Industry Insights

Press Release: May 1, 2019 ISSQ Acquires Network Computing Architects Inc. (NCA)

Press Release: May 1st, 2019- ISSQUARED Inc. Acquires Network Computing Architects, Inc.

Expands West Coast Presence and adds more Networking, Security & Carrier Solutions

LOS ANGELES: ISSQUARED Inc., a global provider of Information Technology (IT) security, hybrid cloud infrastructure, networking and software solutions, today announced the completion of its acquisition of Network Computing Architects, Inc. (NCA). This expands ISSQUARED’s reach with local offices in Washington, Oregon, Texas, Arizona, and California, serving more than 1,000 enterprises and small to mid-sized businesses globally.

NCA, Inc. has entered into a merger with ISSQUARED, INC. (ISSQ)

Written by Tom Gobeille, May 1, 2019

issquared logo registered

Dear Valued Clients and Colleagues:

I am very pleased to announce today that after 27 years of business, and with many stories to tell, NCA, Inc. has entered into a merger with ISSQUARED, INC. (ISSQ), a company based in Westlake Village, California.

In order to expand the business that we have developed over the years, we set out to join forces with a company that would benefit from our geography, our people, our systems and our platforms. We found that with ISSQ.

The Future of Security Is Already Here

Written by Steven Francis on April 3, 2019 11:56:00 AM
Future Borderless networks

This blog is intended to share new ideas, insight and possibilities. This is not about what we already know. We know there is a rise in security threats and attacks. This is not about re-reporting the news we can read for ourselves. This is not about using scare tactics and endless statistics about security attacks. There is plenty of that to go around. The aim of this piece is to come away with ideas and insights for your business and what’s possible in the new era of security.

Four things you don’t know about cybersecurity

Posted by Don Rudolph on March 20, 2019 2:56:00 PM
NCA Four things you dont know about cybersecurity

1.  Secure companies get more sales
Customers are getting more sophisticated every day. If you are handling or transporting their private or sensitive information such as payment information, personal information, payroll information, documents, intellectual property, health care information or any type of sensitive data, they want assurances that you can be trusted. If your business cannot credibly respond to information security questionnaires, you will lose business to your competitors that can.

Let’s Talk about SD-WAN for Critical Network Redundancy

Posted by Jeff Hussey on Jan 14, 2019 3:56:00 PM

Enterprises have long relied on major carriers to maintain and optimize data networks spanning long distances. These traditional Wide Area Networks (WANs) have met most needs in the past, but are not ideal for today’s cloud-driven SaaS software landscape.

Likewise, conventional approaches to WAN architecture can leave small and mid-sized enterprises in the lurch whenever major carriers experience problems. Technical issues SMB clients have no control over can hamstring their operations for days at a time.

Data Breaches Costs and Impacts

Posted by Susan Sison on October 2, 2018 10:30:00 AM

 data breach

Every year, thousands of high-profile attacks are launched against enterprises of all sizes in the United States. Counting those driven by automated malware, there are millions of attempted network breaches each and every year.

Over the last decade, the frequency, size, quantity, and acceleration of attacks have continued to grow far beyond what was imaginable only a short time ago. Hackers now have countless targets to choose from: Credit card data, corporate credentials, and Social Security information, among others.

Baseline Cybersecurity Requirements for Federal Contractors

Posted by Susan Sison Oct 3, 2018 3:53:00 AM

information security standards

Federal contractors are held to extremely high information security standards. With the recent introduction of new “Basic Safeguarding” standards for contractor information systems, many firms will find their contracts with the federal government terminated unless they can verify compliance.

Preventing Information Security Breaches

Posted by Mark Reedy on Sep 26, 2018 8:30:00 AM

 online banking breach

Most of today’s information security breaches follow clear patterns, yet organizations simply aren’t prepared to detect or deflect them. Indeed, it often takes months or even years for a target enterprise to learn of a breach, long after the damage is done.

