2011 Newsletter Header
Find us on Facebook View our profile on LinkedIn Follow us on Twitter

October 2011
In This Issue
NPS Update
Trivia
Ask the Expert - Oct
Register for Training
Avaya Acquisition
CCC @ VMUG Chicago
CCC @ TechExecs Forum
Consumerization of IT
QR Codes and Malware
Untested Backups
4 Tips to Maximize IT
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 82.63%
Surveys Completed: 620

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

Trivia Answer

 

"Come 'n listen to my story 'bout a man named Jed, A poor mountaineer, barely kept his family fed, And then one day, he was shootin' at some food, And up from the ground come a bubblin' crude..."

 

ANSWER:  

Beverly Hillbillies

 

WINNERS:

Ann Lehman
Wiley Chandler
Dan Kurkiewicz
Suzanne Brown
Jim Poull
Tracey Lowenthal

________________________    

New Trivia  

We are sticking to TV Themes this month - good luck!

 

"We're just trying to be friendly, come and watch us sing and play, we're the young generation and we've got something to say."

 

Ask the Expert
"911 - Please Help Me, Enabling Crisis Alert on Your Avaya Aura® Communication Manager System"
Sheila Jaycox, Customer Support Unit Supervisor

Sheila JaycoxAs business owners and/or managers, it is critical that we know emergency services can be dialed from any telephone on the premises. We are responsible for the safety and wellbeing of our associates while on the job. It is just as imperative that we are notified when and by whom those calls are being made. This will aid in directing responders to the caller as well as preventing emergency dispatch on calls made in error.

 Read more...
Register for CCC Training
"Securing Your Wireless Network"
Wednesday, October 26, 2011 | 12:00pm - 1:00pm CST

Managed ServicesThe CCC Training Center is holding the next session in our 2011 series on Wednesday, October 26, 2011 from 12pm - 1pm CST. You are invited to attend the live classroom session or the online webinar portion. This course is available free of charge to CCC customers with ConvergeAssure® Voice Managed Services (phone system maintenance), and ConvergeSecure® Managed Services (data, security, backup & recovery, data vaulting, and/or cloud services.

Course Overview

This month we will be reviewing all you need to know about your wireless network and how to secure it. Including commonly used terms, acronyms, and security protocols. We will also cover best practices so that you can get the best range and stability from your wireless network.

   

Click here for course details and registration info...
Avaya Acquires Sipera

avaya logoOn 4 October 2011, Avaya announced it had acquired Sipera, a worldwide provider of Unified Communications (UC) solutions including Session Border Control (SBC) functionality and a range of UC security applications. Sipera enhances Avaya's UC portfolio with enterprise-class SBC, standards-based capabilities that are intuitive, easy-to-manage and can lower the total cost of ownership of UC and Contact Center deployments.


Read the Press Release...
CCC Technologies Partners with Mitel for First Appearance at the Chicago VMUG Conference October 31, 2011

VMUG LogoCCC Technologies will be making their first appearance at the Chicago VMUG (VMWare User Group) Conference at the Renaissance Schaumburg Convention Center on Monday, October 31, 2011.

 

Join your fellow VMware users at this full-day event for in-depth technical sessions, demonstrations and exhibits. This is a great opportunity to meet with your peers to discuss virtualization trends, best practices, and the latest technology.  

 

Details and Registration... 

Are You Attending The Chicago TechExecs CIO & IT Leadership Forum? Say Hello and Have Lunch on Us!

TechExecs LogoCCC Technologies will be participating in the upcoming Chicago TechExecs CIO & IT Leadership Forum on Tuesday, October, 18, 2011 at the IBM Innovation Center. The leadership forum is a half-day agenda that is focusing on Enterprise Mobility.

 

If you are planning to attend please use the Discount Code: K2JUH7288 at registration and note that you are guests of CCC Technologies to waive the cost of your meal.

 

Please note registration is reserved for Members, Prospective Industry IT Management, Business Management, qualified Corporate IT Management attendees and Paid Sponsors. Vendors/Solution Providers must be paid sponsors to attend.  

 

Details and Registration...

