2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

November 2013
In This Issue
NPS Update
Trivia
Ask the Expert
CCC's HOLIDAY SCHEDULE
CCC Celebrates Halloween
Congrats Sofiya
Mitutoyo America
CCC Jumble
Mediocre Customer Service
Mitel Celebrates 40 Years
ESI End of Life Notice
Too Many Security Policies
Insight Acquires Unitrends
BYOD Battle Royale's
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS

Current NPS®: 80.15%
Surveys Completed: 2172

Click here to learn more about Net Promoter Score. 
Trivia
Trivia

Trivia Answer

 

Judd Nelson was ultimately chosen to play John Bender in John Hughes' 1985 hit "The Breakfast Club." Name two other actors that were considered for the role prior to Nelson.

 

ANSWER:
Emilio Estevez
Nicholas Cage
John Cusack

 

WINNERS:

Wiley Chandler
Dan Kurkiewicz

_________________ 

   

New Trivia  

 

One of Star Wars most recognized (and most imitated) hallmarks is the opening "crawl" of text to start each movie.

Who helped George Lucas write the opening crawl for Star Wars Episode IV: A New Hope?
Ask the Expert
"Malware, the New Extortion"
Greg Janowski, ConvergeSecure® CSU Engineer
Greg JanowskiMalware is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, or in various other forms of software. "Malware" is a general term used to refer to a variety of hostile and/or intrusive software. Software that resides under the malware umbrella include (but are not limited to): computer viruses, ransomware, spyware, adware, and more; with the majority of today's active malware threats fitting the profile of a worm or Trojan rather than the more archaic viruses.

Many U.S. laws define malware as a computer contaminant, however, some malware is disguised as genuine software, and may come from an official company website in the form of a useful or attractive program which has the harmful malware embedded in it along with additional tracking software that gathers marketing statistics. People and companies rely on robust antivirus programs as well as hardware or software based firewalls to help protect from known malware infections which help to identify, quarantine, and prevent the further spread of malware around the world.

A new malware variant named CryptoLocker has recently made headlines with it's ability to infect computers dedicated to both personal and business computing. Once CryptoLocker has infected your system, your computer becomes useless unless you pay a ransom to have it "unlocked."

 

Read more...
CCC Technologies' Holiday Schedule
Happy Holidays The following is our schedule in observance of the Thanksgiving, Christmas, and New Year's Holidays. If you should need support during days that we are closed, please contact our 24x7 support line at 877.790.1222.


Thanksgiving
Wednesday, November 27th - OPEN - Regular Business Day
Thursday, November 28th - CLOSED
Friday, November 29th - CLOSED
Monday, December 2nd - OPEN - Regular Business Day

Christmas
Monday, December 23rd - OPEN - Regular Business Day
Tuesday, December 24th - CLOSED
Wednesday, December 25th - CLOSED
Thursday, December 26th - OPEN - Regular Business Day

New Year's
Monday, December 30th - OPEN - Regular Business Day
Tuesday, December 31st - CLOSED
Wednesday, January 1st - CLOSED
Thursday, January 2nd - OPEN - Regular Business Day

We would like to extend our warmest wishes to you and  your families for a happy and safe holiday.
CCC Celebrates Halloween!
On Thursday, October 31st, we held our annual Halloween pot luck and costume contest.

We would like to congratulate all the winners:
  • 1st Place - Director of Marketing and ConvergeSecure® Project Manager, Kim Kiefer as "Billy" the puppet from Saw
  • 2nd Place - Customer Care Representative, Jasmine Saldana as Medusa
  • 3rd Place - Customer Care Supervisor, Jazmine Rodriguez as Chong (Juan Rodriguez was Cheech)
  • 4th Place - Customer Care Representative, Tim Blevons as a slick "City Wolf" 
  • 5th Place - Support Dispatcher, Michael Wilkerson as an Egyptian Pharaoh 
  •  6th Place - Customer Care Representative, Scott Maciejewski as Robin Thicke
Kim Halloween
We're starting to think Kim takes this WAY too seriously. She rode that tricycle around the office all day
Jasmine Halloween
Cutest Medusa ever! 
Jaz and Juan Halloween
That's Jazmine as Chong - Looking good Cheech!!!
Tim Halloween
Looking slick City Wolf...
Scott Halloween
Thank God he didn't bring Miley
Mark and Danny Halloween
Mark Di Benedetto and Danny Poull teach us that sharing IS caring. 
Group Halloween
Yes, you trust us with your most critical business applications
Pot luck
One of the best pot luck lunches to date. Thanks to everyone who contributed!
Congratulations Sofiya!!!
Our 2013 Holiday Card Contest Winner

CONGRATULATIONS SOFIYA!!!!
The entire team at CCC Technologies would like to extend a very special thank you and congratulations to Sofiya Zackria, niece of ConvergeSecure® Engineer, Mariam Khan.

Sofiya's entry was voted the favorite of over a dozen entries to be the front of CCC's 2013 holiday card. In addition to recognition in this year's card Sofiya also won a $100 Toys 'R Us gift card.

Keep an eye out for Sofiya's artwork in your mailbox in the coming weeks.

Congratulations again Sofiya - GREAT JOB!!!
Long-time CCC Customer Mitutoyo America Unveils New Headquarters with Open House
Program Guide
Mitutoyo America 50th Anniversary Celebration Open House

CCC Technologies was honored and excited to be invited to attend the Mitutoyo Grand Opening/Ribbon Cutting ceremony for their new US Headquarters facility located in Aurora, IL.  Mitutoyo has been a long time CCC client and when their IT team was tasked with moving and updating existing technology infrastructure they reached out for our guidance and recommendations to best accommodate the transition to the new building.  As a team, CCC and Mitutoyo worked together to map out a plan for moving and collapsing the telephony environment into the new Aurora core as well as deploying new IP based telephones to all users.  The transition was a non-event for users and the new IP based phones not only compliment the new state-of-art facility but position Mitutoyo for the future.