Hackers use automated malware to launch continuous attacks, scaling up into the millions of individual events. Such attacks have compromised global organizations such as Equifax, Target, JP Morgan Chase, Anthem, eBay, Uber, and many others besides.

Biggest Threat to Enterprise CyberSecurity - Third-Party Remote ...

Posted by Don Rudolph on Mar 14, 2018 8:25:00 AM

 third party security

In the era of Bring Your Own Device and distributed virtual teams, remote access to sensitive network resources is quickly emerging as the biggest internal cybersecurity threat.

As more of the workplace moves online and team members require flexible access to IT assets from around the world, remote access has become a major headache for system administrators.

Your Security Solution May Just be a Tool

Posted by Susan Sison on  Sep 18,2018 11:46:37 AM

Network security distasterWhen disasters strike, seconds count.

Over the last few years, we’ve witnessed scenes like this playing out over and over: There’s a storm with torrential rain that threats an entire community. Wind and water pose risk to life as well as millions of dollars in potential property damage – sometimes billions.

Hackers Aren Not Your Biggest Threat

Posted by David Cahoon on Aug 13, 2018 4:04:51 PM

 optimized insider threat 700x235

The state of information security for companies in the U.S. is scary. 2014 was a record setting year in terms of data breaches with a staggering 783 breaches reported. That means on average more than 2 breaches were reported every day in 2014. The percentage by industry sector remained about the same as previous years although Health and Medical have the lion share at 42.5% and Business at 33%. When people hear about breaches, they immediately think about hackers. Yet hacking is responsible for only 29% of breaches.

What Is a Cyber Security Risk Assessment and Why Do One?

Posted by David Cahoon on Mar 6, 2018 9:38:39 AM


Cybersecurity is one of the most important ongoing business concerns for any enterprise.

Major security risks are not limited to the Fortune 500. On the contrary, small and mid-sized businesses are often completely wiped out by the repercussions of a network breach.

Are Carrier Re-alignments affecting your organization?

Posted by Jeff Hussey on Jul 25, 2018 10:13:39 AM

carrier re allignment 1In 2017 alone, there was more than $150 billion in merger, acquisition, and divestiture activity in the telecom space. The end result is a more consolidated industry landscape with fewer telecom carriers than ever, which can make it harder for small and mid-sized enterprises to operate.

If you are an SMB enterprise, you rely on uninterrupted service from your telecom carriers. These entities must deliver the capabilities you need to succeed, 24 hours a day and seven days a week. Unfortunately, they don’t always live up to their commitments.

That’s especially true when rapid-fire M&A causes telcos to slice and dice their assets.

Healthcare Providers Cyber Security: Risk Assessment - How does your organization measure your risk?

Healthcare Providers Cyber Security: Risk Assessment - How does your organization measure your risk?

Posted by Gabe Dahlstrom on Jun 29, 2017 8:28:00 AM

Until recently, performing a structured network risk assessment may well have been the last thing on the minds of most healthcare providers. IT services were planned and scheduled based on the essentials – and what could be performed with zero disruption to essential care operations.

Now, the world has changed. Ransomware attacks are consistently growing in size, scope, and sophistication. These attacks can cause healthcare operations to slam to a halt in a matter of just a few minutes. Restoring services can easily cost millions of dollars.

Cybersecurity risk assesment

The GDPR and your data protection obligations

Posted by Susan Sison on Dec 29, 2014 11:53:00 AM

 Author: Arthur Fontaine

Category: RSA Point of View

8 careers ncaThe focus is growing for the European Union's forthcoming "General Data Protection Regulation," or GDPR. As its May 25, 2018 implementation date draws nearer, organizations are starting to understand the magnitude of change this major regulation will drive.

It is not only EU-based organizations that are subject to the GDPR's requirements. If your company stores or handles any personally identifiable information about EU residents - things as simple as names and email addresses - then you are obligated to be in compliance, and risk penalties if you're not.

