July 2011
In this issue
 
Welcome
Avert a Data Breach
Embracing Social Networking
5 Skills for a Successful Life
How Well Do You Know
Your Network?
Business Continuity Tip
How Well Do You Know Your Network?
by Blake Britton, VP of Axxys Technologies
 

New client engagements are an exciting venture as they pose new challenges that our team is always ready to take on. Over the many years we have been serving the business community there continues to be a common theme among companies that view IT as nothing more than a necessary toolset for accomplishing various business tasks, a lack of technology records and maintenance. Here are a few of the first items we look at when assessing the use of IT within any business: documentation, data/server room, and age of computers.

Documentation
Do you have access to a basic network diagram of your infrastructure?
Do you a diagram of all the equipment and their role in the server room/data closet?
Who maintains administrative passwords and are there multiple sources with this information?

Read More

 

Business Continuity Tip
 

Heat Wave

Fire up the AC; the hot and humid days of summer have arrived.

As temperatures rise, it's important to remember, extreme heat can produce electrical brownouts. Having a backup plan for power loss can prevent short-term interruptions from becoming long-term pain. To avoid unexpected interruptions this summer, protect your technology with an Uninterruptible Power Supply (UPS) and have charged laptops, with back-up batteries, on-hand for employees.

While extreme heat can wreak havoc on computers and other electrical devices, it also poses a serious threat to the well-being of your family and your employees. During the summer months, more people in this country die from extreme heat than from hurricanes, lightning, tornadoes, floods and earthquakes combined.

Click here for some informative tips on how to stay safe and cool this summer.


 

Just for Laughs

 

Quote of the Month

It is easy to take liberty for granted, when you have never had it taken
from you.

Dick Cheney
 

1661 Capitol Way, Suite 102
Bismarck, ND 58501
Phone: 701-250-9400
www.nrgtechservices.com

 

Welcome

Greetings!

Welcome to the summer edition of the NRG Technology Services newsletter. I hope this message finds you well and getting through any flooding issues you may have.

One question we have been getting frequently is relating to all the new tablet devices that are on the market. Apple has the iPad, HP has the TouchPad, BlackBerry has the PlayBook. Many other manufacturers are offering Google’s Android OS on a tablet device. Microsoft even has built in tablet support in Windows 7.

Which device is right for you? This question is about as tough as they come. The answer from us is “it depends”. For the large majority of tablet users, most of their use will be personal, even on a “business” device. Defining what you are really trying to accomplish, what you want to do with it for personal use and what your security needs are, will help to answer the “which device” question. Everyone you ask has an opinion on what is best and it really depends on your particular situation. Please call us with any questions and we will help you find your perfect tablet.

Budgeting is always a hot topic this time of year. We have been meeting with clients and helping them to set their budgets for 2012. If you have not been contacted yet about a meeting and need information, please call Steve Kelsch (NRG’s Account Manager). Steve can guide you through the steps to establish your technology budget for 2012.

Until next time, take care and have a great rest of the summer!
Chris

Chris Brown, Vice President, NRG Technology Services


Are You Deploying the Right Protection Technologies to Avert a Data Breach?
used with permission from Symantec
 

Summary:  New information about the cost of data breaches, enterprise encryption trends, and the WikiLeaks case should prompt a re-examination of some of your data protection priorities.

New information about the escalating costs of data breaches, enterprise encryption trends, and the rise of the “malicious insider” should cause organizations to re-examine some of their data protection priorities.

Consider the findings of the 2010 Annual Study: U.S. Cost of a Data Breach, released in March. They show that data breaches have grown more costly for the fifth year in a row, with the average cost of a data breach now standing at $7.2 million. What’s more, the study found that organizations are responding so rapidly to data breaches that associated costs are rising as well.

At the same time, the latest annual study of enterprise encryption trends reveals a significant shift in organizations’ reasons for deploying encryption technologies. For the first time, regulatory compliance surpassed data breach mitigation as the top reason to deploy encryption. According to the study, conducted by the Ponemon Institute, the main driver is tough new data protection regulations, such as the HITECH Act and Massachusetts 201 CMR 17, which mandate the use of encryption as a hedge against data breaches.

Read More


What You Need to Know Before Embracing
Social Networking

used with permission from Symantec
 

Summary: Begin with a formal and well-understood policy for employees’ use of public sites like Facebook and Twitter. Then follow the five recommendations in this article for balancing the risks and opportunities presented by social networking.

When Adam Savage, the tech-savvy host of the popular TV show “MythBusters,” posted a picture on Twitter of his Toyota Land Cruiser, he was sharing a lot more information than he realized. As The New York Times reported last August: “Embedded in the image was a geotag, a bit of data providing the longitude and latitude of where the photo was taken. Hence, he revealed exactly where he lived. And since the accompanying text was “Now it’s off to work,” potential thieves knew he would not be at home.”

Fortunately for Savage, nothing untoward resulted from his inadvertent revelation. But the incident highlighted a point that security experts and privacy advocates have been making for some time now: namely, that the growing use of social networking sites can have serious, if unforeseen, consequences. This article looks at some of the important risks and legal issues organizations need to be aware of as employees increasingly use social networking sites.

Read More


5 Skills for a Successful Life
by Marlene Chism
 

From my experience as a speaker and consultant, it seems that striving for success creates much unnecessary drama. The image that comes to mind for me is rowing with all of your might to get to an island that never appears. When do I get there? How do I get there faster? What if someone else gets there first? If there is drama in the boat, getting to the island isn’t going to be much better.

With that in mind, here are five skills that will make your success journey one worth savoring.

1. Define success
2. Seek and experience joy
3. Take care of yourself
4. Master your beliefs
5. Own your choices

Define success
One of my favorite authors, Eckhart Tolle has some great insights about success. He says, “Don’t let a mad world tell you success is anything other than a successful present moment.” One of his most profound teachings is the concept that you cannot become successful, you can only “be” successful. What if you take the success question off the table and you declare that you are already successful? When you are free to “be” you start living in the flow and you can really experience success versus strive for it.

Read More