Industry Insights

Protect Your Perimeter with Palo Alto Firewall Training

Posted by Susan Sison on Jun 18, 2015 11:42:00 AM

 

For most enterprises, the firewall is the fundamental building block of their network security. Firewalls are nominally used to provide perimeter security, examining network traffic as it flows into and out of your network, and allowing or denying that traffic based on rules that you determine.

firewall

Moving? Consolidating Your Phone Lines Doesn't Have To Be Hard. Read These 6 Tips

Posted by Jeff Hussey on Jun 1, 2015 7:00:00 PM

For IT groups, moving locations, whether it's a single office or a campus, can be a stressful time. There are a million details to coordinate, and the business is looking to you to make sure that business will continue throughout the move. If the move happens successfully, you're a hero who guided your company through a difficult challenge. If it fails, the business loses money non-stop while you and your team work frantically to bring communications back on line.

2 careers nca

Simplifying your network architecture for security

Posted by Susan Sison on Jul 16, 2015 4:00:00 PM

Many times, when NCA is consulting with our clients, we come across the same kind of thinking, which is to segment different areas of IT into their own teams, that support different applications and areas of architecture. It's called 'siloing', and almost all IT organizations fall into that particular approach.

securityarchitecture

Need employees to be mobile?

Posted by Susan Sison on June, 2016 7:49:00 AM

These days, you need employees to be mobile if you plan to maintain a competitive edge. No matter where they are worldwide, decision-makers must be empowered with the latest tools and information. Unfortunately, many legacy phone systems aren’t designed for the challenges of a global enterprise where downtime can have serious consequences.

UC Flex Hosted Voice

Limited to no IT staff to implement or maintain a phone system?

Posted by Susan Sison on Jun 13, 2016 7:50:00 AM


Want better technology, but have limited to no IT staff to implement or maintain a phone system?

phonesystem

As enterprises grow, their communication needs naturally evolve. If your technology doesn’t maintain the same pace, you could face serious efficiency problems. If dropped calls, lost messages, and other issues plague your communication, it’ll be that much more difficult for teams to “get the job done” – whether they’re across the hall or around the world.

At NCA, we understand enterprises want to take advantage of the latest technology, but may not have a lot of internal expertise. If you have limited to no IT staff to implement or maintain a phone system, it doesn’t mean you have to make do with legacy solutions. You need a unified communication approach that will meet your business needs.

3 Ways Hosted Voice Can Benefit Your Business

Posted by Susan Sison on Oct 12, 2015 9:36:00 AM

 deskphone

The benefits of hosted voice are perfect for smaller businesses, but even large businesses are making the switch. If you’re still undecided, here are three of the benefits of hosted voice that may spur you towards making the switch.

Cloud Entry: migrating applications such as email, back-up and storage as cloud entry points

Posted by Jeff Hussey on Jun 16, 2015 8:35:00 AM

Measured Steps: Tips for a Successful Cloud Migration

It is pretty easy to get caught up in the hype around moving to cloud - and if you don't get caught up in it, it's likely that your senior management will. With all of the articles and blog posts out there, it would seem that everyone is feverishly moving their entire infrastructure into the cloud as quickly as possible.

clougmigration

Cloud-based security: leveraging cloud service for device management and incident response

Posted by Jeff Hussey on Jun 9, 2015 8:30:00 AM

Is Cloud-Based Security the End-Game for the Modern Enterprise?

It's hard to think of an issue for corporate IT teams that has grabbed as much attention, and created as much concern, as security. And unlike other technologies that grab a lot of headlines, security has real drivers behind it. It doesn't take any effort at all to see the effects of compromised IT security, and the attacks that make the headlines are big - really big.

img Manged services

Firewall SSL Decryption is important for todays threats

Posted by Susan Sison on Jul 21,2015 7:00 PM

Detect Threats with SSL Decryption

In the world of data networking, encryption is a critical technology that is used to facilitate everything from private communications between people to secure transactions with financial institutions. Encryption is one of the primary ways that people and groups make their communications secure, and therefore private. Without the ability to encrypt communications, everything from your social media posts to your online banking is available and readable by anyone.


Network Computing Architects SSL

7 Things Your Mom Should Have Taught You About Cloud-based Backup and Disaster Recovery

Posted by Jeff Hussey on May 19, 2015 2:00:00 PM


Ahh, mom. She took care of you as a kid, she baked you cookies, and she drove you to Little League games. But did you know she was also an expert on cloud-based disaster recovery?

