In this issue
Embracing Social Networking
5 Skills for a Successful Life
How Well Do You Know
Business Continuity Tip
How Well Do You Know Your
by Blake Britton, VP of Axxys Technologies
engagements are an exciting venture as they pose new
challenges that our team is always ready to take on. Over
the many years we have been serving the business community
there continues to be a common theme among companies that
view IT as nothing more than a necessary toolset for
accomplishing various business tasks, a lack of technology
records and maintenance. Here are a few of the first items
we look at when assessing the use of IT within any business:
documentation, data/server room, and age of computers.
Do you have access to a basic network diagram of your
Do you a diagram of all the equipment and their role in the
server room/data closet?
Who maintains administrative passwords and are there
multiple sources with this information?
Business Continuity Tip
Fire up the AC; the hot and humid days of summer have
temperatures rise, it's important to remember, extreme heat
can produce electrical brownouts. Having a backup plan for
power loss can prevent short-term interruptions from
becoming long-term pain. To avoid unexpected interruptions
this summer, protect your technology with an Uninterruptible
Power Supply (UPS) and have charged laptops, with back-up
batteries, on-hand for employees.
extreme heat can wreak havoc on computers and other
electrical devices, it also poses a serious threat to the
well-being of your family and your employees. During the
summer months, more people in this country die from extreme
heat than from hurricanes, lightning, tornadoes, floods and
Click here for some informative tips on how to stay safe
and cool this summer.
Quote of the Month
It is easy to take liberty for granted, when you
have never had it taken
Capitol Way, Suite 102
Bismarck, ND 58501
Welcome to the summer edition of the NRG
Technology Services newsletter. I hope this
message finds you well and getting through
any flooding issues you may have.
One question we have been getting frequently
is relating to all the new tablet devices
that are on the market. Apple has the iPad,
HP has the TouchPad, BlackBerry has the
PlayBook. Many other manufacturers are
offering Google’s Android OS on a tablet
device. Microsoft even has built in tablet
support in Windows 7.
Which device is right for you? This question
is about as tough as they come. The answer
from us is “it depends”. For the large
majority of tablet users, most of their use
will be personal, even on a “business”
device. Defining what you are really trying
to accomplish, what you want to do with it
for personal use and what your security
needs are, will help to answer the “which
device” question. Everyone you ask has an
opinion on what is best and it really
depends on your particular situation. Please
call us with any questions and we will help
you find your perfect tablet.
Budgeting is always a hot topic this time of
year. We have been meeting with clients and
helping them to set their budgets for 2012.
If you have not been contacted yet about a
meeting and need information, please call
Steve Kelsch (NRG’s Account Manager). Steve
can guide you through the steps to establish
your technology budget for 2012.
Until next time, take care and have a great
rest of the summer!
Chris Brown, Vice President, NRG Technology
Are You Deploying the Right
Protection Technologies to Avert a Data Breach?
used with permission from Symantec
information about the cost of data breaches, enterprise
encryption trends, and the WikiLeaks case should prompt a
re-examination of some of your data protection priorities.
about the escalating costs of data breaches, enterprise
encryption trends, and the rise of the “malicious insider”
should cause organizations to re-examine some of their data
findings of the 2010 Annual Study: U.S. Cost of a Data
Breach, released in March. They show that data breaches have
grown more costly for the fifth year in a row, with the
average cost of a data breach now standing at $7.2 million.
What’s more, the study found that organizations are
responding so rapidly to data breaches that associated costs
are rising as well.
At the same time,
the latest annual study of enterprise encryption trends
reveals a significant shift in organizations’ reasons for
deploying encryption technologies. For the first time,
regulatory compliance surpassed data breach mitigation as
the top reason to deploy encryption. According to the study,
conducted by the Ponemon Institute, the main driver is tough
new data protection regulations, such as the HITECH Act and
Massachusetts 201 CMR 17, which mandate the use of
encryption as a hedge against data breaches.
What You Need to Know Before
used with permission from Symantec
Begin with a formal and well-understood policy for
employees’ use of public sites like Facebook and Twitter.
Then follow the five recommendations in this article for
balancing the risks and opportunities presented by social
When Adam Savage,
the tech-savvy host of the popular TV show “MythBusters,”
posted a picture on Twitter of his Toyota Land Cruiser, he
was sharing a lot more information than he realized. As The
New York Times reported last August: “Embedded in the image
was a geotag, a bit of data providing the longitude and
latitude of where the photo was taken. Hence, he revealed
exactly where he lived. And since the accompanying text was
“Now it’s off to work,” potential thieves knew he would not
be at home.”
Savage, nothing untoward resulted from his inadvertent
revelation. But the incident highlighted a point that
security experts and privacy advocates have been making for
some time now: namely, that the growing use of social
networking sites can have serious, if unforeseen,
consequences. This article looks at some of the important
risks and legal issues organizations need to be aware of as
employees increasingly use social networking sites.
5 Skills for
a Successful Life
by Marlene Chism
my experience as a speaker and consultant, it seems that
striving for success creates much unnecessary drama. The
image that comes to mind for me is rowing with all of your
might to get to an island that never appears. When do I get
there? How do I get there faster? What if someone else gets
there first? If there is drama in the boat, getting to the
island isn’t going to be much better.
With that in mind,
here are five skills that will make your success journey one
2. Seek and experience joy
3. Take care of
4. Master your beliefs
5. Own your
One of my favorite authors, Eckhart Tolle has some great
insights about success. He says, “Don’t let a mad world tell
you success is anything other than a successful present
moment.” One of his most profound teachings is the concept
that you cannot become successful, you can only “be”
successful. What if you take the success question off the
table and you declare that you are already successful? When
you are free to “be” you start living in the flow and you
can really experience success versus strive for it.