If you are a Healthcare Provider, what are your top five HIPAA violations? Here is my guess.

Posted by Don Rudolph on Jul 9, 2018 9:57:49 AM

Organizations that maintain protected health information (PHI) sink or swim based on their plan for protecting data confidentiality. Healthcare compliance is a major cost center and is growing annually – for small, mid-sized, and large enterprises alike.

However, managing PHI isn’t solely a matter of passwords or software patching. Security solutions that work for general operations fall short when it comes to confidential data from patients, providers, or insurers. It’s vital to recognize and act on PHI-specific threats.

Healthcare providers Cyber Security Risk Assessment How does your organization measure your risk

10 Cybersecurity Myths That Every Organization Should Know

Posted by Susan Sison Oct 3, 2018 3:53:00 AM

engineer 1

For businesses around the world – but particularly those based in the United States – the threat environment in IT has never been more complex. Unfortunately, many businesses build their IT security practices on received wisdom: Assumptions that simply don’t hold up in practice.

Let’s look at ten of the most serious cybersecurity myths.

New Vulnerabilities Spectre and Meltdown by Don Rudolph

Posted by Don Rudolph on Jan 8, 2018 2:12:29 PM

Spectre and MeltdownNew vulnerabilities Spectre and Meltdown.jpgTwo new and related security vulnerabilities called “Spectre” and “Meltdown” are significant because they affect computing platforms with Intel, AMD, or ARM central processing units (CPU’s). This includes Mac, Windows, Linux, Android and other platforms. These vulnerabilities take advantage of the ability to extract information from instructions that have been executed on a CPU using the CPU cache as a side-channel.

Security Awareness for End Users: Working Remotely & Wi-Fi Security

Posted by Susan Sison on Oct 5, 2017 7:52:08 AM

 wifi security

The recent news that all 3 billion Yahoo accounts were hacked in 2013 underscores just how vital it is that organizations maintain robust security standards across the hierarchy.

Although it is essential that firewalls, patch management, and other automated IT services be in place, this is rarely enough. Enterprises are only truly protected when stakeholders at all levels are actively involved in maintaining information security.

It is no surprise that non-technical stakeholders are often targeted by sophisticated attacks.

4 Tips to Fight SSL/TSL Encrypted Cyberthreats

 Posted by Susan Sison on Sep 6, 2017 10:27:27 AM

 SSL TSL Encrpted cyberthreats

As of the first quarter of 2017, half of all web traffic is encrypted, according to a report by the Electronic Frontier Foundation. Google is even pressuring more sites to become SSL-certified by programming its search algorithms to give indexing preferences to https sites.

7 Need-to-Know Facts About DDoS Attacks

Posted by Susan Sison on Sep 29, 2017 7:10:06 AM


Every business is susceptible to a distributed denial-of-service (DDoS) attack. This type of attack has long been favored by so-called hacktivists, groups who specifically take down a website as a sign of protest or political statement (Anonymous is one of the most well-known hacktivist groups). More recently, DDoS attacks are a favorite attack vector of cybercriminals who see DDoS as an inexpensive way to make money. They are also used as a distraction tool; as IT and security staff are focused on mitigating DDoS, the attackers sneak into inject malware or steal data unnoticed.

There's No Silver Bullet For Phishing

Posted by Susan Sison on Jul 5, 2017 9:37:58 AM

 privacy policy

Despite the emphasis on phishing awareness, employees are still falling for this widely-used social engineering tactic. While teaching good cyber hygiene is still a core component of a well-rounded cybersecurity strategy, it’s no silver bullet.