Cloud CIO: What "Consumerization of IT" Really Means to CIOs

By Bernard Golden, CIO.com


ConvergeSecure Managed IT ServicesThe consumerization of IT isn't just about employees using consumer devices and apps at work. It's about consumers becoming the primary users of internal IT applications, and it has serious ramifications for how CIOs operate and scale their IT infrastructures.

The latest trend (or over-hyped term, if you like) is "consumerization of IT." As with cloud computing, the term is somewhat ambiguous and is applied to a number of things that are recognizably related, but which differ in details. Consumerization of IT is usually contrasted with "enterprise IT, " which carries connotations of interminable rollouts, bewildering interfaces, obscure functionality, and high prices. The poster child ordinarily cited for "enterprise IT" is SAP, which seems to raise particular ire in commentators. Consumerization of IT, on the other hand, is associated with ease-of-use, attractive interfaces, intuitive functionality and low prices.

Click to View Article at CIO.com

Click here to learn more about ConvergeSecure® Managed Services from CCC Technologies

QR Code Malware

A long time ago, more than 2 years ago actually, I blogged about the dangers of QR codes:

 

"virus gangs could use this technology to have the end-user follow malicious links or send messages to premium numbers"  

 

and, this is exactly what happened a few days ago, when Denis Maslennikov found a QR code leading to a mobile malware, named Jifake, that sends SMS messages to a premium number.

 

QR codes are very handy, but they're an incredible vector for attacks. Mainly, the issues are with the fact they are opaque (human eye can't read what they contain) which leads to plenty of possibilities around phishing and social engineering.

 

But there are few other dark points we should be keep an eye on, such as QR code reader exploits and input validation. Could a specially crafted QR code crash the reader, lead to privilege escalation, or unsecure input in another application of the phone (browser, SMS...)? Keep in mind that QR codes are not limited to URLs, they can also contain up to 2953 bytes of binary data. It is even possible to encrypt part of the contents of a QR code.

 

If you feel like reading a research paper on this topic, have a look at this one: QR Code Security.

 

View the September 2011 Threat Report

 

Click here to learn about Unified Threat Management solutions from CCC Technologies, Inc. 

The Seven Deadly Sins of Backup and Recovery: Allowing Backups To Go Untested

Mark Campbell, Unitrends | Modern Backup 2 Blog 


Backup & Recovery

Organizations often spend a ton of time making backups. If the backup volumes being created cannot be reliably restored, the process has failed. The basic rule of disaster recovery systems is that backups are unproven until they have been fully tested and shown to be effective on a frequent and ongoing basis.

 

The typical organization checks that: backup schedules are correct, backup jobs ran, and verifies that backups completed successfully in the error logs.  With those confirmations in hand, we assume that data recovery will be possible when necessary.  However, media degrades over time, operating environments change making it harder to successfully restore older backups, and the error rates associated with the used media make it uncertain that the restoration will actually work.

 

A solid disaster recovery plan must include redundant backups intended to compensate for normal error rates, and they must incorporate time factors that reflect real world data from actual test restorations.

 

Why do most organizations not fully test their backups?  The answer is simple: too little time to test them.

 

A surprising number of organizations still use tape as their backup medium.  The use of tape requires an enormous amount of time to build, test, and validate a backup.  Why?  Because simply restoring the data from tape isn't enough. The IT staff will have to start with a new server and then locate registry, operating system, and environmental component CDs. Next, they'll have to re-install all applications before restoring user data from tape.  Only if each of these steps works correctly can the organization be confident that data can be successfully restored in a true disaster.  

 

Read more... 


Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc.

Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
4 Tips for Getting the Most From Your Technology Investment

Managed ServicesHow many times have you purchased new software or hardware, and avoided the help menu or user manual? Experts reason that about 90 percent of all features included with software go unused! Much of this comes down to lack of training for individuals using the technology - they use what they know and need most, and avoid anything that would require study or practice to implement. It's human nature to take the path of least resistance, but with a little motivation you could better benefit from the money spent on technology for your business.

 

Read more...

 

Click here to learn more about ConvergeSecure® Managed Services from CCC Technologies, Inc.