building responsive website

Get Started Today!  732-747-9373   

The New Jersey IT Experts


We work hard behind the scenes so annoying technology issues don't slow your business down.

Our mission is to help businesses like yours increase productivity and get more out of the technology you invest in.
We specialize in solutions that safeguard and protect your data and keep operations running smoothly.

Managed IT Services

Intelligent remote monitoring, proactive maintenance, and behind-the-scenes remote support.

read more

Network Security

Protect your business from threats like malware, viruses, phishing attacks, hackers and other threads.

read more

Backup & Disaster Recovery

Ensure peace-of-mind in any situation with the most complete data backup solution available.

read more

Cloud Hosting Solutions

Reduce infrastructure costs, collaborate, and get more done with our unique cloud solutions.

read more

When you just want IT to work!

There are a lot of computer shops out there that you can call up to fix an issue or install a piece of equipment. They might be able to get you out of crisis mode, but they aren’t looking at the full picture.

At DeckerWright Corporation, we understand business. We consult. We provide solutions to solve everyday challenges. We just happen to fix computers as well.

We believe (and have proven) that if you proactively manage technology, run maintenance religiously, and monitor a business network, everyday issues and downtime will be greatly reduced.

This is what makes us different than your typical tech support company. Sure, we can fix computer issues when you have them, but our specialty is preventing them in the first place.

Are you looking for a partner you can trust your IT with? Sign up for a FREE IT Assessment to get started today.

Managed IT Questions?

If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query!

What Our Clients Say

  • Thank You DeckerWright

    DeckerWright just finished a complete upgrade of Monmouth Arts’ computer server and network.  They had helped us nurse our old computers as long as humanly possible but we knew it was time to upgrade.  Even with a nonprofit budget they helped us figure out what we needed and made the installation process seamless.  We are thrilled with our new all-in-one computers that take up so much less space and are so quick to respond.  With our new equipment and cloud backup we are able to focus on making Monmouth County a better place through the arts more efficiently and with confidence in the technology that makes it possible.

  • I Highly Recommend DeckerWright

    DeckerWright Corporation has been our valued IT vendor for many years.  They had managed to keep our old computers running long after they should have been replaced, and recently we relied on their guidance and expertise to replace all of the now obsolete Windows XP towers and laptops. DeckerWright Corporation worked with us to get HP computers at a great price and coordinated with our staff to retire the old computers and deploy the new ones.  Our not-for-profit agency now has a faster and more secure network with much happier employees!  The staff at DeckerWright Corporation is knowledgeable - staying on top of industry trends and advising us clearly and pragmatically - and they are always responsive to our needswhether routine or an emergency. It is truly a pleasure to work with them and I would highly recommend DeckerWright Corporation!

  • Network Support

    DeckerWright Corporation has been a valued partner in helping to design, implement, and support our network. They provide insights and suggest ways to incorporate the technology to streamline operations and make people more efficient... If you are looking for a vendor that will deliver and who will be a valuable partner in the success of your organization; I would definitely recommend DeckerWright.

  • We've Had Fewer Computer Problems!

    DeckerWright Corporation is a valued member of the Red Bank Pension Services team. With DeckerWright’s ActivMaintenance, we have had noticeably fewer computer problems. They've helped modernize our office to become “paperless” which has allowed us to grow without increasing staff. The DeckerWright staff is great, and always responsive to our needs.

  • We Are Now Better Equipped!

    Our Care Management Organization relies heavily on e-mail to communicate with and assist our clients. You can imagine our concern when transitioning over 90 end users/mailboxes from our local e-mail server to Microsoft Office 365- we needed consistent e-mail flow and confidence that the material was secure. DeckerWright Corporation helped us make this transition seamless and much easier than expected. Partnership for Children of Essex County is now better equipped to help our clients, thanks to DeckerWright Corporation!

  • 100% Satisfied Customer

    We selected DeckerWright Corporation just over a year ago and are very happy we did!  As a busy Veterinary office, having our systems running reliably is a must.  DeckerWright was able to fix some long nagging issues to get things running smoothly.  Getting technical support is easy- with their high tech software tools, they are able to jump on our machines remotely fixing things quickly without having to schedule a visit. If they do need to visit our office, they arrive on time.  If you’re searching for a good IT provider, check out DeckerWright Corporation.

  • Cybersecurity Training

    The cyber security class offered by DeckerWright was a valuable experience for our office. We learned a lot in a short amount of time that will help protect our business. Thank you Marshall and Courtney!

