Call Us: 703-715-4930
Get Informed About IT

Network Alliance Blog

June 3, 2015

A lot of people are concerned over Google’s decision to discontinue Postini services, and rightly so. For a (very) quick recap for those that don’t know, Postini is an email and Web security service that provides email encryption and spam and malware filtering. Google bought Postini in 2007 and announced in mid-2012 that it would be discontinued by the end of the year, with its users being rolled over into Google Apps. Postini has been largely successful but has apparently outlived its current form’s usefulness to Google.

Things to note:

  • If your organization is switching from Postini, ...
June 3, 2015

“We have to move to a new office.”

How near to the top of the “Things I’d rather not hear” list is that for you?

Already concerned with the typical questions of “Where,” “When,” and “How” of the move, team leaders must also worry whether or not their data (documents, files, emails, contacts, etc.) will find its way to the new location quickly enough to mitigate losses to productivity; it is, of course, impossible for team members to work without their resources. Moving equipment requires an IT professional (who can cost over $100 an hour to provide service), which many small to medium-sized organizations don’t have, and, even, if you do, any time you move equipment, it is in jeopardy of being lost,...

June 3, 2015

By Lourdes Ashamalla, Vice President of Service Assurance

I’ll be honest. When Microsoft first announced the launch of its newest operating system, Windows 8, I was skeptical. I mean, I have LOVED Windows 7 since I first had a chance to play around with it.

On the surface,  Windows 7 perfected an operating system that had been relatively unchanged in almost 15 years. So, I thought, why mess with success? Would I lose any functionality?  Would I have to relearn everything?

Rumors of Windows 8’s functionality and features only became more extreme as the launch date approached....

June 3, 2015

“Cloud” has become a buzzword that can mean different things to different people. In this video we’ve boiled down the concept of cloud computing to a straightforward explanation that takes away the mystery.
The cloud is like having a virtual PC to store all your important assets.  Where are they? In a secure data center – or distributed across multiple data centers. You can access them from any device that connects to the Internet and never worry about losing them.  The cloud takes the burden of managing IT infrastructure off you, so you can focus on your business.
Watch the video and learn how the cloud works.


June 3, 2015

If you’ve been following our security series, hopefully, you’ve taken steps to incorporate your team into your security policies and set up protections against malware such as firewalls and virus-protection. Maybe you’ve even hired a white-hat hacker to see how strong your security really is.

Even after taking these steps, you’ll still need to constantly improve your security approach. Remem...

June 3, 2015

Ever gotten an email from a long-lost friend with a message telling you, “Hey, you’ve got to see this!” and a link or an attachment to download? It’s great to hear from the friend, right? Well, maybe not. This could actually be an attempt by a hacker to trick you into loading malware, malicious software designed to access your computer, disrupt operation or steal information.

Clicking on the link or opening the attachment could let in a virus, malware that is self-replicating. It copies itself to any files it can and attempts to jump hosts, moving from computer to computer. If it’s a “worm,” you don’t even need to take action fo...

June 3, 2015

As you structure your business and IT operations to keep your data and computer systems secure, learn how to protect yourself from hackers and consider ways you can use their skills to your advantage.

As we covered in previous blog posts, you can increase network security with technology solutions such as firewalls, virus protection and data backup, and you can train your workforce to maintain high levels of security around data protection.  

Today we’ll cover one of the more unique ways you can make sure your security is hacker-proof – by actually hiring a hacker!

But first, here’s a little cheat sheet...

June 3, 2015

People are consistently the weakest link in data protection.

The two most common ways someone can obtain your personal or business information without your permission are by:

  • Gaining physical access to a computer and/or servers
  • Accidental disclosure by employees

Of the 268 data breaches the United States government faced between 2009 and 2012, over 2/3 were caused by loss of a device or records or negligent disclosure of information.

It’s essential th...

June 3, 2015



Data breach.

Identity theft.

These aren’t words people like hearing, and for good reason. Few things are as nerve-wracking as the prospect of losing your data due to a malicious cyber attack. Worse, what if your data were stolen and used for another’s gain?

Anyone can be a target of a security breach.  Personal computer breaches cause havoc for individuals, but motivated hackers cause widespread damage when they successfully target organizations. They can shut down computer systems or gain access to millions of records

Just last month, a cyber a...

June 3, 2015

The difference in email systems can make the difference for your business.
“I swear I sent you that...”
“Oh, sorry, I don't have his contact information here. I think it's on my home computer.”
“Can you send me that again? I guess I deleted it.”

Does any of this sound familiar? If you aren’t using an email system that syncs between your devices, it probably does.
When selecting an email system, you need to take a number of factors into account. Remember, not all systems are created equally. These systems, or “protocols,” retrieve email from your email servers and allow you to interact with messages in different ways. The three most common proto...

Drupal 7 Appliance - Powered by TurnKey Linux