Cloud back up
All kidding aside, if your company is looking to utilize the cloud for disaster recovery (DR), you're not alone. The cloud is well suited for a number of DR applications and uses, including data storage and VM replication, among other things.

It is the ERA of Big Data Security Analytics

Posted by Susan Sison on Dec 29, 2014 11:53:00 AM

 

It's common, when analyzing data points and traffic for security-related insights, for the average enterprise to experience millions of data points a day. That's right - millions of data points a day, and that's just for an average-sized enterprise. Larger organizations collect much more data than that, and even small organizations collect a dizzying array of data in the course of a single day. The amount of data is staggering, and well more than any person, or team of people, can possibly collect, interpret and correlate all within the course of a single day.

Bid Data

9 pm! Do you know where your data is? 3 ways NCA can audit your inside threats.

Posted by Susan Sison on Nov 2, 2015 7:10:39 AM

It may be 9 p.m. for you, but thousands of people will access your data all throughout the night. Outside agents aren’t the only risks: Some of the worst attacks in computing history have been perpetrated by insiders. No one, no matter how skilled, can be on guard 24 hours a day: To maintain access control in a world of ever-increasing threats, proactive techniques are vital.

insiderthreats

What is ISO 27001?

Posted by Susan Sison on Jul 30, 2015 8:00:00 AM

BSI Assurance Mark ISO 27001 KEYB

 (source oecd.org)

The ISO 27001 standard was published in October 2005, essentially replacing the old BS7799-2 standard. It is the specification for an ISMS, an Information Security Management System. BS7799 itself was a long standing standard, first published in the nineties as a code of practice. As this matured, a second part emerged to cover management systems. It is this against which certification is granted. Today in excess of a thousand certificates are in place, across the world.

Detect and Respond to Security Incidents

Posted by Susan Sison on May 8, 2015 9:36:39 AM

Hacking stopped being an amateur activity a long time ago. Today, hacking is done for money, by professional organizations with significant expertise and resources. Today's cybercrime is big business, and business is good.

SecurityIncidents

8 Tips for Upgrading from T1 to Ethernet

Posted by Jeff Hussey on Apr 28, 2015 9:37:23 AM

As your enterprise grows, so does your need for bandwidth. And while that T-1 worked great when your company was really small, you're now finding that the circuit(s) that supported you then are no longer getting the job done.

T toEthernet

ISO 27001 Services

Posted by Susan Sison on Dec 29, 2015 6:00:00 AM

ISO 27001 provides standards for end-to-end security management, helping enterprises identify and protect sensitive information resources. Adhering to ISO 27001’s strict standards helps your brand distinguish itself as a leader in information security best practices, allowing customers to rest easy when they provide sensitive financial, health, or employment information.

ISO27001Services

Finding your Perfect Carrier & IP Services Provider

Posted by Jeff Hussey on Apr 24, 2015 1:10:00 PM

For most enterprises, wading through the massive array of vendors, solutions and outright fluff is a challenging and time-consuming task all by itself - not to mention the actual work of defining, designing and managing the technical solutions that your company uses to get business done.

At NCA, we get that. And we know how much effort it takes to keep control of even a modest enterprise. That's why our team of architects and project/program management professionals are specifically focused on tackling that workload, so that your team can focus on strategic, revenue-generating activities to support your business.

Carrier services

Keep Current with Compliance

Posted by Susan Sison on Apr 24, 2015 10:30:00 AM

 networkcompliance 1

One of the 'necessary evils' that virtually every corporate security team has to deal with is regulatory compliance. There are a range of compliance standards, and depending on the industry you do business in, and the type of corporation you are, chances are that you have to comply with one or more regulatory standards. Let's look at some of the more common standards out there, and discuss how NCA can help you maintain that compliance.

The True Cost of Downtime

Posted by Susan Sison on March 6, 2015 10:46:00 AM

The Custoner Story:blueclock

What Went Wrong 

The fact that my company is a relatively small one had us blueclockdoing a lot of self repair on our computers and we had one IT professional keeping track of our database system and shared files. Things went wrong due to the fact that we didn’t have any backup plans in case things went wrong. Our main hard drive on our database failed overnight when nobody was at the office to monitor or fix it. By the time we were aware of it the workday had already started. Aside from repairing the damaged hardware we had to restore our database from an old backup resulting in lost information and further editing. The end result was we lost days of work and company income due to hardware failure.

