building responsive website

Get Started Today!  732-747-9373   

The New Jersey IT Experts

We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At DeckerWright Corporation, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Thank You DeckerWright

    DeckerWright just finished a complete upgrade of Monmouth Arts’ computer server and network.  They had helped us nurse our old computers as long as humanly possible but we knew it was time to upgrade.  Even with a nonprofit budget they helped us figure out what we needed and made the installation process seamless.  We are thrilled with our new all-in-one computers that take up so much less space and are so quick to respond.  With our new equipment and cloud backup we are able to focus on making Monmouth County a better place through the arts more efficiently and with confidence in the technology that makes it possible.

  • I Highly Recommend DeckerWright

    DeckerWright Corporation has been our valued IT vendor for many years.  They had managed to keep our old computers running long after they should have been replaced, and recently we relied on their guidance and expertise to replace all of the now obsolete Windows XP towers and laptops. DeckerWright Corporation worked with us to get HP computers at a great price and coordinated with our staff to retire the old computers and deploy the new ones.  Our not-for-profit agency now has a faster and more secure network with much happier employees!  The staff at DeckerWright Corporation is knowledgeable - staying on top of industry trends and advising us clearly and pragmatically - and they are always responsive to our needswhether routine or an emergency. It is truly a pleasure to work with them and I would highly recommend DeckerWright Corporation!

  • Network Support

    DeckerWright Corporation has been a valued partner in helping to design, implement, and support our network. They provide insights and suggest ways to incorporate the technology to streamline operations and make people more efficient... If you are looking for a vendor that will deliver and who will be a valuable partner in the success of your organization; I would definitely recommend DeckerWright.

  • We've Had Fewer Computer Problems!

    DeckerWright Corporation is a valued member of the Red Bank Pension Services team. With DeckerWright’s ActivMaintenance, we have had noticeably fewer computer problems. They've helped modernize our office to become “paperless” which has allowed us to grow without increasing staff. The DeckerWright staff is great, and always responsive to our needs.

  • We Are Now Better Equipped!

    Our Care Management Organization relies heavily on e-mail to communicate with and assist our clients. You can imagine our concern when transitioning over 90 end users/mailboxes from our local e-mail server to Microsoft Office 365- we needed consistent e-mail flow and confidence that the material was secure. DeckerWright Corporation helped us make this transition seamless and much easier than expected. Partnership for Children of Essex County is now better equipped to help our clients, thanks to DeckerWright Corporation!

  • 100% Satisfied Customer

    We selected DeckerWright Corporation just over a year ago and are very happy we did!  As a busy Veterinary office, having our systems running reliably is a must.  DeckerWright was able to fix some long nagging issues to get things running smoothly.  Getting technical support is easy- with their high tech software tools, they are able to jump on our machines remotely fixing things quickly without having to schedule a visit. If they do need to visit our office, they arrive on time.  If you’re searching for a good IT provider, check out DeckerWright Corporation.

  • Cybersecurity Training

    The cyber security class offered by DeckerWright was a valuable experience for our office. We learned a lot in a short amount of time that will help protect our business. Thank you Marshall and Courtney!

Latest Blogs

The Dangers of Public Email

email securityMany clients in the small and medium business (SMB) market still use public email accounts from gmail, aol, Hotmail, yahoo and msn.  Using a public email account carries a significant business risk.

One key risk of public email is the inability to regain control of an account if it is taken over by a criminal. If you discover that your gmail account has been compromised, good luck getting technical support to resolve the issue. How does tech support have any idea that the email belongs to you, and not the criminal? By the time you determine the email account has been hijacked, all of the challenge questions have been changed to ones the criminal knows, not you. While you are fighting with tech support to fix the problem, any email correspondence meant for you is now getting responded to by the criminal. Banking and other transactions that may be validated in the account are now being responded to by the criminal. With a private email address, the email administrator is part of your organization and can change your password to regain control of the account. 

Email Phishing by criminals is the #1 way criminals infect computers with ransomware. We use enterprise class spam filtering from Proofpoint that provides effective protection from phishing attacks. A public email has none of these protections, so a company is down to the last line of defense against phishing, the employees. The best way to keep employees from making a wrong click is to keep the email out of their mailbox all together. Public email doesn’t screen the emails, making a company much more susceptible to phishing attacks. 

As an employer, if you allow or encourage employees to use public email accounts for conducting your business, you risk losing clients and money. How? If an employee leaves the company, clients may still contact the former employee with their public email account. You have no way to stop the communications, and no way to recover the emails from the former employee. If the employee had a private email account, the emails could be redirected to another employee. 