Mitel announces definitive agreement to acquire ShoreTel

Posted by ShoreTel on Jul 28, 2017 3:25:27 PM

 Miltel logo

Mitel announces definitive agreement to acquire ShoreTel

OTTAWA, ON and SUNNYVALE, CA – July 27, 2017 – Mitel (Nasdaq: MITL) (TSX: MNW) and ShoreTel (Nasdaq:SHOR) today announced that they have entered into a definitive merger agreement pursuant to which Mitel will acquire 100% of the outstanding shares of ShoreTel common stock in an all-cash transaction at a price of $7.50 per share, or a total equity value of approximately $530 million and a total enterprise value of approximately $430 million. The purchase price represents a 28% premium to ShoreTel’s closing share price on July 26, 2017.

Stronger together as a global market leader in the rapidly growing UCaaS market

read more..


Network Computing Architects, Inc. is a premier provider of high quality sustainable and secure networking, information security solutions and unified communications. We partner with our clients to provide answers to business initiatives where leading technologies converge.

NCA achieved ISO 27001:2005 certification in December 2007 and is currently ISO 27001:2013 certified. The scope of NCA's ISMS is client confidential information within NCA Professional Services Practice.

Reducing Identity Risk for VPN Access

Posted by RSA Security on Jun 19, 2017 1:06:03 PM

 analytics assessments

Are Your Users Who They Say They Are?

For years, organizations have set up network perimeters to keep the bad guys (criminals) out and let the good guys (employees) in. Virtual Private Networks (VPNs) offered a safe remote connection for “good guy” access from unsecured networks to corporate systems, applications, and data that they needed in order to do their jobs.But today’s rapidly growing mobile workforce and open business environment are expanding the requirement for remote access beyond employees to include contractors, vendors, customers, audit teams, and partners. In order to do business, stay competitive, and maintain agility, modern companies are opening their networks to this broader user base.

Security Awareness for End Users: 6 Useful Ways to Develop and Defend Enterprise Passwords

Posted by Susan Sison on Jun 13, 2017 10:56:35 AM

 end user security passwords

When it comes to online security, passwords are the second line of defense. If a threat breaches the network perimeter, then the passwords associated with particular assets become essential to protecting them. Strong passwords can make it difficult for intruders to access information fast enough to remain undetected, which helps protect the enterprise as a whole.

For the average user of a corporate network, however, passwords are the single most important security tool. Users must practice password safety at every step of their work day to ensure their network resources are protected – and that can be a heavy responsibility.

8 Riveting Revelations from Fortinet's Q4 2016 Threat Landscape Report

Posted by Susan Sison on Jun 8, 2017 1:57:05 PM

 CTA report

As the saying goes, “Knowledge is power,” and when it comes to threat detection and combating cyber threats, actionable intelligence is our most powerful weapon.

Fortunately, we have friends on the inside. Fortinet, one of the leading providers of security tools, has been actively reporting on the threat landscape, having recently released their quarterly Threat Landscape Report for Q4 of 2016.

Your Firewall is the First Line of Defense

Posted by Susan Sison on Jun 21, 2017 8:25:00 AM

Firewall Service

IT security threats are growing by the day, and enterprises of all sizes need firewall management services they can rely on. Selecting a trusted security partner to lead your firewall is the fastest way to get peace of mind so you can focus on what your business does best.

From a technical perspective, your firewall is the first line of defense. NCA provides powerful, effective firewall management services using the latest in perimeter defense and active intrusion detection.

Improve Your Security Posture Overnight With NCA SaaS

Posted by Susan Sison on Jun 7, 2017 8:35:00 AM


Your firewall is the most important piece of security technology your business maintains. Hosted firewall solutions from NCA help you protect your enterprise’s key architecture and data without having to make major capital investments or recruit an expensive security team.

With NCA security-as-a-service, our hosted firewall protects your network inside and out. You’ll be defended against all the latest threats – even the most serious “Day Zero” malware. We use a proven “defense in depth” strategy to secure, protect, and optimize your network.

Like other Ransomware, WannaCry Encrypts Key User and Operating System Files

Posted by Susan Sison on May 18, 2017 11:02:29 AM


Beginning on Friday, May 12, a cyberattack of unprecedented size and scope was attributed to the malware called “WannaCry,” also known as Wannacryptor, WCry2, and so on.