Work From Everywhere

Work From Everywhere

Posted by Susan Sison on Feb 29, 2016 8:49:00 AM

Every year, business professionals log thousands upon thousands of hours of international travel. In many cases, they are supporting multi-phase strategic projects that could define the direction of their enterprise for years to come. Wherever their journeys take them, however, it’s crucial to have full access to all the data and tools that come with their corporate network back at home.

nca ucflex hosted voice

Up until recently, corporate “road warriors” had to make due with whatever tools they could load onto their laptops. A number of apps appeared claiming to offer efficient synchronization with the home network, but there was a problem – using a dozen different apps, many of which were never intended to work together, meant inevitable gaps in your view of the big picture.

Tech Careers @NCA - Let's Talk!

Posted by Susan Sison on Feb 9, 2016 8:43:35 AM

people process careers

If you’re looking for an established, mid-sized enterprise with an entrepreneurial feel – a caring company where your contributions will be recognized and your voice heard – Network Computing Architects is the Bellevue area’s hottest choice for up-and-coming IT experts.

Intelligent Threat Analysis from NCA

Posted by Susan Sison on Apr 15, 2015 9:33:00 AM

Threat Analysis

It's pretty clear that, when you scan the headlines, that hackers have the edge over enterprise security. It is a sobering thought, and the data backs it up - even with all of the massive breaches to hit the news over the last several years, attacks continue to grow in frequency, size, and complexity.

Hosted Voice- Unified Communications as a Service (UCaaS)

Posted by Susan Sison Sept 21, 2015 3:53:00 AM

Hosted Voice- Unified Communications as a Service (UCaaS)

 Phone

Hosted Voice- Unified Communications as a Service (UCaaS): Phone Systems in the Cloud

These days, just about all of your business systems can exist exclusively in the cloud. Your phone systems are no different. They can exist purely as hosted voice- unified communications as a service (UCaaS). It’s a cost effective, practical, and efficient business solution. Here’s why.

Everything as a Service

To understand how a hosted voice– Unified Communications as a Service (UCaaS) – solution can benefit your business, you need to understand a little about how software as a service (SaaS) works.

The cloud can offer on demand access to just about any kind of software. Those things that required you to have specialized software, servers, and personnel, can exist as a service in the cloud.

This applies to all major services such as CRM, accounting, email, and even things like printing. In fact, so many different kinds of services are now hosted from the cloud that the term Saas has evolved to Xaas, or Everything as a Service.

Reduce Incident Response Time

Posted by Susan Sison on May 29, 2015 11:09:42 AM

 When attacks occur, we'd like to believe that the response to those incidents and breaches occurs instantaneously, or at most within a few minutes.

networksecurity

 

But the reality is, for most enterprises, that is far from the truth. In fact, according to industry data, the average response time for most incidents is measured in weeks, not minutes. And for some incidents, detection alone can take months. It's a sobering reality, but the data bears this out time and again - for most enterprises, the attacks come much more quickly than the detection and response to those attacks.

Creating a manageable IT budget with steady and predictable cost

Posted by Susan Sison on March 10, 2015 10:46:00 AM

Manage Your IT Budget With Steady and Predictable Flat Rate Pricing

FirewallsIT Budgets are notoriously hard to predict. Our systems and services need to be available 24/7 to enable our workforce to access critical information at any time. When our systems go down, our company grinds to a halt while we scramble to restore operations immediately. This crucial time period is stressful on our IT staff and typically results in our IT Expenses spiking in both labor and technology replacement costs.

Meet your business needs with NCA's scalable, secure NCA Cloud

Posted by Susan Sison on Dec 29, 2014 11:53:00 AM

 NCA Cloud

Meet your business needs with NCA's scalable, secure NCA Cloud.

In today's market, you have a lot of options to choose from when it comes to cloud services. There are a lot of providers out there, all promising the sky when it comes to flexibility, predictable costs, scalability and security.

NCA's cloud portal and support helps you to bypass all of the marketing terms and keywords, and focus on the cloud services that make a real difference to your enterprise. Join us for an informative webinar to learn all about NCA Cloud, powered by CenturyLink, the true enterprise cloud.

When: Wednesday, June 10, 2015

10:00 AM to 11:00 AM

REGISTRATION CLOSED

IT Matters: Let a Professional IT Managed Services Provider Prove It

Posted by Susan Sison on March 4, 2015 10:46:00 AM

business166IT duties seem to increase all the time. Sometimes, it’s because of the growth of the business. Other times, it’s simply that small IT tasks can compound and grow. Not every business has a full IT support staff. Even companies that have a full staff have to contend with overworked and busy IT personnel.

