Placeholder Image 3


"If your organization is considering utilizing an IT vendor, I would strongly encourage you to use
The National Education Association

"The project was a success due to their vast knowledge, their work ethic, and the great personalities they have."

"Accu-Networks has worked very closely with us, to give our company its greatest technical potential."
Buckley, Mendleson, Criscione & Quinn, P.C.

"Accu-Networks has put all the pieces of my puzzle together and are there 24/7 when we need them."
The Law Offices
of Timothy J. O'Connor

"We're grateful for their expertise, diligence, and efficiency."
Adam Ross Cut Stone

"They respond quickly and understand our needs." Whispering Pines Preschool

"Accu-Networks has consistently quoted and invoiced their exceptional services at a very fair price." The East Greenbush
Public Library

"Accu-Networks has gone above and beyond many times to keep us up and running!!! They respond to our needs immediately and fix whatever needs fixing...even if it is after hours, weekends, or holidays. Sometimes they are aware of our problems before we are! We have never had an IT problem they couldn’t fix!"
The Albany County
Bar Association

"Accu-Networks has been a life saver for us. We have used them several times and they consistently provide great IT knowledge and wonderful customer service at very good prices."
House of Praise Ministries

Placeholder Image 2

About Us

Our Company

Accu-Networks is the trade name of Arissa LLC, an Albany based organization founded by Jeff Clesceri in April 2006. Accu-Networks is a full-service IT consulting firm focused on providing high quality consulting assistance and technical support.

Our client base is primarily comprised of small-to-medium businesses such as private enterprises, not-for-profit organizations, educational institutions, and government agencies located in the Greater Capital District.

Our Story

Jeff Clesceri is a graduate of Rensselaer Polytechnic Institute, holding a Bachelor of Science cum laude. Jeff's professional career began with a local consultancy where he was employed as a network engineer for several years, learning the industry from the ground up. Over these years, Jeff built a professional network of engineers and consultants who share a common vision of how an IT consultancy should conduct business. Accu-Networks is the culmination of that vision.

Since its inception, Accu-Networks has assisted a variety of companies and organizations in the evaluation and application of technology with regard to their critical business processes. We enjoy collaborating with our fellow small business owners to help find the right balance of practicality and technological complexity, with due attention to the all-important bottom line.



Accu-Networks is proud to announce our partnership with Labtech Software!

LabTech is a unique tool, the only remote monitoring and management (RMM) solution designed from the perspective of system engineers with real experience in the services industry who are well aware that limited resources have to meet ever-increasing demands.

Magnitude Exploit Kit Now Targeting South Korea With Magniber Ransomware

A new ransomware is being distributed by the Magnitude exploit kit: Magniber (detected by Trend Micro as RANSOM_MAGNIBER.A), which we found targeting South Korea via malvertisements on attacker-owned domains/sites. The development in Magnitude’s activity is notable not only because it eschewed Cerber—its usual ransomware payload—in favor of Magniber. Magnitude now also appears to have become an exploit kit expressly targeting South Korean end users.

The Magnitude exploit kit, which previously had a global reach, was offered as a service in the cybercriminal underground as early as 2013. It then left the market and became a private exploit kit that mainly distributed ransomware such as CryptoWall. At the start of the second half of 2016, Magnitude shifted focus to Asian countries, delivering various ransomware such as Locky and Cerber. More recently though, we noticed that Magnitude underwent a hiatus that began on September 23, 2017, and it then returned on October 15. With help from Kafeine and malc0de, we were able to uncover Magnitude’s new payload, Magniber.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

Magnitude Exploit Kit Now Targeting South Korea With Magniber Ransomware

Posted on 18 October 2017 | 7:00 am

New Malicious Macro Evasion Tactics Exposed in URSNIF Spam Mail

by John Anthony Bañes Malicious macros are commonly used to deliver malware payloads to victims, usually by coercing victims into enabling the macro sent via spam email. The macro then executes a PowerShell script to download ransomware or some other malware. Just this September EMOTET, an older banking malware, leveraged this method in a campaign that...

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

New Malicious Macro Evasion Tactics Exposed in URSNIF Spam Mail

Posted on 18 October 2017 | 4:59 am

A Closer Look at North Korea’s Internet

This blog post summarizes our findings from studying internet traffic going in and out of North Korea. It reviews its small IP space of 1024 routable IP addresses. It will also cover spam waves that originate in part from spambots in the country, DDoS attacks against North Korean websites and their relation to real-world events, as well as recurring watering hole attacks on North Korean websites.

Post from: Trendlabs Security Intelligence Blog - by Trend Micro

A Closer Look at North Korea’s Internet

Posted on 17 October 2017 | 5:00 am