Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

Our Services


NETWORK
Fast, scalable, reliable architecture;
Layer-2/3 switch and firewall configuration;
Secure wireless network infrastructure;
Site-to-site VPN and branch office integration;
Long-range point-to-point wireless bridges;
Professional-grade CAT5e / CAT6 cabling;

APPLICATION-LEVEL
Corporate email and calendaring solutions;
Comprehensive server administration;
Centralized antispam and antivirus solutions;
Third-party database and application support;
Standardized document sharing systems;

MANAGEMENT
Data redundancy and archival solutions;
Automated maintenance policy integration;
Group Policy and Security Policy enforcement;
Leverage existing infrastructure for best use;
Telecommunications cost assessment;
Hardware and software procurement;
Specialized procurement for 501(c)3's;
Assistance with technical grants & proposals;
Long-term technical planning and forecasting;

CLIENT / SERVER
Microsoft Windows Server management;
Novell Server management;
Citrix Server management;
Secure web-enabled access systems;
Workstation integration and support;


CURRENT OFFERINGS
Free network assessment and site audit;
Contact us today for more information!

 

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.

Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.

MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.

To read this article in full or to leave a comment, please click here

Posted on 27 April 2017 | 10:42 am

Advances in multifactor authentication (MFA) technologies

Enterprises authenticate users based on their knowledge, possession, or inherence of some evidence that they are the party with the given right of access. Some experts see the context of the user’s authentication such as the time, their network IP and device, and their location as the fourth factor of authentication.

Stephen Cobb, senior security researcher at ESET says you can assure greater security with each additional factor of authentication that you add.

MFA is more important than ever as attackers are increasingly breaking into accounts that use single-factor authentication and sometimes even those with two factors. In one example, attackers tried to get the second factor by using phishing texts that asked users to send over their tokens.

To read this article in full or to leave a comment, please click here

Posted on 27 April 2017 | 10:42 am

9 essential tools for the security-conscious mobile worker

Have security gadgets, will travel
security tools intro slide

Image by Kensington, Anonabox, Yubikey

The highly digitized and hyper-connected world that we live in today has heightened the security stakes for us all. But if work frequently takes you away from the home office, you have some particular security and privacy concerns.

To read this article in full or to leave a comment, please click here

Posted on 27 April 2017 | 10:41 am