VoIP over Coax? Hold the Phone!

Posted by Jeff Hussey on Nov 17, 2015 7:00:00 AM

 VoIP is an efficient communications solution that has greatly replaced the traditional phones and WANs. To achieve high efficiency of the VoIP endpoints in your company, use VoIP Coax in the place of traditional WAN. This technology equipment will enable you to handle a lot of voice data all at once without any worry of overloading or your customers having a “busy” tone.

ethernetVoIP over Coax, especially when it is cloud hosted, will assist you to handle as many phone calls as possible. Furthermore, the number of calls you can handle simultaneously is solely determined by the number of lines that your phone supports. Therefore, VoIP Coax is a viable communications solution for you especially if you have a big organization handling many calls at the same time.

Healthcare Providers Cyber Security: Strategy on Assessing Gaps

Healthcare Providers Cyber Security: Strategy on Assessing Gaps

Posted by Gabe Dahlstrom on Jun 20, 2017 8:20:00 AM

webRTCWhen it comes to cyber security, healthcare institutions are among hackers’ biggest targets.

For years, online criminals have launched concerted, conventional attacks to infiltrate healthcare networks. Over the last 12 months, however, they’ve demonstrated the startling new capability to directly attack medical devices – even when they are in use with patients.

Since many medical devices use Windows operating systems, they may be subject to the exact same security vulnerabilities as other network devices and endpoints. At the same time, more hospitals and doctors’ offices are facing large-scale ransomware attacks.

As recently as May, a full-scale ransomware campaign struck the UK’s National Health Service.

Advanced ShoreTel System Administrator Training

Posted by Susan Sison on Dec 29, 2014 11:53:00 AM

Posted by Susan Sison on Mar 24, 2017 9:29:00 AM

img nca trainingThrough NCA Certified ShoreTel training, you’ll gain familiarity with all relevant services for your enterprise. This experiential, instructor-led course provides hands-on skills in all aspects of system evaluation, troubleshooting, and management.

Course Objectives

Students will gain a thorough backing in the full range of skills and tools, including:

Call Quality and Membership

ShoreTel call flow planning and management, workgroups, hunt groups, audio attendants, adding users and phones, using collaboration tools, voice switch phones and commands, access license types, and more.

Diagnostics and Monitoring

Maintaining ShoreTel Communicator, using CSIS and TAPI with Communicator, using Quick Look for diagnostics and monitoring, logging, event management and filtering, ShoreTel Director suite, IPDS server logs, processes and events, loss of connectivity, Client Application Server (CAS) monitoring, and using Wire Shark and other tools to quickly identify and resolve the most common performance issues.

Network Connectivity and Scalability

Server initialization and management, moving and upgrading servers and other hardware, monitoring telnet access and switch connectivity, remote packet capture for switching, switch call routing using LSP and DRS, switch command line interface (CLI) tools, telnetting for diagnostics and administration, IPBXctl and burn flash, hardware connectivity, using virtual machines, and dial pad commands for administrators.

IP Phones

IP phone troubleshooting with software and hardware tools, customizing the configurable features of each phone, programming buttons, recording calls, and more.

Target Audience

Network engineers, security engineers, and IT support staff.

Prerequisites

Students should understand networking fundamentals including routing, switching, and IP addressing, as well as basic port-based security. Additional experience with IP-based telephony, general networking, and security technologies such as IPS, proxies, or content filtering is a plus.

Here is the link for all NCA Training Classes Schedules>>

Managed Services: Shifting time away from tactical to strategic

Posted by Susan Sison on March 2, 2015 10:46:00 AM

tacticaltostrategicPlanning is an inevitable practice in a successful business, the business model you choose determines the level of success you will get. For a company to be more successful, tactical management is recommended. This kind of management revolves around long-term planning. The company creates a bigger picture of what they hope to achieve and set about implementing the plan until the business makes its ambitions. Tactical management, on the other hand, is more of short term planning. The company just plans on a short-term basis in accordance with the company’s current needs.

Strategic planning creates ambitions for the company as the model has clear objectives of what they expect eventually from the enterprise. The company using strategic planning is more visionary and stable and is less likely to crumble.

Need new features on your phone system to support your business such as collaboration?

