Call Us: 703-715-4930
Get Informed About IT

Network Alliance Blog

June 3, 2015

If you’ve been following our security series, hopefully, you’ve taken steps to incorporate your team into your security policies and set up protections against malware such as firewalls and virus-protection. Maybe you’ve even hired a white-hat hacker to see how strong your security really is.

Even after taking these steps, you’ll still need to constantly improve your security approach. Remem...

June 3, 2015

Ever gotten an email from a long-lost friend with a message telling you, “Hey, you’ve got to see this!” and a link or an attachment to download? It’s great to hear from the friend, right? Well, maybe not. This could actually be an attempt by a hacker to trick you into loading malware, malicious software designed to access your computer, disrupt operation or steal information.

Clicking on the link or opening the attachment could let in a virus, malware that is self-replicating. It copies itself to any files it can and attempts to jump hosts, moving from computer to computer. If it’s a “worm,” you don’t even need to take action fo...

June 3, 2015

As you structure your business and IT operations to keep your data and computer systems secure, learn how to protect yourself from hackers and consider ways you can use their skills to your advantage.

As we covered in previous blog posts, you can increase network security with technology solutions such as firewalls, virus protection and data backup, and you can train your workforce to maintain high levels of security around data protection.  

Today we’ll cover one of the more unique ways you can make sure your security is hacker-proof – by actually hiring a hacker!

But first, here’s a little cheat sheet...

June 3, 2015

People are consistently the weakest link in data protection.

The two most common ways someone can obtain your personal or business information without your permission are by:

  • Gaining physical access to a computer and/or servers
  • Accidental disclosure by employees

Of the 268 data breaches the United States government faced between 2009 and 2012, over 2/3 were caused by loss of a device or records or negligent disclosure of information.

It’s essential th...

June 3, 2015



Data breach.

Identity theft.

These aren’t words people like hearing, and for good reason. Few things are as nerve-wracking as the prospect of losing your data due to a malicious cyber attack. Worse, what if your data were stolen and used for another’s gain?

Anyone can be a target of a security breach.  Personal computer breaches cause havoc for individuals, but motivated hackers cause widespread damage when they successfully target organizations. They can shut down computer systems or gain access to millions of records

Just last month, a cyber a...

June 3, 2015

The difference in email systems can make the difference for your business.
“I swear I sent you that...”
“Oh, sorry, I don't have his contact information here. I think it's on my home computer.”
“Can you send me that again? I guess I deleted it.”

Does any of this sound familiar? If you aren’t using an email system that syncs between your devices, it probably does.
When selecting an email system, you need to take a number of factors into account. Remember, not all systems are created equally. These systems, or “protocols,” retrieve email from your email servers and allow you to interact with messages in different ways. The three most common proto...

June 3, 2015

In IT, it’s not a matter of if things will go wrong; it’s a matter of when they will go wrong. Huge numbers of Google users found themselves in limbo today after an apparent outage of the popular Google Apps platform. This is on the back of a major outage of American Airlines’ reservation platform that grounded a number of flights across the country yesterday.

Neither of these situations should be particularly damning of either company. Outages happen. What these disruptions prove is that no one is immune to issues with their compu...

February 6, 2013

Internet phone service has changed so much over the past few years that many business owners aren't sure how to separate truth from fiction.  Ben Martin, VP of Client Support, tackles the most common misperceptions of the pros and cons of business VoIP.

Ben MartinBen Martin, VP of Client Support

Voice over IP, where telephone calls travel over the Internet, rather than the phone company's network, has already achieved wide acceptance for personal use. Since launching the...

January 16, 2013

Clients come to Network Alliance customer Pathwise Partners for help with communications strategy, leadership development, and executive coaching.  And, they have high expectations.

Like many small business owners, CEO Nancy Eberhardt needs to offer her clients the personal service of a small company, but operate seamlessly like a larger company.  Sound familiar?

In a recent interview, she shared with Network Alliance her challenges:

    •    Make her clients believe she had the same, cutting edge infrastructure that they do

November 7, 2012

One important lesson we all learned in the past week is that emergency preparedness pays off.  As you review your business continuity plans, here is a short IT checklist to help ensure that your business remains up and running during the next storm:


  • Data, files and documents are stored in a highly secure data center, preferably Tier 4 - the most stringent level
  • Data and files are continuously backed up, not just every night or every week
  • Files are accessible from any location on any device (PC, Smartphone, Tablet)
  • Multiple offices in different geographic locations have access to the same data and files


Drupal 7 Appliance - Powered by TurnKey Linux