Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

Our Services


NETWORK
Fast, scalable, reliable architecture;
Layer-2/3 switch and firewall configuration;
Secure wireless network infrastructure;
Site-to-site VPN and branch office integration;
Long-range point-to-point wireless bridges;
Professional-grade CAT5e / CAT6 cabling;

APPLICATION-LEVEL
Corporate email and calendaring solutions;
Comprehensive server administration;
Centralized antispam and antivirus solutions;
Third-party database and application support;
Standardized document sharing systems;

MANAGEMENT
Data redundancy and archival solutions;
Automated maintenance policy integration;
Group Policy and Security Policy enforcement;
Leverage existing infrastructure for best use;
Telecommunications cost assessment;
Hardware and software procurement;
Specialized procurement for 501(c)3's;
Assistance with technical grants & proposals;
Long-term technical planning and forecasting;

CLIENT / SERVER
Microsoft Windows Server management;
Novell Server management;
Citrix Server management;
Secure web-enabled access systems;
Workstation integration and support;


CURRENT OFFERINGS
Free network assessment and site audit;
Contact us today for more information!

 

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

SAP patches login flaw in ASE database

SAP patched a flaw on Thursday that could allow an attacker to take complete control over a database, according to security vendor Trustwave.

The flaw (CVE-2014-6284) affects SAP’s Adaptive Server Enterprise (ASE), a relational database for Unix, Linux and Windows systems, designed for high volumes of data-rich transactions. Vulnerable versions are 12.5, 15, 15.5, 15.7 and 16.

TrustWave’s Martin Rakhmanov, a senior security researcher, found an error in the challenge and response mechanism used to access ASE. The account access gained is not a privileged account, but TrustWave said other flaws allow the privileges to be escalated to that of a database administrator.

To read this article in full or to leave a comment, please click here

Posted on 23 April 2015 | 8:25 pm

SAP patches login flaw in ASE database

SAP patched a flaw on Thursday that could allow an attacker to take complete control over a database, according to security vendor Trustwave.

The flaw (CVE-2014-6284) affects SAP’s Adaptive Server Enterprise (ASE), a relational database for Unix, Linux and Windows systems, designed for high volumes of data-rich transactions. Vulnerable versions are 12.5, 15, 15.5, 15.7 and 16.

TrustWave’s Martin Rakhmanov, a senior security researcher, found an error in the challenge and response mechanism used to access ASE. The account access gained is not a privileged account, but TrustWave said other flaws allow the privileges to be escalated to that of a database administrator.

To read this article in full or to leave a comment, please click here

Posted on 23 April 2015 | 8:25 pm

Hackers exploit Magento e-commerce vulnerability

Those using Magento’s e-commerce platform should ensure they’re using its latest software, as attackers are increasingly exploiting a flaw patched two months ago, security companies warned.

The vulnerability can allow an attacker to gain complete control over a store with administrator access, potentially allowing credit card theft, wrote Netanel Rubin of Check Point’s Malware and Vulnerability Research Group. As many as 200,000 websites use Magento, which is owned by eBay.

Check Point, which found the flaw, reported it to Magento, which issued a patch (SUPEE-5344) on Feb. 9. Since Check Point revealed the flaw earlier this week, it appears attackers have picked up on it and are trying to find unpatched applications.

To read this article in full or to leave a comment, please click here

Posted on 23 April 2015 | 6:40 pm