Placeholder Image 3

Testimonials


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
Accu-Networks."
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."
NYSUT

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

About Us



Our Company

Accu-Networks is the trade name of Arissa LLC, an Albany based organization founded by Jeff Clesceri in April 2006. Accu-Networks is a full-service IT consulting firm focused on providing high quality consulting assistance and technical support.

Our client base is primarily comprised of small-to-medium businesses such as private enterprises, not-for-profit organizations, educational institutions, and government agencies located in the Greater Capital District.


Our Story

Jeff Clesceri is a graduate of Rensselaer Polytechnic Institute, holding a Bachelor of Science cum laude. Jeff's professional career began with a local consultancy where he was employed as a network engineer for several years, learning the industry from the ground up. Over these years, Jeff built a professional network of engineers and consultants who share a common vision of how an IT consultancy should conduct business. Accu-Networks is the culmination of that vision.

Since its inception, Accu-Networks has assisted a variety of companies and organizations in the evaluation and application of technology with regard to their critical business processes. We enjoy collaborating with our fellow small business owners to help find the right balance of practicality and technological complexity, with due attention to the all-important bottom line.

 

News

Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

A Closer Look at the Locky Poser, PyLocky Ransomware

While ransomware has noticeably plateaued in today’s threat landscape, it’s still a cybercriminal staple. In fact, it saw a slight increase in activity in the first half of 2018, keeping pace by being fine-tuned to evade security solutions, or in the case of PyLocky (detected by Trend Micro as RANSOM_PYLOCKY.A), imitate established ransomware families and ride on their notoriety.

In late July and throughout August, we observed waves of spam email delivering the PyLocky ransomware. Although it tries to pass off as Locky in its ransom note, PyLocky is unrelated to Locky. PyLocky is written in Python, a popular scripting language; and packaged with PyInstaller, a tool used to package Python-based programs as standalone executables.

The post A Closer Look at the Locky Poser, PyLocky Ransomware appeared first on .

Posted on 10 September 2018 | 5:02 am

Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum

We uncovered personally identifiable information (PII) stolen from a China-based hotel chain being sold on a deep web forum we were monitoring. Further analysis revealed that the stolen data was not only the PII of Chinese customers, but also included the hotel chain’s customers from Western and East Asian countries. The sample data we saw was unencrypted (in plaintext), some of which were in CSV, SQL, and TXT dumps.

We believe this stolen data is related to the data breach (reported on August 29) that exposed up to 130 million PII. The news that reported the data breach matched with an advertisement we saw in the dark web selling the stolen data for eight bitcoins (equivalent to more than US$58,000 as of September 5, 2018).

The post Stolen Data from Chinese Hotel Chain and Other Illicit Products Sold in Deep Web Forum appeared first on .

Posted on 7 September 2018 | 5:58 am

The Urpage Connection to Bahamut, Confucius and Patchwork

In the process of monitoring changes in the threat landscape, we get a clearer insight into the way threat actors work behind the schemes. In this case we dig deeper into the possible connection between cyberattacks by focusing on the similarities an unnamed threat actor shares with Confucius, Patchwork, and another threat actor called Bahamut. For the sake of this report, we will call this unnamed threat actor “Urpage.”

The post The Urpage Connection to Bahamut, Confucius and Patchwork appeared first on .

Posted on 29 August 2018 | 6:07 am