 

 

The two-day "Building the Foundation for the Next Fifty" celebration included a ribbon cutting ceremonies, M3 Solution Center, and facility tours, product introductions and seminars, and a 50th Anniversary gala celebration for Mitutoyo customers, distributors and distinguished guests.

 

 

"We are so excited that the grand opening of our new facility could occur simultaneously with our 50th anniversary milestone. Our new advanced facility will provide Mitutoyo America with all the essential resources necessary so we are able to hold true to our #1 commitment -- To prevail as the leader in the metrology market achieved through a culture which recognizes lasting relationships are only built on a solid foundation which embraces trust and honor"; said Shigeyuki Sasaki, president of Mitutoyo America Corporation.  

 

Mitutoyo's nationwide network of Metrology Centers and support operations provides application, calibration, service, repair and educational programs to ensure that our 6,000+ metrology products will deliver measurement solutions for our customers throughout their lifetime.

 

We were so honored to be a part of the move to the new facility. We value our partnership with Mitutoyo America and look forward to a very long relationship

CCC "Jumble"
November Edition

Congratulations to winner of our October Jumble, Sheila Jaycox :)

Click the image below to download this month's Jumble. Entries should be emailed to kkiefer@ccc1.com

Winners receive a Starbuck's gift card.

Click Image to Download PDF


Below are the answers to last month's jumble.


How Mediocre Customer Service Is Driving Your Customers Away
Eric Lai - Avaya

avaya logo Some companies drive away loads of customers with one big move. Like that department store chain that got rid of coupons and sales promotions. Its base of cost-sensitive mom shoppers quickly fled to other stores.  

 

Read more... 

Mitel - 40 Years of Innovation 
mitel 40
In 2013 Mitel celebrated its 40th anniversary. Mitel Chairman Terry Matthews reflects on the wayward shipment that lead to the development of hte company's original tone receiver in 1973, and the unique opportunity cloud computing hold for customers today.

ESI End-of-Life Notice:
ESI 40D (Digital) Business Phone  
ESI Logo ESI announces the end-of-life, effective December 31, 2013, of the ESI 40D (digital) Business Phone. The IP model, the ESI 40IP Business Phone, remains in the ESI product line.

End-of-life Events and Dates

Event
Definition
Date
End-of-life announcement date
The data on which the document announcing the end-of-life of a product it distributed to the general public.
10/07/2013
Last date to order/ship
The last date to order and ship the product from ESI. The product is no longer available for sale as of this announcement.
12/31/2013
Last date of support
The last date to receive service and support for the product. After this date, all support services for the product are unavailable, and the product becomes obsolete.
12/31/2018

Avoiding Security Policy Accumulation
Stefanie Hoffman, Fortinet
Fortinet Logo

These days, IT complexity is a way of life - and something that most have come to accept as normal.

 

Let's face it, it's well established that the typical enterprise user utilizes a multitude of devices at any given time throughout the work day. These devices are continuously exchanging information from numerous locations while using application data across hybrid cloud infrastructures. As a result, organizations are in the process of perfecting a precarious balancing act that both provides seamless unified access while simultaneously dodging the headaches associated with duplicated and contradictory security policies.

 

And that's no small challenge. So much so that Fortinet researchers maintain that the exponential rise of security rules and policies accumulated by organizations is also preventing them from effectively responding to a maelstrom of new and sophisticated new threats on the security landscape.

 

Here's why: organizations add security rules on a regular basis, but seldom remove them, creating a myriad of disparate and often contradictory security policies later on. Subsequently, security administrators face more difficulties in understanding the security rules that they are implementing, opening up unintended holes down the road and leaving organizations vulnerable to attack.

 

Read more...
Unitrends 3.0 - Insight Venture Partners Acquires Unitrends

Mark Campbell, Unitrends | Modern Backup 2 Blog 

Backup & Recovery

 

Unitrends is being purchased by a VC.  Is this the end of Unitrends?  Will Unitrends lose its customer obsessed focus (and thus I'll have to rename this blog?)

 

 

Mike Coney, the CEO of Unitrends, recently was responsible for a blog that talked about the History of Unitrends.  Pretty interesting reading.  This post is inspired by both it and another post - over at Spiceworks - called The end of Unitrends?

 

Everyone views history through the lens of their own experience - thus history is incredibly subjective.  I thought that the "History of Unitrends" blog post did a good job.  But when I talked to a few customers last night and this morning about the Insight Ventures Partners acquisition of Unitrends, I thought that it was worth revisiting.

 

When I think of Unitrends, I think of it in three distinct phases. I'm going to briefly describe the first two phases and spend more time on the third.

 

Read more...

Click here to learn about Backup & Recovery solutions from CCC Technologies, Inc. 

 

Click here to learn about onsite managed backup and offsite vaulting services from CCC Technologies, Inc.
BYOD's Battle Royale Pits IT vs. Employee
By Tom Kaneshige - November 6, 2013 - CIO.com
Managed Services
IT departments want to control the devices employees bring into the workplace. Employees say, 'my device, my rules.' The "Bring Your Own Device" super trend has ignited an epic battle between IT and employees. In one corner, IT frets about data security and perhaps losing control over devices and apps. In the other corner, employees want to choose the devices and apps for work and play, and they're a little tired of IT telling them what they can and cannot do.

So who's winning?

Read more...