|
Here is your September 2017 newsletter. In this issue…
• Letter from the President |
|||
Letter from the President | |||
In the next few newsletters I will be announcing some exciting changes and additions to our team. This month, I am thrilled to announce that Tom Corapi has taken the position of Solutions Architect for the Erie Region. We feel that Tom’s tenure in working with customers and his knowledge and understanding of the current environment are best suited to maintain and continue to enhance the high level of service our customers have come to expect. You can read more about Tom in this month’s newsletter or on our blog. As part of this transition, we are also excited to announce that Ned Reade, who has been serving as our Erie Solutions Architect, will be serving as the Cloud Practice Manager. In this role, Ned will work with our cloud team to accelerate our cloud offerings with Azure, Office 365, Veeam, Barracuda, AWS (Amazon Web Services), Google Cloud, and Hewlett Packard Enterprise. The cloud is all around us, and we are already living in a cloud world and utilizing its assets – from Office 365 to our phones to other software and systems. While you won’t be able to avoid it, you can “right-size” the cloud to your organization. Some businesses want to (and should) transition 100% to the cloud. Others will operate using hybrid cloud solutions. At Networking Technologies, we truly believe there isn’t one solution that fits all. We work with you on finding the best cloud configuration – compute, storage and network settings – to meet your needs and, in some cases, save you money. You can learn how the cloud can benefit you and read a primer on questions to think through about hybrid solutions. Of course, you can also contact us with your questions or to talk through options. Finally, I know several of you have signed up for our Lunch & Learn: Nimble Storage and Veeam Software event on Sept. 19, from 10:30 a.m.-3 p.m. at Ingram Micro (Williamsville, NY). Join us for lunch, a presentation with live demo and a tour of the Ingram Micro Solutions Center. If you haven’t already, RSVP for the event today. From all of us at Networking Technologies and Teceri, James Bahm |
|||
Is Paying For Antivirus Software Worth It? | |||
used with permission from Norton by Symantec by Christina Schubert |
|||
![]() The price of digital safety It’s hard to put a price tag on digital safety. Take malware for example. These sneaky little codes find their way into your devices and transmit your personal information to computers far away that are operated by fraudsters. The end result could translate into anything from cybercriminals draining your bank account to holding all your information hostage by freezing your device and asking for a ransom. |
|||
Lead Generation: When the Product is Personal Data |
|||
used with permission from FTC.gov Lesley Fair |
|||
There’s been a lot of talk about “ping trees” and other activities associated with the lead generation industry. The FTC’s concern is that consumers don’t get ponged in the process. A proposed settlement gives a glimpse into how one lead generation company operated and offers insights for businesses about compliance considerations when the “product” in question is consumers’ personal data. Arizona-based Blue Global operated at least 38 Internet domains with names like 247loan.com, clickloans.net, onehourloan.com, and netloanusa.com. |
|||
What Does Your Business Stand to Lose in a Cyber Attack? | |||
used with permission from Microsoft US Small and Midsize Business Blog | |||
![]() called ransomware. But when it comes to cyber crooks, apparently they’re also using some old-fashioned methods to breach businesses’ systems. The 2017 Annual Cybersecurity Report from Cisco shows cybercrime is growing. Here’s what could be at risk for your business.How are cyber crooks getting in?While highly complex cyber attacks are increasing, the Cisco report notes that “classic” attacks are on the rise as well. For example, adware that gathers information about a user’s computer without telling them and malicious spam emails are common attack methods. In fact, spam is flying at levels not seen since 2010. According to the report, almost two-thirds (65 percent) of all email is spam, and 8 percent to 10 percent of spam is malicious. |
|||
![]() used with permission from Norton by Symantec, by Nadia Kovacs
|
|||
![]() one must understand exactly what it is before it can be valued. There seems to be a good number of people in the “I’m not doing anything wrong, therefore, I have nothing to hide” camp. Well, we are here to bust that myth. The truth of the matter is, right or wrong, we have everything to hide.Read more → |
|
|
Recent Comments