2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

February 2016
In This Issue
NPS Update
Trivia
Ask the Expert
Avaya Network
Mitel and VoWiFi
ESI Blog
Fortinet FortiOS 5.4
Axcient eBook
Convincing the CFO
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS
 NPS Score: 74.92%
Surveys Completed: 3492

Click here to learn more about Net Promoter Score. 
Trivia
Trivia
 
TRIVIA ANSWER:
 
Airwolf was an awesome attack helicopter piloted by Stringfellow Hawke. To protect the chopper from the government officials who wanted it back, Hawke had hidden it in a secluded area in California.

What did he call Airwolf's hiding place?

ANSWER:
Valley of Gods / The Lair

WINNERS:
Wiley Chandler
Dan Kurkiewicz
_________________ 
   
NEW TRIVIA

Precocious middle child, Lisa Simpson, is a budding saxophone player, read Teen Screen and Teen Steam magazines, and while she too watches Krusty the Clown, her favorite TV show is a very violent cartoon.

What is it?
Ask the Expert:
Google Security Services
Paul Cabrera, ConvergeSecure® Engineer
Google has decided to take another step to protect computer users from deceptive practices on the Internet. It has announced an addition to the existing Safe Browsing program that will warn users when they attempt to visit websites that contain deceptive buttons/links. These buttons either are hidden in the ads or they are embedded directly on a page and they try to make users download or install some third party software or play some media on a website which most often infects the users computer with a virus.

Read more...
Avaya - How to Achieve Business Speed with Avaya Network

Mitel: Terry McCabe CTO of Mobility Discusses Mitel and VoWiFi

ESI Blog:
The Direction of VoIP in the New Year
Kimberly Drobny, ESI
ESI Logo
VoIP has become an essential way for businesses to communicate, and the technology surrounding it continues to grow and develop. In fact, it has grown to be one of the top performing business technology solutions for the past decade. And the technology is still very much in its infancy. 
 
As VoIP technology continues to grow and develop, new capabilities are being introduced in an almost constant stream. Most recently, VoIP has become mobile-centric, allowing users to work outside of the constraints of their office or desk phone without losing any of the essential functions they provide. 
 
Looking towards the new year and all of the possibilities it brings with it, let's make some predictions on the direction this still-emerging technology will take. 

Read more...
Fortinet:
What's New in FortiOS 5.4

This is FortiOS Version 5.4. We've been working hard to get this new version ready, and this video will run you through some of the features and updates you can expect: a new interface, new tools for keeping an eye on your network, new features to protect against new threats, and thousands of updates and tweaks to make managing your firewall easier.

Axcient: The Virtualization Challenge
(Free e Book Download)
Backup and virtualization continue to top the IT priority list, with experts predicting we'll see virtual environments reach 100% by 2020. The benefits of virtualization are clear-but there's been one major concern: How do you ensure data protection?

There are dozens of strategies when it comes to protecting data in virtualized environments-from snapshotting to replication-but these are complex, expensive, and not altogether effective. Now there's a proven new answer.
Download this eBook to learn
  • The benefits of virtualization for data protection
  • Proven resiliency methods based on virtualization
  • How to combine virtualization and cloud technology for true DRaaS
Read more...
How to Convince the CFO of the Budgetary Security Need
Brian Contos -  from CIO.com| February 9, 2016
Anyone who has tried to undertake a major (and even minor) change in an organization has most likely experience some roadblocks. In my experience getting upper management and other key stakeholders to understand why the change is necessary.  How many of you can identify with these responses from key management/stakeholders regarding change:

Cybersecurity needed to be a part of the business enterprise and not just an afterthought or complementary side-function. Since most businesses have a public-facing side and are reliant on organization and/or customer patronage, being able to protect their interests as well as the company's becomes a symbiotic effort underpinned by a solid cyber security strategy. Identifying key information assets and processes and devising the appropriate security apparatus around them is a best-practices approach to securing the most critical components.