Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

Our Services


NETWORK
Fast, scalable, reliable architecture;
Layer-2/3 switch and firewall configuration;
Secure wireless network infrastructure;
Site-to-site VPN and branch office integration;
Long-range point-to-point wireless bridges;
Professional-grade CAT5e / CAT6 cabling;

APPLICATION-LEVEL
Corporate email and calendaring solutions;
Comprehensive server administration;
Centralized antispam and antivirus solutions;
Third-party database and application support;
Standardized document sharing systems;

MANAGEMENT
Data redundancy and archival solutions;
Automated maintenance policy integration;
Group Policy and Security Policy enforcement;
Leverage existing infrastructure for best use;
Telecommunications cost assessment;
Hardware and software procurement;
Specialized procurement for 501(c)3's;
Assistance with technical grants & proposals;
Long-term technical planning and forecasting;

CLIENT / SERVER
Microsoft Windows Server management;
Novell Server management;
Citrix Server management;
Secure web-enabled access systems;
Workstation integration and support;


CURRENT OFFERINGS
Free network assessment and site audit;
Contact us today for more information!

 

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

Ashley Madison misled users with a fake security award

It’s never a good sign when a website markets itself with a phony security award. But that’s what Ashley Madison did prior to last year’s massive data breach.

On Monday, privacy officials in Canada and Australia found that the Canadian adultery website used deceptive and confusing practices to make customers think the service was secure.

Privacy authorities from both countries have been investigating Ashley Madison following last year’s hack, which exposed personal data on 36 million users, including names, credit card numbers, and in some cases, their sexual fantasies. 

To read this article in full or to leave a comment, please click here

Posted on 23 August 2016 | 2:42 pm

Ashley Madison misled users with a fake security award

It’s never a good sign when a website markets itself with a phony security award. But that’s what Ashley Madison did prior to last year’s massive data breach.

On Monday, privacy officials in Canada and Australia found that the Canadian adultery website used deceptive and confusing practices to make customers think the service was secure.

Privacy authorities from both countries have been investigating Ashley Madison following last year’s hack, which exposed personal data on 36 million users, including names, credit card numbers, and in some cases, their sexual fantasies. 

To read this article in full or to leave a comment, please click here

Posted on 23 August 2016 | 2:42 pm

Where the monsters live

The monsters read your full network traffic flow if they have your keys or you used weak ones.

The monsters are in the hidden partitions of USB flash drives left in parking lots and technical conferences.

The monsters are in the weakened smartphone OS that most of your users own.

The monsters are in the containers you used from that interesting GitHub pull.

The monsters are in the Cisco router where the Zero Day lives waiting for the NSA.

The monsters are in the fake certificates your user swallowed in their browsers.

The monsters are 10,000 CVEs that you never, ever checked.

The monsters live inside your kernel, watching for the network traffic that brings them alive from their zombie state.

To read this article in full or to leave a comment, please click here

Posted on 23 August 2016 | 10:46 am