Certifications and Specializations Fall 2017

Posted by on 3:10 pm in Blog, Newsletter | Comments Off on Certifications and Specializations Fall 2017

As an organization, we believe it is our responsibility not just to our organization but also to you, our customers, to ensure our team stays on the cutting edge. To this end, we put a strong emphasis on continuing education and certifications for our entire team, and we love to celebrate these accomplishments. We are in the education business as much as we are in the technology business. We see our job as providing you guidance, information and resources so you can make the best decision possible for your company. To do this, our team has to...

read more

Getting Started With OneNote

Posted by on 12:39 pm in Blog, Newsletter | Comments Off on Getting Started With OneNote

Did you know with OneNote, you can easily create, revise and share notes – all in one place? OneNote is a great way to collect important information from various sources and organize it for reference later, from thoughts and ideas to homework, meetings, and more! Start by customizing your pens: Choose a personal set of pens, pencils, and highlighters for inking. Choose Draw, then click the Add Pen button and select your favorite tool. From here, you can also choose the size and color, including fun effects for the pen like Rainbow, Galaxy,...

read more

Why bother with updates and upgrades?

Posted by on 12:34 pm in Blog, Newsletter | Comments Off on Why bother with updates and upgrades?

When was the last time you thought about software updates and hardware upgrades? For many, updating software and hardware is not a priority because “If it ain’t broke, don’t fix it”. However, it’s clear that today’s cyber attacks prey on vulnerabilities present in old software and hardware. (This holds especially true for operating systems such as Microsoft Windows.) It may not be “broke”, but it’s still old. “Working” does not mean “secure”. Old software and hardware simply do not have the latest defenses like security patches and advances...

read more

FTC Data Security Protocols For All Businesses

Posted by on 12:21 pm in Blog, Newsletter | Comments Off on FTC Data Security Protocols For All Businesses

This is first article of a two-part series on FTC data security protocols. Check back next month for part 2. used with permission from FTC.gov by Thomas B. Pahl, Acting Director, FTC Bureau of Consumer Protection When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board: Don’t collect sensitive information you don’t need. Protect the information you maintain. And train your staff to carry out your policies. The FTC’s...

read more

Are Social Media Logins Safe

Posted by on 12:17 pm in Blog, Newsletter | Comments Off on Are Social Media Logins Safe

used with permission from Norton by Symantec By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and password combination. The other is the social login, which uses your credentials for a social networking account, such as Facebook, Google+, or Twitter. Until recently the login method you prefer might have hinged on convenience. However, you may want to consider security and privacy before you click that “Log in with Facebook” button again. Benefits of social logins One of the...

read more

7 ransomware prevention tips

Posted by on 11:40 am in Blog, Newsletter | Comments Off on 7 ransomware prevention tips

used with permission from Norton by Symantec Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it. Ransomware, as it is known, scores high-profile victims like hospitals, public schools and police departments....

read more

Was I Effected by the Equifax Security Breach?

Posted by on 11:32 am in Blog, Newsletter | Comments Off on Was I Effected by the Equifax Security Breach?

This is the question millions of people have after Equifax — a top credit reporting firm — announced that hackers stole consumer data from mid-May through July 2017, affecting 143 million people. Hackers stole customer names, Social Security numbers, birth dates, and addresses. A smaller set of consumers also had their credit card numbers and other documents taken. This is one of the largest data breaches in US history and the biggest known leak so far in 2017. The size of this breach has alarmed consumers and lawmakers, and Equifax has been...

read more

September 2017 Newsletter

Posted by on 1:30 am in Blog, Newsletter | Comments Off on September 2017 Newsletter

  Here is your September 2017 newsletter. In this issue… •  Letter from the President• Is Paying For Antivirus Software Worth It?• Lead Generation: When the Product is Personal Data • What Does Your Business Stand to Lose in a Cyber Attack?• Teceri News: 9 Questions When Selecting a Video Recording Solution • Why Your Online Privacy Matters • Windows 10 Tip: Keep Your Apps Organized With Virtual Desktops • 4 Ways to Help Your Remote Employees Collaborate Better • Networking Technologies Employee Highlight:Tom Corapi • Lunch and...

read more

Employee Highlight: Tom Corapi

Posted by on 11:57 am in Blog | Comments Off on Employee Highlight: Tom Corapi

Tom Corapi, Solutions Architect Tom Corapi has been a long-time staple of Networking Technologies, serving as the Server Specialist since 2006 where he implemented and managed virtualization technologies; installed, configured and managed virtual desktop infrastructure technologies; and implemented and maintained enterprise server and storage solutions for clients. Because of his expertise, institutional knowledge, and work ethic, Tom was promoted to Solutions Architect for the Erie region where he will meet the needs of our customers by...

read more

4 ways to help your remote employees collaborate better

Posted by on 9:29 am in Blog | Comments Off on 4 ways to help your remote employees collaborate better

used with permission from Microsoft US Small and Midsize Business Blog Remote employees have come a long way since the days when trying to work while away from the workplace was like a sentence in solitary confinement. Thanks to the Cloud, they no longer have to use cumbersome methods to access office computer files or receive access codes from special devices just to make a phone call. But, do your remote employees really feel like they are part of the team? There’s a lot to be said for the sense of community formed by team members who are...

read more