Latest Blogs

The Week In Breach: 11/06/19 - 11/12/19

the week in breach

United States - InterMed

Exploit: Compromised Email Account
InterMed: Maine-Based Physician Group

Hackers gained access to four employee email accounts that contained patients’ protected health information. The first employee account was accessed on September 6th, and the subsequent accounts were available between September 7th and September 10th. Although InterMed did not report the specific vulnerability that led to the breach, credential stuffing and phishing attacks were likely the culprit. The company’s slow response time and the sensitive nature of the compromised data will result in regulatory scrutiny that will amplify the post-breach impact.

United States - Brooklyn Hospital Center

Exploit: Ransomware
Brooklyn Hospital Center: Full-Service Community Teaching Hospital

A ransomware attack struck Brooklyn Hospital Center, making some patient data inaccessible while deleting other information entirely. The ransomware originated with unusual network activity in July, but it wasn’t until September that the hospital determined that certain data would never be recoverable. However, it’s unclear why it took another month to notify the public of the disabled or missing data. As healthcare providers both big and small face the threat of ransomware attack, this lengthy reporting delay can compound the problem as it ushers in the opportunity for more hostile consumer blowback.

United States - Utah Valley Eye Clinic

Exploit: Unauthorized Database Access
Utah Valley Eye Clinic: Utah-Based Eye Clinic

A cyber-security vulnerability at a third-party affiliate compromised personal data for thousands of the clinic’s customers. The incident resulted in patients receiving fraudulent emails indicating that they received a payment from PayPal. The breach was only recently discovered, originally occurring on June 18, 2018, so patient data has been exposed for a significant duration. As a result, the company will likely face legal penalties and lost revenue due to exposed protected health information (PHI).

Learn More

Security Concern #3 - Physical Security

physical securityOne of the lesser emphasized areas of cyber security is physical security. HIPAA regulations cover in detail the physical security of computer systems. If you get a HIPAA Risk Assessment and it doesn’t include on-site visits to each location, the Risk Assessment document is incomplete. A growing area of concern is mobile computing, and multi-factor authentication using smart phones. With data now readily accessible outside the office, physical security has taken on new meaning. 

Breaching physical security of data systems means that a person who is unauthorized gains access data. The unauthorized person is most likely an employee, but could be a client, vendor, criminal or other person. The most common physical data breach happens when a computer systems is left logged in and unattended. A curious employee would be able to impersonate an authorized person and gain access to data they should be seeing. 

As part of a HIPAA Risk Assessment, physical security of a company’s data systems are evaluated. Are the computers in areas secured from unauthorized persons? Very often computers need to be in areas where they intersect with unauthorized persons, such as in a retail environment. In cases like this, computers should be set with short timeouts to lock the computers when not in use. Laying out a work space so that monitors are not facing public areas is also a good practice. 

Local data storage on servers, computers and storage devices must also be protected. The best practice is to have the servers hosting the data to be in a secured and locked room. The room must have adequate ventilation to ensure the room remains at room temperatures. Servers need to be protected from theft so that the data on them is protected. 

The latest threat to physical security is the increasing dependence on mobile computing. Smart phones, tablets and laptops are setup to access corporate data with remote access software. Sometimes corporate data is also stored on these devices. Since there is no way to “lockup” a mobile device, precautions must be implemented to protect the corporate access to data on the devices. Devices should be protected with a password or bio-metrics for access. Any data on the devices should be encrypted. The operating assumption from a security perspective isn’t if the device will be lost or stolen, it is when the device is lost or stolen.  Without planning and implementing best policies on mobile devices, a criminal can gain access to corporate data by stealing a mobile device. 

The smart phone has become the de facto “token” for multi factor authentication (MFA). Smart phones serve as MFA tokens either by getting a text message with a six digit code, or through apps like Google and Microsoft Authenticator. A criminal wanting to impersonate you has a high interest in stealing your cell phone. A recent Wall Street Journal article chronicles how cyber criminals targeted a person and stole his phone to gain access to his MFA (He Thought His Phone Was Secure; Then He Lost $24 Million to Hackers). His estimated loss was over $24 million dollars.

https://www.wsj.com/articles/he-thought-his-phone-was-secure-then-he-lost-24-million-to-hackers-11573221600

Physical security is often over looked in our high tech industry, but it must be considered and planned for in order to protect corporate data.

Click HERE for HIPPA physical security regulations.

Learn More

Know someone who would benefit from DeckerWright Corporation? Let us know!

Latest Blog

United States - InterMedExploit: Compromised Email Account InterMed: Maine-Based Physician GroupHackers gained access to four employee email accounts that contained patients’ protected health information. The first employee account was accessed on September 6th, an...

Account Login