Call Us: 703-715-4930

Get Informed About IT

Network Alliance Blog

June 3, 2015

By Lourdes Ashamalla, Vice President of Service Assurance

I’ll be honest. When Microsoft first announced the launch of its newest operating system, Windows 8, I was skeptical. I mean, I have LOVED Windows 7 since I first had a chance to play around with it.

On the surface,  Windows 7 perfected an operating system that had been relatively unchanged in almost 15 years. So, I thought, why mess with success? Would I lose any functionality?  Would I have to relearn everything?

Rumors of Windows 8’s functionality and features only became more extreme as the launch date approached....

June 3, 2015

“Cloud” has become a buzzword that can mean different things to different people. In this video we’ve boiled down the concept of cloud computing to a straightforward explanation that takes away the mystery.
The cloud is like having a virtual PC to store all your important assets.  Where are they? In a secure data center – or distributed across multiple data centers. You can access them from any device that connects to the Internet and never worry about losing them.  The cloud takes the burden of managing IT infrastructure off you, so you can focus on your business.
Watch the video and learn how the cloud works.


June 3, 2015

If you’ve been following our security series, hopefully, you’ve taken steps to incorporate your team into your security policies and set up protections against malware such as firewalls and virus-protection. Maybe you’ve even hired a white-hat hacker to see how strong your security really is.

Even after taking these steps, you’ll still need to constantly improve your security approach. Remem...

June 3, 2015

Ever gotten an email from a long-lost friend with a message telling you, “Hey, you’ve got to see this!” and a link or an attachment to download? It’s great to hear from the friend, right? Well, maybe not. This could actually be an attempt by a hacker to trick you into loading malware, malicious software designed to access your computer, disrupt operation or steal information.

Clicking on the link or opening the attachment could let in a virus, malware that is self-replicating. It copies itself to any files it can and attempts to jump hosts, moving from computer to computer. If it’s a “worm,” you don’t even need to take action fo...

June 3, 2015

As you structure your business and IT operations to keep your data and computer systems secure, learn how to protect yourself from hackers and consider ways you can use their skills to your advantage.

As we covered in previous blog posts, you can increase network security with technology solutions such as firewalls, virus protection and data backup, and you can train your workforce to maintain high levels of security around data protection.  

Today we’ll cover one of the more unique ways you can make sure your security is hacker-proof – by actually hiring a hacker!

But first, here’s a little cheat sheet...

June 3, 2015

People are consistently the weakest link in data protection.

The two most common ways someone can obtain your personal or business information without your permission are by:

  • Gaining physical access to a computer and/or servers
  • Accidental disclosure by employees

Of the 268 data breaches the United States government faced between 2009 and 2012, over 2/3 were caused by loss of a device or records or negligent disclosure of information.

It’s essential th...

June 3, 2015



Data breach.

Identity theft.

These aren’t words people like hearing, and for good reason. Few things are as nerve-wracking as the prospect of losing your data due to a malicious cyber attack. Worse, what if your data were stolen and used for another’s gain?

Anyone can be a target of a security breach.  Personal computer breaches cause havoc for individuals, but motivated hackers cause widespread damage when they successfully target organizations. They can shut down computer systems or gain access to millions of records

Just last month, a cyber a...

June 3, 2015

The difference in email systems can make the difference for your business.
“I swear I sent you that...”
“Oh, sorry, I don't have his contact information here. I think it's on my home computer.”
“Can you send me that again? I guess I deleted it.”

Does any of this sound familiar? If you aren’t using an email system that syncs between your devices, it probably does.
When selecting an email system, you need to take a number of factors into account. Remember, not all systems are created equally. These systems, or “protocols,” retrieve email from your email servers and allow you to interact with messages in different ways. The three most common proto...

June 3, 2015

In IT, it’s not a matter of if things will go wrong; it’s a matter of when they will go wrong. Huge numbers of Google users found themselves in limbo today after an apparent outage of the popular Google Apps platform. This is on the back of a major outage of American Airlines’ reservation platform that grounded a number of flights across the country yesterday.

Neither of these situations should be particularly damning of either company. Outages happen. What these disruptions prove is that no one is immune to issues with their compu...

February 6, 2013

Internet phone service has changed so much over the past few years that many business owners aren't sure how to separate truth from fiction.  Ben Martin, VP of Client Support, tackles the most common misperceptions of the pros and cons of business VoIP.

Ben MartinBen Martin, VP of Client Support

Voice over IP, where telephone calls travel over the Internet, rather than the phone company's network, has already achieved wide acceptance for personal use. Since launching the...



 3CX Partner      Cisco Partner






Drupal 7 Appliance - Powered by TurnKey Linux