building responsive website

Get Started Today!  732-747-9373   

The New Jersey IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At DeckerWright Corporation, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Thank You DeckerWright

    DeckerWright just finished a complete upgrade of Monmouth Arts’ computer server and network.  They had helped us nurse our old computers as long as humanly possible but we knew it was time to upgrade.  Even with a nonprofit budget they helped us figure out what we needed and made the installation process seamless.  We are thrilled with our new all-in-one computers that take up so much less space and are so quick to respond.  With our new equipment and cloud backup we are able to focus on making Monmouth County a better place through the arts more efficiently and with confidence in the technology that makes it possible.

  • I Highly Recommend DeckerWright

    DeckerWright Corporation has been our valued IT vendor for many years.  They had managed to keep our old computers running long after they should have been replaced, and recently we relied on their guidance and expertise to replace all of the now obsolete Windows XP towers and laptops. DeckerWright Corporation worked with us to get HP computers at a great price and coordinated with our staff to retire the old computers and deploy the new ones.  Our not-for-profit agency now has a faster and more secure network with much happier employees!  The staff at DeckerWright Corporation is knowledgeable - staying on top of industry trends and advising us clearly and pragmatically - and they are always responsive to our needswhether routine or an emergency. It is truly a pleasure to work with them and I would highly recommend DeckerWright Corporation!

  • Network Support

    DeckerWright Corporation has been a valued partner in helping to design, implement, and support our network. They provide insights and suggest ways to incorporate the technology to streamline operations and make people more efficient... If you are looking for a vendor that will deliver and who will be a valuable partner in the success of your organization; I would definitely recommend DeckerWright.

  • We've Had Fewer Computer Problems!

    DeckerWright Corporation is a valued member of the Red Bank Pension Services team. With DeckerWright’s ActivMaintenance, we have had noticeably fewer computer problems. They've helped modernize our office to become “paperless” which has allowed us to grow without increasing staff. The DeckerWright staff is great, and always responsive to our needs.

  • We Are Now Better Equipped!

    Our Care Management Organization relies heavily on e-mail to communicate with and assist our clients. You can imagine our concern when transitioning over 90 end users/mailboxes from our local e-mail server to Microsoft Office 365- we needed consistent e-mail flow and confidence that the material was secure. DeckerWright Corporation helped us make this transition seamless and much easier than expected. Partnership for Children of Essex County is now better equipped to help our clients, thanks to DeckerWright Corporation!

  • 100% Satisfied Customer

    We selected DeckerWright Corporation just over a year ago and are very happy we did!  As a busy Veterinary office, having our systems running reliably is a must.  DeckerWright was able to fix some long nagging issues to get things running smoothly.  Getting technical support is easy- with their high tech software tools, they are able to jump on our machines remotely fixing things quickly without having to schedule a visit. If they do need to visit our office, they arrive on time.  If you’re searching for a good IT provider, check out DeckerWright Corporation.

  • Cybersecurity Training

    The cyber security class offered by DeckerWright was a valuable experience for our office. We learned a lot in a short amount of time that will help protect our business. Thank you Marshall and Courtney!

Latest Blogs

The Week in Breach 10/02/19 - 10/08/19

cyber criminalsUnited States - Zynga

Exploit: Unauthorized Database Access
Zynga: Social Game Development Company

Hackers gained access to the company’s database, which exposed the personally identifiable information (PII) for millions of customers. The company discovered the breach in September, and they responded by hiring an external investigator to determine the scope and severity of the breach. Unfortunately, by the time they responded, hackers uploaded user data to various hacker forums.

The data breach applies to all users of the platform’s popular Words with Friends gaming app on Android and iOS who registered on or before September 2, 2019. In addition, some users of Draw Something, another mobile game produced by Zynga, were compromised. The exposed information includes names, email addresses, login IDs, hashed passwords, password reset tokens, phone numbers, Facebook IDs, and other Zynga account details. Since this information is already available to bad actors on the Dark Web and will be used to perpetuate additional cybercrimes, those impacted by the breach should carefully monitor their accounts while being especially watchful for other fraudulent communications.

United States - Tomo Drug Testing

Exploit: Unauthorized Database Access
Tomo Drug Testing: Medical Laboratory Providing Drug and Screening Services

An unauthorized user gained access to Tomo’s customer database, which contained a treasure trove of personal data. Upon discovering the access, Tomo hired an external forensic firm to investigate the incident, which confirmed that customer data was either deleted or removed from the database. Although Tomo can’t confirm that hackers downloaded data, they are charged with notifying their customers and regulatory bodies of the incident. This could bring additional expenses and revenue reductions to the drug testing company. Moreover, the company will certainly face additional criticism and scrutiny for its lengthy reporting process and the sensitive nature of the compromised information in question. The breach occurred on July 1, 2019 but wasn’t officially reported until this week.

Tomo confirmed that personal data, including names, driver’s license numbers, Social Security numbers, and drug test results could be compromised. The drug testing company has set up a designated helpline, and they encourage those impacted by the breach to acquire a free credit report to identify abnormalities.

United States - Zendesk

Exploit: Unauthorized Database Access
Zendesk: Customer Service Software company

More than three years after the event, Zendesk acknowledged a data breach after a third party notified the customer service software company of unauthorized data access. The breach impacts Support and Chat accounts, and it includes personal data from all categories of Zendesk users, including customers, agents, and end users. The company is resetting all passwords for users that registered before November 1, 2016. However, the platform touts many high-profile companies as clients, which means that the breach could have far-reaching repercussions for all stakeholders involved.

