Search
Call Us: 703-715-4930
Get Informed About IT

Network Alliance Blog

September 13, 2016

We’ve already discussed the dangers of phishing and email spoofing, but whaling is picking up steam. On the surface, whaling is simply a more concentrated form of phishing—scammers reach out to high-ranking executives or human resources departments to steal private information. Whaling equals hunting for “big fish” (i.e., those with the most valuable information).

The FBI says...

September 12, 2016

Network Alliance, Inc. (Network Alliance), a leading IT management solutions provider, announces the 10-year work anniversary of Lourdes Ashamalla, Vice President of Quality and Service Assurance. In her current role, Lourdes is a top company leader, responsible for the development, management, and maintenance of client relationships.

...

September 9, 2016

 

We put the Spotlight on Byron Patrick, Network Alliance's Managing Director, CPA Practice, and asked him a few grueling questions to get to know him better. Here are the questions and his responses.

Q: What technical tip might be helpful to Network Alliance users?

...

September 1, 2016

 

Erik Skipper is our newest tier one team member who will be taking the fast track to tier 2 and assisting with client implementations. We are excited to have him on board!

Q: What technical tip might be helpful to Network Alliance users?

...

August 30, 2016

Your Microsoft Outlook opens, but it’s painfully slow. Your deep sighs, clinched fists, and trip to get a cup of coffee do nothing to persuade the app to load faster. Then you see the first message in your inbox—“Your Mailbox is Almost Full.” For the tenth day in a row, you ignore it and get to work because you think you just don’t have the time. There’s a simple solution to this age-old problem…archive your old emails!

We promise, it’s not hard! Mailbox size limits keep growing, but if you push it too far for too long, you could...

August 23, 2016

You read our first Snapchat post, right? You heard your son or daughter mention it, saw a fluff piece on the news, and then stumbled upon our post. Now that you know what Snapchat is, let’s share some tips on how to make it work for your business.

You’re not CNN, McDonalds, or ESPN, so the “Stories” section of Snapchat is basically off limits. Unless, of course, you have...

August 16, 2016

We’ve talked about Intrusion Protection Systems (IPS) and Intrusion Detection Systems (IDS) and why each is important. Now, we’re going to make the case for why you need both systems to provide maximum security for your network.

IPS is your fort—protecting you from the wide open world of the internet, malicious hackers, and viruses. IDS is your gua...

August 12, 2016

Thousands stranded. Endless lines. Days, maybe weeks of turmoil. Around 3:00 AM on August 8, 2016, Delta Airlines learned the hard way that IT happens. Early reports indicated the technology meltdown was triggered by a power outage. More likely, it was a domino effect when a power control module malfunctioned. A surge cut off power to the main network and the backup system didn’t kick in. With no backup systems in place, their computer systems crashed h...

August 9, 2016

Every year the American Institute of CPAs presents the EDGE conference, focused on the next generation of CPA leaders in the accounting industry. Many of the participants are present or future graduates of the AICPA Leadership Academy.

This year’s conference was held at the Las Vegas Red Rock Hotel and Casino, August 3-5.  There was a wide variety of top...

August 2, 2016

Last time, we covered how Intrusion Prevention Systems (IPS) sit between your devices and the outside network and use a series of rules to keep malicious traffic from coming in and going out. Having a wall to hide behind is great, but even the best wall can be breached. How will you know? An Intrusion Detection System (IDS) is the answer.

An IDS is a “device or software application that monitors network or system activities for malicious activities or policy v...

 
Drupal 7 Appliance - Powered by TurnKey Linux