancing operations.

      Data Access and Storage
      Data storage is also one of the other primary functions of cloud computing. Without cloud storage, none of its other functions would be possible. Cloud-based data storage is much more accessible on connected devices, allowing for productive use of data as long as the device has a way to interact with the data itself. The cloud also plays a pivotal role in data backup and disaster recovery.

      What’s the best way to take advantage of the cloud for your business? You can find out by calling Techworks Consulting at 631-285-1527.

      Learn More

      Know Your Technology: Computer Forensics

      What Are Computer Forensics, and What Are They Used For?
      Computer forensics is generally considered the application of special processes and techniques that can be used to analyze information on a computer or network. Forensics are also generally meant to protect evidence that could potentially be used in a trial. Once the warrant required has been issued, a forensic technician will go on-site to isolate the device from the Internet or other attached networks that could influence its contents. They then copy over every file on the device and dig through them for anything of note. It’s important that the investigator makes a copy of each file so that the original evidence can be preserved. Even something as simple as accessing a file can lead to slight alterations, making the evidence of little consequence in a court of law, civil or criminal case.

      Computer forensics can be used for any number of different cases. Depending on the nature of the crime, any device could be used to obtain evidence of what is, was, or will be happening. These types of investigation take an extremely close look at the data, including not just the files that are currently there, but at the metadata for just about any items on the device. This includes looking at when the file was first created, when it was edited and saved, and who might have been the one to carry out these actions.

      This process can be used to solve any number of cases. Here are just a couple to look at as an example:

      • Intellectual Property Theft and Industrial Espionage
      • Employment Disputes
      • Bankruptcy Investigations
      • Inappropriate Email and Internet Usage in the Workplace
      • Regulatory Compliance
      • Forgeries and Fraud Investigations

      Alternative Sources of Analysts
      Law enforcement agencies are certainly not the only ones that place an emphasis on computer forensics. There are many others that also have accredited laboratories. You might be surprised to hear about a couple of these, as they include Walmart, American Express, and Target (which is kind of hilarious in the wake of the Target data breach not too long ago). There are also numerous independent labs that, while lacking accreditation, can potentially outperform law enforcement agencies under the right conditions.

      Independent labs are often onboarded by law enforcement to help with crime solving. The perfect example of this is Target, whose labs have helped with “felony, homicide, and special-circumstances cases” in the past. These claims come from a spokesperson who, in 2008, claimed that about a quarter of cases managed by Target’s forensic laboratory were external and had nothing to do with the company itself.

      How Does Your Technology Compare?
      If your organization would like a team on your side to ensure that security is always a top priority, reach out to Techworks Consulting at 631-285-1527. We aren’t a dedicated computer forensics agency, but we know all about network security and compliance issues.

      Learn More

      A Brief Overview of Network Security

      Network Hardware
      Your business’ computing network consists of, at the very least, two connected machines set up to share resources. Most of the time, a business network consists of centralized computers called servers, and endpoints called workstations. Major networking components (working backward from the endpoint) include, network switches (that allow multiple workstations to be connected in packets); a router (that allows for wired or wireless connection to the network); and the modem (that connects the network to the Internet). On your network can be all types of other accessories (printers, scanners, copiers, and more).

      Today, wireless networks have been deployed to provide additional mobility. In this case the router, which would have to have Wi-Fi capabilities, allows mobile endpoints (laptops, smartphones, tablets, and IoT devices) to connect to, and share the files on, an organization’s network. This promotes mobility by allowing the sharing and use of files without being physically connected to the network.

      Network Protocol
      The network protocol is a set of rules that work to control communications between devices connected to the same network. They make connections and set rules for data packaging for both sent and received messages. Popular protocols include:

      • Transmission Control Protocol and Internet Protocol (TCP/IP)
      • Address Resolution Protocol (ARP)
      • Domain Name System (DNS)
      • Secure Shell (SSH)
      • File Transfer Protocol (FTP)
      • Dynamic Host Configuration Protocol (DHCP)
      • Hypertext Transfer Protocol (HTTP)
      • Hypertext Transfer Protocol Secure (HTTPS)
      • Internet Group Management Protocol (IMAP4)
      • Post Office Protocol version 3 (POP3)
      • Simple Mail Transfer Protocol (SMTP)

      There are many more, and every protocol is basically the building blocks of a deliberate interaction. Each protocol works to connect one part of a computer to another. Much like a bank has procedures in place to help keep your money safe, protocols are the procedures at work to keep your data safe.

      Securing TCP/IP is especially important. TCP/IP communications are made up of four layers that work together. When a user wants to send information across networks, the information is passed through each layer, each adding data. Each layer features a header and a payload. The header contains layer-specific information, while the payload consists of the information that has come from the layer above it. To illustrate this a little better, we’ll describe the four layers in TCP/IP communications:

      • Application Layer: This layer sends and receives the information for particular applications, with protocols such as DNS, HTTP, HTTPS, and SMTP. Each application has to have its own specific protocol.
      • Transport Layer: This layer of connected (or connectionless) services are for transporting application layer services between networks and works to assure that connections are reliable. TCP and User Datagram Protocol are commonly used in the transport layer.
      • Internet Layer: This layer routes the data packets across networks. Internet Protocol (IP) is at the heart of this layer. IP specifically allows information streams to be broken up into segments known as data packets (known mostly as “packets”) and works to define and establish the Internet, as we use it, through addressing and routing.
      • Network Access Layer: Finally, the network access layer is in place to define the method of use within the scope of the local network link. It adds the protocols used to define the relationships used to transmit and receive data packets from the other layers.

      With so many moving parts every time you send and receive information over the Internet (and within your own Intranet), you can see how difficult it is to keep the network free from threats. Now that you’ve got a small introduction to what each layer in your TCP/IP-run command does, we can now look at the vulnerabilities (and fixes).

      Vulnerabilities
      The main security problem with any type of network is the dreaded “unauthorized user”. An attacker can connect through an unsecure hub/switch port. As a result, wireless networks traditionally are considered less secure than wired networks, as they can be accessed without a physical connection. Once in, a nefarious actor can steal valuable information, deny service to legitimate users, or spoof the physical identity of the network to steal more data. Here are a few TCP/IP vulnerabilities:

      1. ARP spoofing - Used to deliberately steal sensitive information, or to facilitate denial-of-service-attacks, session hijacking, man-in-the-middle attacks and more.
      2. Port scanning - Used to see what services are available to exploit.
      3. IP spoofing - Sending packets from what is seemingly a trusted address, while sending malware or stealing data.
      4. DNS spoofing - The Domain Name System associates domain names with IP addresses. So devices that connect to the Internet can have their DNS spoofed and reroute the info to a different IP address.

      What to Do About It
      Once the “bad” data has been sent to you there is very little you can do. That’s why we tell everyone that they need to be proactive about securing their IT. At Techworks Consulting, we can help you meticulously maintain your software, monitor your files, permissions, and access, and deploy today’s strongest network and cybersecurity strategies to keep threats from hampering your business. For more information, contact us today at 631-285-1527.

      Learn More

      Know someone who would benefit from Techworks Consulting? Let us know!

      Latest Blog Entry

      Cloud computing is a major player in the way that businesses are approaching their daily operations. This might bring into question whether or not your organization is actually using the cloud in the first place, but one thing is certain--if you haven’t implemented the cloud...

      Latest News

      Techworks Consulting, Inc. Recognized for Excellence in Managed IT Services

      MSP 500 award 2018 small

      Techworks Consulting, Inc. announced today that CRN®, a brand of The Channel Company, has named Techworks Consulting to its 2018 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.

      Read more ...

      Send Us a Message