Placeholder Image 3


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

Our Services

Fast, scalable, reliable architecture;
Layer-2/3 switch and firewall configuration;
Secure wireless network infrastructure;
Site-to-site VPN and branch office integration;
Long-range point-to-point wireless bridges;
Professional-grade CAT5e / CAT6 cabling;

Corporate email and calendaring solutions;
Comprehensive server administration;
Centralized antispam and antivirus solutions;
Third-party database and application support;
Standardized document sharing systems;

Data redundancy and archival solutions;
Automated maintenance policy integration;
Group Policy and Security Policy enforcement;
Leverage existing infrastructure for best use;
Telecommunications cost assessment;
Hardware and software procurement;
Specialized procurement for 501(c)3's;
Assistance with technical grants & proposals;
Long-term technical planning and forecasting;

Microsoft Windows Server management;
Novell Server management;
Citrix Server management;
Secure web-enabled access systems;
Workstation integration and support;

Free network assessment and site audit;
Contact us today for more information!




Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

IP camera makers pressure researcher to cancel security talk

An upcoming talk covering security problems in Internet-connected cameras has been canceled after opposition from some manufacturers.

Gianni Gnesa was scheduled to give a presentation titled "Abusing Network Surveillance Cameras" on Oct. 14 at the Hack in the Box GSEC conference in Singapore.

Internet-connected video camera, or IP cameras, are widely used for security systems, offering the advantage that footage can be streamed anywhere remotely. But anything connected to the Internet poses risks if not properly secured.

ip camera

IP cameras, like this one made by Shenzhen Shixin Digital, are widely used in the security industry.

To read this article in full or to leave a comment, please click here

Posted on 5 October 2015 | 7:26 pm

Google patches second round of Stagefright flaws in Android

Google has issued patches for two new Stagefright-related vulnerabilities, one of which affects Android versions going back to 2008 and puts millions of users at risk.

The flaws were found by security company Zimperium, which also unearthed the original Stagefright flaws in April.

In an advisory Monday, Google said it didn't appear that attackers have started exploiting the vulnerabilities yet.

The latest flaws are only slightly less dangerous than their predecessors, which allowed a device to be compromised merely by sending a specially crafted multimedia message (MMS). An attacker needed only to know the victim's phone number.

To read this article in full or to leave a comment, please click here

Posted on 5 October 2015 | 4:26 pm

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.

+More on Network World: Gartner: Get onboard the algorithm train!+

The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.

To read this article in full or to leave a comment, please click here

Posted on 5 October 2015 | 12:55 pm