fbpx

Complacency will cost you

used with permission from HP Tech@Work Spear-phishing is on the rise Imagine spending years developing a product your research says will take the market by storm. Grow your small business into a major player. Rewrite the rules for much larger competitors. Then comes...

Spam Text and Calls

used with permission from Norton by Symantec They’re about as welcome as robot calls and junk mail — spam text messages. They show up as unwanted and unexpected text messages on our phone screens. That’s aggravating enough, but it gets worse. Whoever is sending you a...

The battle for talent

used with permission from HP Tech@Work How you can win With U.S. unemployment below 4 percent, it’s probably become more difficult for you to find good talent. Not only do you have to cast a wider net across a shrinking pond of potential employees, you’re also...

January 2019 Tech News

Here is your January 2019 newsletter. In this issue… • Letter From the President• Cybersecurity for Small Business: Physical Security • What is OneDrive for Business?• Employee Highlight of the Month: Chris Heck • What’s the Difference Between Data Lakes...

January 2018 Certifications

Congratulations to the following employees who recently earned certifications from our technology partners. Craig Allison Extreme Networks – ESS – OverviewExtreme Networks – ESS – Smart OmniEdgeExtreme Networks – ESS –...

Chris Heck – System and Cloud Specialist

At Networking Technologies, we see the opportunity to not only address our client’s needs but also serve as a technology resource for their organization. This model of addressing issues while providing insights was a perfect fit for Chris Heck, who joined the...