Like other ransomware, WannaCry encrypts key user and operating system files, then demands a “ransom” denominated in the crypto-currency Bitcoin. Although paying the ransom has, in the past, sometimes resulted in the release of files, users are strongly advised against this course of action.

Healthcare Providers Cyber Security: Defending against advanced cyber threats—known and unknown—such as malware and ransomware

Posted by Gabe Dahlstrom on May 23, 2017 9:32:32 AM

 HealthCheck 1

Ransomware is now one of the most serious threats to healthcare organizations of all sizes.

In a ransomware attack, a virus enters the network and encrypts files on infected computers. Once the encryption process is complete, the virus presents a “ransom demand” to the user. Demands are usually denominated in the cryptocurrency Bitcoin and can range into the thousands of dollars.

Firewall in factory default: are you using what you pay for?

Posted by Susan Sison on Jul 9, 2015 8:48:49 AM

Real Security Starts With The Basics

The statistics are all around - hacking attacks continue almost unabated, as hackers continue to gain access to valuable data and personal information on a regular basis, against both private companies and government agencies. The good news is, most companies have begun to take the security seriously, and most CIOs indicate that they'll be spending quite a bit on security over the next year.

Firewall 1

How Well Do You Know Your Cybersecurity "4Ts?"

Posted by Susan Sison on May 8, 2017 1:32:10 PM

 cyber security

The modern security landscape is anything but simple, with threats becoming more complex every day. That’s why we’d like to introduce a fresh way of looking at big picture cybersecurity. Our technology partner, Fortinet, refers to these best practices as the “4 Ts.” We agree they’re an effective means of better understanding the cybersecurity landscape.

How to Know a Secure SDN When You See One

Posted by Susan Sison on May 16, 2017 1:08:34 PM


Software-defined networking (SDN) isn’t just for big cloud providers and telecom companies anymore. Enterprises are beginning to hop on the SDN bandwagon, with IDC predicting the worldwide SDN market will grow to $12.5 billion by 2020. As more companies make the move, they are realizing they also need to adopt an SDN-like approach to security.

5 Ways You Benefit from a Carrier Channel Partner

Posted by Susan Sison on Apr 20, 2017 7:05:00 PM

 Cloud Phones

Your company needs telecom services that are reliable, robust, and cost-effective. No doubt you’ve been bombarded by marketing from the big carriers, each one claiming you need to go directly to them to meet your needs. But is it true? Not for most enterprises.


 Posted by Susan Sison on Apr 5, 2017 11:06:00 AM

 compliance governance

An effective, efficient compliance & governance regime is crucial to maintaining the trust of your customers and goodwill of regulators. In sensitive industries like finance and healthcare, the ability to defend data through strong compliance practicecompliance (2).jpgs is indispensable. Unfortunately, enterprises of all sizes report compliance is a growing source of overhead. In such a climate, internal assets alone are not always enough to meet high compliance standards.

NCA Varonis-as-a-Service (VaaS)

Posted by Susan Sison on Apr 4, 2017 7:38:00 AM

 data protection

Even in the most rigorous enterprises, unstructured data (any data generated by a human), creates a pervasive and growing compliance problem. Unstructured and semi-structured data accounts for about 80% of all the data found in an average corporate intranet, making it a challenge simply to illuminate what data lives where – much less ensure all of it is secured according to a strict compliance regime.

ShoreTel Implementation Services

Posted by Susan Sison on Apr 3, 2017 8:09:00 AM


img nca newsNCA is proud to offer a wide range of ShoreTel implementation services. Our unified communication platform provides trusted reliability alongside the most innovative features for your enterprise.

Premise-Based, Cloud-Based & Hybrid Solutions

No matter whether you need an in-house or cloud-based solution, NCA has you covered. A cloud model empowers enterprises of all sizes to benefit from ShoreTel technology with minimal in-house hiring or retraining, while an on-premise solution is easily integrated into existing IT. We work with you every step of the way to develop a system fully aligned with your needs.

