2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube

Jan 2017
In This Issue
NPS Update
Trivia
Ask the Expert
Avaya ENGAGE 2017
Mitel Blog
Fortinet Blog
Axcient Blog
Conferencing
7 Tips for Better Security
Quick Links to CCC...
Solutions
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  

VMware 

NPS® Update
NPS
 NPS Score: 77%
Surveys Completed:4072

Click here to learn more about Net Promoter Score. 
Trivia
Trivia
 
TRIVIA ANSWER:

In 1976, this band had the #1 hit song "Afternoon Delight."

ANSWER:
Starland Vocal Band

WINNERS:
Ann Lehman
_________________ 
   
NEW TRIVIA

What British performer makes a cameo appearance at the beginning of the Dire Straits' song "Money for Nothing?"
Ask the Expert:
What's New with Microsoft Windows Server 2016?
Robert Rummel - ConvergeSecure® Engineer
Microsoft launched 2016 under the Windows NT family of OS, Windows Server 2016 and works best with Windows 10 version and above. The 2016 version has introduced many new ideas and alterations that only add on to the functionality of your system. Here are some of the changes in the Windows Server 2016.

Register TODAY and Save $200 for Avaya ENGAGE 2017
Technology moves pretty fast - and the business communications world is no exception. What are you doing to keep your company's systems up to date?

Avaya ENGAGE 2017 has everything you need to keep up with the pace of innovation and change - bringing the top Avaya users, speakers and experts all together under one roof this February. This is the perfect opportunity to learn from peers and industry leaders, as well as develop valuable connections that last a lifetime. You can't wait any longer: The early-bird registration deadline - January 12 - is one week away! Don't miss out on the opportunity to save up to $200 on your registration.

Register Now

Mitel Blog:
7 Things to Consider Before Moving to a Cloud-Based Contact Center
Despite the benefits, shifting customer service operations to a cloud-based model requires careful planning to ensure the move provides the agility needed to meet the customer service expectations of current and future customers. There are seven key points you should consider before you start your transition process.
Fortinet Blog:
A Guide to Security for Today's Cloud Environment
Bill McGee | Fortinet | January 3, 2017
Fortinet Logo
Enterprises have rapidly incorporated cloud computing over the last decade, and that trend only seems to be accelerating. Private cloud infrastructure, including virtualization and software-defined networking (SDN), is in the process of transforming on-premise data centers, which host the majority of enterprise server workloads around the world. Enterprises are also embracing public clouds at an unprecedented rate, with most connecting back to on-premise environments to create a true hybrid cloud environment. For all their advantages, these accelerated infrastructural changes also raise major concerns about security, and the ability to protect end-users and sensitive data from ever-evolving cyber threats.

As today's enterprise data centers evolve from static internal environments to a mix of private, public, and hybrid clouds, organizations need to augment traditional firewalls and security appliances (deployed for north-south traffic at the network edge) with expanded protection for east-west traffic moving laterally across the network, both within internal networks and across clouds.

To maintain a strong security posture in private, public, and hybrid clouds, organizations need to increase and perhaps even reallocate security to keep pace with these more dynamic, distributed, and fast-paced environments. Here are some specific areas to consider:

Axcient Blog:
Will "Ransomeware-as-a-Service" Platforms Put More Businesses at Risk in 2017?
Mike D. | Axcient | January 3, 2017
Ransomware is a problem that doesn't seem to be going away any time soon - and it looks as though cyber attackers' newest platform for digital crime, "ransomware-as-a-service", might make the problem even worse.

In 2016 alone, tens of thousands of people were hit with some form of ransomware or malware attack - from large tech companies to regional hospitals to individuals.  Ransomware is a form of digital extortion that encrypts its victim's files and offers up the decryption key in exchange for payment. The following image shows a sample ransom note that a user infected with the ransomware virus Cryptolocker will receive.

Communication, it's KEY

Do you have a need for a conferencing tool? StartMeeting is a collaborative communications solution serving a range of businesses, individuals, communities and organizations around the world.
 
StartMeeting's audio and web conferencing services include a suite of professional tools designed for screen sharing and standard conferencing. This service combines desktop sharing with integrated audio conferencing that may be utilized at the same time or individually. StartMeeting is a great opportunity for web conferencing, webinars, online meetings, online presentations, quarterly meetings, and distance learning.

For more information, contact for your CCC Technologies' Representative or call 847.427.2333.
7 Tips for Better Security Awareness Training Sessions
Ryan Francis, CSO| January 5, 2017
Boring training sessions?
  
At their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful opportunities to raise security issues and lay the groundwork for better habits.

How do you steer your own training sessions closer to the latter?  Barkly lists seven straightforward tips that can help.

Read more...