 The personal details of customers, agents, and end users were compromised in the breach. This includes names, email addresses, phone numbers, passwords, and other technically-oriented data. The company is contacting all customers who could be impacted by the breach, and those affected should reset their Zendesk passwords and any redundant passwords used on other platforms.

Learn More

Security Concern #2 - Employees

security concernsDespite the industry focus on cyber-criminals and defending against different attack methods, employees continue to be the primary source of data loss to businesses. In this article we will discuss different documented ways employees have stolen corporate data for the employee’s benefit.

Employees achieve economic gain by stealing business data through three primary methods. First, an employee can steal cash from a business. Often an employee is entrusted with taking care of the company’s financials. If the employee has end to end authority over financial transactions, it is easy for the employee to divert funds into their pockets. There are many examples of this type of employee criminal behavior including processing false reimbursement vouches, cashing fraudulent checks and paying factious invoices to company’s controlled by the employee or an accomplice. Safeguarding the company’s accounting system is based on establishing clear procedures with at least two people involved in every transaction. The person processing accounts payable should NOT be the person paying the bills.  Expense vouchers and bills should be reviewed by a second person prior to payment to reduce fraud.

The second way employees attempt to profit by stealing business data is to use that data to either enhance their position with a new employer, or to start their own business. The most common theft is of client contact and sales information which can be used by the new entity to market to company’s clients.  There are two ways to combat this type of loss. One method uses tools after the theft to legally pursue the former employee, and the second relies on technology to try and stop a theft in progress. In order to pursue a former employee for possible data theft a company needs both contractual protection and electronic proof of theft. Legal protection is normally included in the employee hand book or employment contract. Electronic proof can come from phone logs, computer security logs, videos, emails and hi-tech monitoring software. Putting together the evidence of theft is often impossible for companies that haven’t done the proper up front work to retain log files and archive emails. 

The third way employees attempt to capitalize on business data theft is by selling the data. A recent example of this was the Capital One data theft. The cyber-criminals used knowledge gained as a former employee to gain access to Capital One’s client financial data. Once stolen, the employee attempted to market the data on the internet. These types of threats are increasing in frequency and intensity. Methods to prevent these types of business losses include limiting employee access to only the data they need to perform their business tasks. Make sure logging is enabled and that log files get archived so that if there's a breach, log file forensics can determine who and what was taken.

DeckerWright supports multiple employee tracking software systems including Veriato and Teramind. These software solutions track everything an employee does and can provide alerts if the employee is doing suspicious activities. While these solutions aren’t cheap, they do provide a method for using technology to both prevent and then document employee data theft.

Click HERE for more information.

Learn More

Remote Users: Security Concern #1, Cyber Criminals

BOYDOne of the major trends in our industry has been the proliferation of remote workers using “Bring Your Own Device” (BYOD). Since the devices are owned by the employee, corporate security teams cannot install their software. Company data may be accessed by two methods, either directly through apps, or indirectly through remote desktop capabilities. Both methods rely on a device that is outside of the corporate IT infrastructure in the possession of an employee. Either method exposes the company’s data to loss to cyber criminals. To understand why, this article discusses some of the tools cyber criminals can deploy to exploit remote employees. 

In the normal course of our business, we help clients monitor activity of their employees on their devices. The “good guy” monitoring software provides a window into the types of tools used by cyber criminals to compromise a company’s security and gain access to valuable data. These tools include key stroke logging, click logging, URL logging, screen shots, access to log files and an inventory of software used by the employee. In the hands of a skilled cyber-criminal these tools would allow the cyber-criminal to impersonate the employee to gain access to the companies systems.

Here’s how. The software inventory tells the cyber-criminal what software they need installed to make the connection. The key stroke logger will provide the user name and password, and the screen shots will provide information about the connection, including clues about the multi-factor authentication. If a VPN tunnel is setup, the cyber-criminals can remote control the employee’s computer to gain access to the configuration of the VPN tunnel to gain any keys. With no multi-factor authentication (MFA), the cyber-criminal would have enough information to gain access to most systems with just this information. 

The most common form of multi-factor authentication is to a cell phone. Cyber-criminals have two methods for getting the MFA codes from a smart phone. One method is to get malware installed on the employee’s phone that forwards any codes received to the cyber-criminal, or allows the cyber-criminal remote control.  The more common method used today is for the cyber-criminals to take the employees phone number by impersonating the employee with the cellular phone company. Once the phone number is switched to their own device, the criminals can get the MFA codes directly. Both of these methods have been documented as used by cyber-criminals. 

A cyber-criminal could also use an active session to impersonate an employee when they aren’t working to gain access to information. Cyber-criminals controlling a device could also inject code into a company’s systems to search for and exploit weaknesses in internal systems. Since the screen shots will reveal the company’s internal systems, the cyber-criminals can tap the vast library of hacker’s tools to compromise the system. The success of either of these methods may allow the cyber-criminal to gather corporate information.

Any remote device compromised and controlled by a cyber-criminal can become a gateway to your company’s data.

Click here for more information.

Learn More

Know someone who would benefit from DeckerWright Corporation? Let us know!

Latest Blog

United States - Zynga Exploit: Unauthorized Database Access Zynga: Social Game Development CompanyHackers gained access to the company’s database, which exposed the personally identifiable information (PII) for millions of customers. The company discovered the brea...

Account Login