CFO's in the Cloud

Posted by Jeff Hussey on Mar 24, 2017 8:12:00 PM


A successful move to the cloud often requires broad consensus from executive stakeholders. The most skeptical and least technical of all is often the CFO – someone who wants to understand the total cost of ownership (TCO) and ROI in the earliest stages of the process.

Luckily, cloud has such remarkable benefits that any business case can start off strong.

Building a Better SIEM

Posted by Susan Sison on Mar 2, 2017 9:00:12 AM


A tough regulatory environment and growing data privacy concerns have organizations looking for more efficient ways to monitor, analyze and respond to threat intelligence in context — bringing the value of security information event management (SIEM) into focus. Although adopting SIEM is much more than just a plug-and-play proposition, maintaining an advanced, scalable solution that optimizes cybersecurity effectiveness is an investment in the success of your business.

Why Your WLAN Access Security Needs a New Look

Posted by Susan Sison on Mar 15, 2017 3:50:14 PM


According to Statista, there are 28.4 billion connected devices globally—and the Wi-Fi Alliance® expects that number to grow to 38.5 billion by 2020. With evolving technologies and trends placing wireless connectivity front and center for organizations, IT teams need to take a mobile-first approach to planning, managing and deploying wireless local area network (WLAN) access security.

Need one communication system to services multiple locations and devices?

Posted by Susan Sison on Mar 27, 2017 7:55:00 AM


Does your business have multiple offices? Is your enterprise geography getting more complex – with new locations opening at a rapid pace? Maybe you’re planning to open sites internationally and need to ensure efficient communications?

Whatever the case, it’s time to look for a robust, effective communication platform. With NCA, you can enjoy the benefits of clear voice calls, cutting edge collaboration tools, and huge system capacity no matter the size of your company.

Network Security Policies & Procedures

Posted by Susan Sison on Mar 29, 2017 6:28:00 AM

 network policys

The cost of technology is rising. Individual solutions are becoming more costly, but inexpensive open source alternatives struggle to keep up. Compliance and quality assurance costs are rising annually even outside regulation-driven industries. And, of course, the total cost of cybercrime is reaching unprecedented levels, averaging a cost of $15 million per year for U.S. enterprises.

How can you get the most from your network security investments while controlling costs?

Effective network security policies and procedures are the key to greater efficiency.

Combatting Mobile Device Insecurity

Posted by Susan Sison on Mar 10, 2017 9:00:13 AM

nca mobility

Mobile devices are everywhere in business. Employees bring their tablets, smartphones and laptops to work and connect them to company wi-fi. They access sensitive company data from the unsecured wi-fi network at Starbucks; and use their own, unsanctioned productivity apps to do business with the corporate credit card.

Network Security Training

Posted by Susan Sison on Mar 31, 2017 7:20:00 AM

 NCA Firewall Classes

Even if your enterprise uses the latest software, your network isn’t fully protected unless you invest in the right security training. Security training is essential for information technology professionals, but it can also improve alertness for every member of your enterprise. Security is a company-wide concern, and many attacks take place when stakeholders far removed from core information resources make mistakes or fall prey to targeted scams.

NCA’s knowledge of security extends beyond hardware and software to the people responsible for it. Businesses that have benefited from NCA training in the past report earlier awareness and greater resilience when assaulted by malware, phishing, or network penetration. Our training services work closely with our other offerings – they can be especially valuable for enterprises seeking certifications where robust security is a major concern.

Deconstructing the Cyber Kill Chain

Posted by Susan Sison on Feb 23, 2017 8:20:06 AM
breach attacks

When is a breach not bad news? When your security team ends up not only stopping it before it does real damage, but also learning more about it than it does from you.

