2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

March 2016
In This Issue
NPS Update
Trivia
Ask the Expert
Avaya ENGAGE 2016
ESI Blog
Fortinet Webinar
Downtime Calculator
Proactive CIOs
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  
NPS® Update
NPS
 NPS Score: 75.63%
Surveys Completed: 3540

Click here to learn more about Net Promoter Score. 
Trivia
Trivia
 
TRIVIA ANSWER:
 
Precocious middle child, Lisa Simpson, is a budding saxophone player, read Teen Screen and Teen Steam magazines, and while she too watches Krusty the Clown, her favorite TV show is a very violent cartoon.
 
What is it?

ANSWER:
The Itchy and Scratchy Show

WINNERS:
Jim Poull
_________________ 
   
NEW TRIVIA

He promised Alice the moon, but he was rarely able to provide any luxuries for her. Ralph Kramden was a bus driver and earned $60 a week, but in 1955 it never seemed enough, and he ventured into many money making schemes that all failed. He tried to market the Handy Housewife Helper on TV (as "The Chef of the Future") and he attempted low-cal pizza and glow-in-the-dark wallpaper (to cut down on electric bills). But he was most famous for investing in something.

What was it?
Ask the Expert:
Importance of Backing Up Your Environment
Greg Janowski, ConvergeSecure® Engineer
Imagine coming in to work after the weekend only to find out the whole company cannot do their job because the system has crashed - or has been hijacked by ransomware.

Recent studies show that a single downtime event could cost a small or mid-size business between $10,790.00 and $25,600 per hour. That cost is enough to ruin a small business company and put them out of business.

Read more...
Avaya ENGAGE 2016 is Coming!
Will We See You There?
IAUG Logo The 2016 Avaya IAUG (International Avaya User Group) Conference is being held June 5-9, 2016 in Orlando, FL at the Disney Swan & Dolphin Resort.

As the leading event for technology communications professionals, the 2016 IAUG Annual Conference is the best opportunity to learn about new approaches to common convergence problems and identify tools to help move your company forward. With over 2,500 Avaya users in attendance, you will have the opportunity to engage with industry leaders, trusted vendors and Avaya experts who can help your company maximize your IT spend ROI.

The IAUG Annual Conference will feature more than 200 in-depth technical and business strategy sessions organized by hot industry topics, tracks and company size so you can easily identify sessions of value to your organization.

Below are just a few of the topics the IAUG Annual Conference content will address:
  • Staying abreast of rapid changes in the marketplace and technology
  • Managing the increasing costs of implementation and maintenance
  • Maintaining security with the BYOD movement
  • Integrating BYOD while maintaining security
  • Solutions for effective video conferencing
  • Finding the best path to the Cloud and what makes sense for our company
  • Integrating Microsoft Lync into Avaya
  • Virtualizing in the Avaya environment
  • Moving to SIP and the transition to data communications
  • Finding the best integration and/or migration strategies from old to new platforms
Registration is now open and early bird discounts are available until April 22nd.

For more information and to register please visit www.iaug.org
ESI Blog:
Helping Employees Adopt New UC Tech
Kimberly Drobny, ESI
ESI Logo
It's within human nature to be somewhat averse to change. People get accustomed to their habits and processes, and when you try to introduce something new into their natural way of doing things they tend to be hesitant to accept it - even if what's being introduced is helpful to the way they live.

This is especially common when an employer tries to introduce new technology to the workforce. Employees have "settled in" to the way they do things, and bringing in a piece of technology that has the promise of helping them work more efficiently or with more collaboration can be difficult. To them, this is just something new for them to learn how to use, another hurdle in their way, slowing them down and preventing them from getting real work done.

One of the most difficult pieces of new technology to get employees to fully embrace is the implementation of a different phone system. Workers rely on their phones and communications tech to get things done, and introducing a new Unified Communications (UC) solution without stalling regular business operations can be a challenge.

Here are some steps employers can take to help their employees embrace new UC tech without much hesitation.

Read more...
Fortinet Webinar:
STRONG ON THE INSIDE: The Growing Need for Internal Segmentation Firewalls
Tuesday, March 15th | 11am CST
Fortinet Logo Cloud applications and BYOD have brought new functionality to enterprise networks-and unfortunately, also new security weaknesses and opportunities for cyber espionage. Theft of intellectual property and proprietary data now amounts to billions of dollars in losses each year.
Register now for this webcast with lead analyst firm Gartner that explores how Internal Segmentation Firewalls (ISFW) close a major security gap for businesses of all sizes.
  • Learn about the growing pervasiveness of targeted attacks worldwide, with current data that shows how a single malicious breach can cripple a company
  • Understand how ISFWs differ from traditional firewalls-and why they can uniquely reduce the attack surface, contain internal threats, and minimize damages after a breach occurs
  • Find out why multi-gigabit performance is critical to an ISFW's ability to provide deep visibility without slowing down the network
Don't miss the "Strong on the Inside: The Growing Need for Internal Segmentation Firewalls" webcast, featuring leading experts from Gartner and Fortinet as they discuss the latest in internal network security for today's threat landscape.

More information and REGISTRATION 

Axcient: Cost of Downtime Caluculator
Click the Image to Use the Downtime Calculator from Axcient


Why CIOs to be Proactive Not Reactive to Cybersecurity Threats
Kenneth Corbin -  from CIO.com| March 1, 2016
Security executives urge firms not to lose focus on prevention. They advise developing a holistic plan for IT and business units to fight cybersecurity together.

The greatest cyberthreat might not be a massively destabilizing attack that takes out the electrical grid or some other piece of critical infrastructure. Instead, the most significant risk could come from the accumulated damage of a constant barrage of attacks that shake the collective confidence in the Internet as a platform.

So argues Rick Howard, chief security officer at Palo Alto Networks.
"I really think that we are on the verge of having this affect our way of life," Howard said during a recent event hosted by Federal News Radio.

Security challenge isn't a cyber Pearl Harbor

"We've got so accustomed to using the Internet to manage ourselves -- our communicating with our family and our friends, communicating with our business operations and all that kind of stuff. And what we're seeing is a thousand cuts, death by a thousand cuts," Howard said. "We're not seeing this giant thing that we used to all think about 15 years ago -- [that] we're going to have a cyber Pearl Harbor. That's not what's happening. What we're seeing is a lot of little slices, that it's slowly eroding our confidence in the digital space. And if we get to the spot where we can't trust that environment anymore, then where are we as a society?"