Posted by Susan Sison on Dec 29, 2014 11:53:00 AM

Need new features on your phone system to support your business such as collaboration?

multi devices

It’s 2016. Are you still stuck with a phone system that does nothing for you but handle calls?

A modern, effective phone system offers much more than just calling and voicemail. Empowered with voice over IP technology, it offers a full suite of collaboration features – features that once took dozens of different software applications to achieve.

5 Strategies to Reduce Healthcare CFO Anxieties

Posted by Susan Sison on Oct 30, 2015 11:32:00 AM

The position of Healthcare CFO is one of the most complex and important professions in the entire industry. Advancements in technology has made healthcare far more efficient but also creates its own unique challenges. Cloud computing has started to see widespread use for servers, email software, and other business essential technologies. With landline phones becoming less common many organizations are moving their phone systems to the cloud as well. Network Computing Architects, Inc. (NCA) are experts in networking and telecommunications sector. Here is how NCA’s UCFlex Cloud UC can help make your job as CFO an easier one.

webRTC

Managed Network Security Solutions and Your Business

Posted by Susan Sison on March 9, 2015 10:46:00 AM

NetworkracksIf 2014 could be called anything, it might be called 'the year of the hacker'. Security threats and vulnerabilities are growing in scope and sophistication, and network security threats are among the most serious of all. From compromised banking networks to sophisticated attacks on SCADA systems, network security attacks have the potential to outpace the ability of administrators and security teams to keep up with them.

Virtual Reality: How to easily establish consistent communications with anyone, anywhere

Posted by Susan Sison on January 7, 2015 3:46:00 PM

Virtual Reality Phone communications carrier servicesWhen the London Business School hosted its annual Global Leadership Summit in June 2014, the school surveyed attendees about a variety of modern business issues and challenges. While the results of that survey covered a variety of topics, one of the really interesting findings was that respondents believed that half of their employees would be working remotely by 2020.

Think about that for a second. In just six years, 50% of your organization may be working from somewhere other than your business’ corporate or regional office. That figure may sound like a stretch, but a recent New York Times article revealed that telecommuting grew by 79% between 2005 and 2012 — and that number is expected to rise even more over the next decade.

So, what does this mean for the future of business?

For starters, it means that organizations must find ways to empower their employees to work effectively and efficiently from any location. Thankfully, cloud-based technology is making that a reality — allowing employees to access virtually any file, application, network, or communication service from any place with a secure Internet connection.

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

Ransomware Is Not a “Malware Problem” – It’s a Criminal Business Model

posted by: on May 10, 2016 5:00 AM

filed in: Threat Prevention, Unit 42
tagged:

Today Unit 42 published our latest paper on ransomware, which has quickly become one of the greatest cyberthreats facing organizations around the world. As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organizations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, individual home users – all are potential targets.

PCI DSS Explained: Our New White Paper Decodes the Complexity

PCI DSS Explained: Our New White Paper Decodes the Complexity

Posted: by Varonis, Feb 2015

 The Payment Card Industry Data Security Standard (PCI DSS) is not just another list of requirements for protecting data. In 2013, the number of credit and debit card transactions worldwide reached over 100 billion—that’s lots of swipes and 16-digit numbers entered! With its almost 300 controls, PCI DSS provides the rules of the road for protecting and securing credit card data for every bank, retailer, or ecommerce site.

But does the average IT security person who’s charged with implementing its security safeguards really understand this complex standard?

Likely not! And that’s why we came up with PCI DSS for IT Pros and Other Humans. Our white paper simplifies the 12 core controls and condenses them into three higher-level steps.

Why simplify? Our approach is based on the PCI’s Council’s own best practices advice, which puts monitoring, assessment, and mitigation at the center of a real-world data security program.

To find out why strictly following the DSS controls is just not enough, you’ll want to read our paper.

5 Steps to help you Love your Enterprise Carrier Provider

Posted by Jeff Hussey on May 5, 2015 9:38:00 AM loveyourcarrier

Chances are, whether you're a small business or work for a major multinational, that you've had to work with a telecommunications carrier. And if you've worked with a telecommunications carrier directly, chances are that you've had at least one frustrating experience.

The reality is, telecommunications companies are typically large, they work in an industry that's constantly changing, and their field is full of competitors that have different products and terminology, all of which often results in confusion and a certain amount of frustration.

