Category - Uncategorized


Go Phish

Phishing and spear phishing continue to be lucrative enterprises for hackers. An effective strategy to prevent these attacks is a layered security approach with technical layers like hardened firewall configurations, anti-virus software, and email and web content filtering solutions. Fortunately, legitimate technology developers and support organizations are continuing to develop great technology tools to help …


Why Investing in Your Users Pays Dividends

Information Technology professionals have long heard the expression that the “best way to secure a computer is to pull the plug.” Barring the benefits to your electric bill, let’s face it – that is not a practical solution. Computer viruses, which pose the biggest challenge with information security, have been around for a long time. …


Is Your IT Partner a Passive Player or a Proactive Leader?

Several years ago, after providing a check to a merchant for a service I received, the clerk handed the check back to me attached to my receipt. It was marked ‘void.’ During a subsequent conversation with my banker, he explained the process, mentioned that check scanning was available through them and asked if I was …


Buyer Beware: There is no universal standard for the “Managed Service Program”

In our industry, ad-hoc network support services have become obsolete in favor of a more pro-active, managed approach to network support and security. This evolution occurred due to the growing frequency and increasingly sophisticated attacks to our data networks. Many organizations are now offering “managed service programs” (MSPs). Unfortunately, if you’ve seen one managed service …


Automating Processes. Securing Data.

“Tastes great! Less filling!” That 1987 advertising campaign condensed the advantages of Miller Lite beer down to four short words. If I had to choose just four words to define the advantages of Information Technology (IT), I’d say “Automating Processes. Securing Data.” With all of the talk about hacking and data breaches, data security is …


Business Outsourcing: Hurting or Helping Business Growth?

In the October 6-12, 2017 issue of the Providence Business News, Eli Sherman wrote a well-researched piece on outsourcing titled “Outsourcing helps keep businesses competitive, but is it hurting job growth?” Let’s explore that question. A business has two options when it comes to staffing its company: either hire the talent with W-2 employees or contract with a firm that …


Breach Fatigue Or a Call to Action?

Here we go again, another major breach of private data. This time possibly impacting 40% of the people in the US. Someone, or perhaps several someones, may now have my name, Social Security number, birth date, address, credit card numbers and possibly my driver’s license number; and yours too. What to do now? The first …


Can You Really Afford Not to Have a Backup Plan?

According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business continuity plan. If you are one of them, then you really need to think about whether you …


Reflecting on fourteen years of IT solutions and services

You hear it all the time: ”where did the time go?” or “it seems like only yesterday…”. Lately, I can truly relate to those sentiments. Fourteen years ago, on August 12, 2003, Dan Charland, Peter Nelson and I decided to start NetCenergy. Following several months of careful excogitating, we took a quick trip to the …


It takes a community to secure your company’s data

Back in the day, IT security was the job of a computer tech. Whether that resource worked directly for your company or was an outsourced person, one thing was for certain; it was not each users’ job. It is evident today, based on almost daily news stories, that data security is being breached with regularity. …

Page 1 of 2