Email retention and recovery is also an issue with public email.  Public email may be left on the providers email servers subject to their retention rules. When the email piles up to the limit, emails can start bouncing. If you download the email to your local machine, you can accumulate more email, but if your computer crashes, you risk losing it all. Either option isn’t good. An email service like Office 365 provides for 50 GIGs of email storage, and automatically synchronizes with the Outlook, providing more storage and protection from data loss. 

In environments covered by regulatory or contractual obligations where email archiving is a requirement, using a public email account prevents the setup of email archiving systems.  Email archiving makes copies of emails sent into or out of an email server and freezes the email so it can be used as evidence in a legal proceeding. There is no way to incorporate a public email box into an email archiving system.

If you are using public email for business, contact DeckerWright Corporation so we can get you set up right.

Click HERE for more information.

Learn More

Phishing for Ransoms

phishingOne of the more technical terms we use in our industry is “phishing”. Phishing in security circles refers to criminal activity using email with a message that is bait for the unsuspecting user to click on. Phishing is the number one method used by criminals to distribute ransomware. 

Criminals put together phishing campaigns just like a company might do a marketing campaign to sell their products and services. Depending on the sophistication of the criminal, the phishing email may be poorly constructed with obvious flaws, or a carefully constructed message meant to mimic a legitimate email. Criminals have access to email lists and tools to create the phishing email content and the ransomware software. 

The better and more targeted the list, the more the criminals pay per email.  The most sophisticated phishing campaigns we have seen have phishing emails look like emails sent within a company from a manager to a subordinate. Many of the phishing campaigns are now role based where the criminals target Human Resources or Accounts Payable personnel. 

DeckerWright Corporation uses a multi-layer approach to protecting our client’s data. Every email is checked by a spam filter before delivery. Most phishing attempts never reach the client’s inbox. For phishing emails that make it past the spam filter, the spam filter modifies the email so that any embedded URL is checked by the service when it is clicked. If the URL is evil, the spam filter service won’t let the client reach it. We also run AV software and malware protection on each PC. 

As part of the new Compliance Security Service (CSS), DeckerWright is now offering to send phishing emails to test users. If the users click in the email, they get redirected to a training web site where they can review training material on how to spot and avoid phishing emails. The CSS also includes a Security Information and Event Management (SIEM) tool that monitors network traffic looking for bad behavior. The SIEM includes log file storage that would allow us to go back in time to determine the root cause of a criminal attack. 

Current clients receiving Business Security Services can add any of the components included in the Security Service bundle as an option. The Compliance Security Service bundle provides significant savings if the client needs or wants all of the services necessary for regulator or contractual compliance.

Click HERE for more information.

Learn More

The Dark Web

dark webThe news often reports of nefarious activity conducted on the dark web.  What is the dark web?  The dark web is a term used to describe the parts of the internet developed, used and maintained by criminals.  At the dark web's heart are services on the internet just like Amazon, Google and Facebook.  The difference is that the dark web uses a special “dark” browser, separate domain name servers and “dark” encryption methods. 

In order to access one part of the dark web you need to download and install a Tor browser.  There are a number of websites that allow you to download the Tor browser.  Think of these websites as the portals between two parallel universes.  Once you download, install and start using Tor, you are connected to the dark web.  How do you find things on the dark web?  Just like Google provides a search engine on the internet, dark web search engines include DuckDuckgo, Onion, and TorLinks.  Simply type in your search term in one of these search engines such as, email passwords, and the dark web search engine will return multiple sources for the data you are looking for. 

Communications on the dark web are all encrypted using Pretty Good Privacy (PGP) encryption technology.   Modeled after IPSec, PGP is a public sourced encryption technology available to anyone.  By encrypting the communications between the Tor browser session and data source, criminals are able to hide their activity in broad daylight on the internet.  Internet Service Providers recently reported that about 3% of the Internet’s traffic is dark web PGP traffic.  The PGP encryption makes discovery and monitoring by authorities of criminal activity next to impossible. 

In order to make the dark web work, criminals maintain domain name service host computers that serve up the names and IP addresses of dark websites.  Any computer that has been compromised with malware is a candidate to be a DNS server on the dark web.  Criminals will install the dark version of DNS on a compromised computer unbeknownst to the victim.  The victim’s computer becomes part of the dark web providing a key function.  Thousands of copies of dark web DNS are planted around the world this way.  No need for expensive data centers and servers to run DNS when you can steal someone’s computer and internet bandwidth for free.

DeckerWright Corporation is now providing Dark Web Monitoring services as part of its new Compliance Security bundle so that business owners can get a look at what information criminals are maintaining on the internet about them.

Click HERE for more information.

Learn More

Know someone who would benefit from DeckerWright Corporation? Let us know!

Latest Blog

Many clients in the small and medium business (SMB) market still use public email accounts from gmail, aol, Hotmail, yahoo and msn.  Using a public email account carries a significant business risk.One key risk of public email is the inability to regain control of an ac...

Account Login