Desktop as a Service/Virtual Desktop Infrastructure: Getting ahead of the curve and leveraging the true power of cloud services

Posted by Jeff Hussey on Jul 28, 2015 3:46:00 PM

Desktop as a Service/Virtual Desktop Infrastructure: The Cloud Comes to the Desktop

Virtualization and cloud services have made major inroads into the enterprise server market over the last few years, and the impact has been significant. According to estimates, approximately 92% of enterprises use virtualization and cloud services to some degree, mostly in the areas of server infrastructure and applications. To be sure, there's still quite a bit of room growth even now - while it's true that many organizations have implemented virtualization to some degree, that doesn't mean they've moved more than a small fraction of their environment to the cloud. That said, the enterprise shift to the cloud is clearly underway. managed desktop support

When Disaster Strikes: Looking to the Cloud for Business Continuity

Posted by Susan Sison on January 15, 2015 3:46:00 PMsecurenetwork

It’s a Monday afternoon. Calls are rolling in, there are countless voicemails to respond to, and business is humming along. Then, seemingly out of nowhere, Courtney the sales manager knocks on your door with a perplexed look on her face.

“Do you know what’s wrong with the phone system?” Courtney asks. “There’s no dial tone, no access to voicemail, and no calls coming in.”

Ah, yes — the feared phone system failure. Whether caused by a clumsy utility worker, a big storm, or some other unpredictable problem, phone system issues can create enormous headaches. In fact, if your company hasn’t implemented any kind of disaster or redundancy plan, those failures significantly disrupt business continuity and productivity.

New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer

posted by: and on March 6, 2016 11:30 AM
Unit 42, Palo Alto Networks

On March 4, we detected that the Transmission BitTorrent client installer for OS X was infected with ransomware, just a few hours after installers were initially posted. We have named this Ransomware “KeRanger.” The only previous ransomware for OS X we are aware of is FileCoder, discovered by Kaspersky Lab in 2014. As FileCoder was incomplete at the time of its discovery, we believe KeRanger is the first fully functional ransomware seen on the OS X platform.

Amplify Employee Communication

Posted by Susan Sison on January 12, 2015 3:46:00 PM

Amplify employee communication

Using email to conduct important business always starts with the best intentions – saving everyone time. Just think back to the last time you used email to solve a significant business issue or answer detailed questions from an important customer.

But sometimes email creates a disaster of miscommunication. Tone, intonation, and emotion get lost in translation. Messages and ideas are misunderstood. Nothing really gets accomplished.

So, what’s your obvious next step when email isn’t working? A meeting in person, or a quick conference call.

Seahawks win NFC Championship….NCA employees win a paid Holiday!

Seahawks win NFC Championship….NCA employees win a paid Holiday!

Posted by Kara Marsh on Jan 27, 2015 12:11:06 PM

KaraMarshNCA Seahawks fans around the region shake in exhilarated elation as their beloved team wins an unprecedented back-to-back NFC Championship game, in possibly one of the greatest comeback victories, ever! There were cheers and tears and a swelling pride that the Seattle Seahawks did it again!

With the certainty of the Seahawks playing in the Super Bowl - the buzz begins at Network Computing Architects, Inc. will CEO (and QB of NCA), Thomas Gobeille declare the day after the Super Bowl a NCA Paid Holiday as he has in year’s past?

Remote Control: How your phone system may be stifling remote employee productivity

Remote Control: How your phone system may be stifling remote employee productivity

 Posted by Susan Sison on Dec 15, 2014 12:36:24 PM

Imagine for a moment that you’re a sales manager at a growing company and you’ve just been tasked with building a remote team of 40 sales reps. Your company’s headquarters is in Boston, but these reps will primarily work out of their home offices and much of their time will be spent on the phone — either initiating conversations with prospective clients or engaging existing customers.

Mobile social

Metadata: What You May Have Missed

Metadata: What You May Have Missed

The Internet of Things: Advanced Threats Against Medical Devices

The Internet of Things: Advanced Threats Against Medical Devices
Author: Fran Howarth

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You

ShoreTel Mobility Pro Tips: 5 Things to Make Mobility Work Better for You
By: Clinton Fitch, Practice Manager of Advanced Applications - EMEA

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.

Check out our favorite free sysadmin tools that we use to help us work faster and be more awesome.
by Rob Sobers

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?

Technology nerds take over Hot Stove Society….is Tom Douglas in trouble?
by Kara Marsh

5 Things Privacy Experts Want You to Know About Wearables

5 Things Privacy Experts Want You to Know About Wearables
Posted by:

Metadata Era: What you may have missed

Metadata Era: What you may have missed
Posted by:

More Articles ...