That’s the idea behind the cyber kill chain (CKC), a methodology to help security teams better understand attackers’ game plans so that they can create more proactive, intelligent defenses.

4 Cybersecurity Resolutions To Make In The New Year

Posted by Susan Sison on Feb 20, 2017 1:00:04 PM

 breach hackers

It’s natural for all of us to look at the calendar, and seeing a fresh start, make resolutions for the New Year. The security professionals in your IT department are no exception – but they may see the world differently than those who are looking to lose 20 pounds or get a new job.

They see the threats cybercriminals have represented in 2016 and can predict what may come in 2017.

Industry Update: ShoreTel acquisition by Mitel

 Posted by Thomas Gobeille on Sep 28, 2017 10:03:15 AM

 20150306 TomGobeille 014

To our loyal clients,

Being informed is important and I appreciate this opportunity to speak with you regarding the recent announcement of the ShoreTel acquisition by Mitel Networks Corporation. As we were the first partner of ShoreTel many years ago, helping them develop their go to market strategies, this news is as important to us as it is to you. I would like to begin to share some of the early highlights that came from a recent conversation I had with a senior Mitel executive.

Recent Bad Rabbit Ransomware - Palo Alto Networks Prevention

 Posted by NCA Security Team on Nov 3, 2017 2:06:19 PM


Please make sure your policies are configured with threat prevention, using file blocking and wildfire to prevent this attack. If you’re unsure about your policies or would like a policy assessment, please reach out to NCA and we can schedule time for to review the policies and go through a best practices report. This report will look at your current policy usage, and the recommended changes in order to prevent Bad Rabbit and other threats.

Letter from Mitel: "Stronger together as a UCaaS market leader"

Posted by Thomas Gobeille on Oct 26, 2017 10:17:58 AM

Miltel logo

Powering connections                                                                                                                                                                                                                October 10, 2017

Dear Thomas Gobeille,

On Monday, September 25, 2017, Mitel announced the completion of its ShoreTel acquisition. With this, I'm pleased to welcome you with open arms to the Mitel family. We are excited about this integration, and I wanted to reach out to you directly to share what it means for you.

Stronger together as a UCaaS market leader

First, let me reassure you that this is a combination of two compatible and complementary companies, and we are truly stronger together. As of today, the combined Mitel and ShoreTel has the #2 market share position in the global Unified Communications as a Service (UCaaS) space. And it's in our profound interest that each ShoreTel partner be part of this. As enterprises around the world look to move to the cloud and digitally transform their businesses, Mitel can take them to the cloud seamlessly and simply. Our path incorporates a unique suite of cloud solutions and applications, investment protection, and a technology path to the future.

Top reasons for out-sourcing desktop support: Continuous Reliability

Posted by David Smith on Oct 26, 2017 8:45:14 AM

 Managed Services continuous reliability

When it comes to enterprise technology, you need solutions that work exactly as you expect every time you need them. No matter if you operate from a single office or a network of sites spanning the globe, your IT tools should provide predictable performance.

Reliability is a keystone of NCA’s outsourced desktop and laptop support services for businesses like yours. Enterprises struggle to achieve adequate support with an in-house team, leading to spiraling overhead and years of wasted potential – NCA’s world-class service ends the cycle.

Top reasons for out-sourcing desktop/laptop support: End User Experience

Posted by David Smith on Oct 20, 2017 10:25:26 AM

Desktop support

 Desktop and laptop support is crucial to any knowledge-driven enterprise. However, support can also add a great deal of overhead. In addition to cost and headcount, there’s a long ramp-up time to develop a skilled in-house support team. If help desk quality is low, frustration results.

If you’re thinking about outsourcing hardware support, superior end user experience is a good reason to move forward. There are many reasons to expect better end user results and morale when you use an outsourced team of experts.

6 Cybersecurity Steps to Take This Fall

Posted by Susan Sison on Sep 8, 2017 2:27:32 PM


SSL TSL Encrpted cyberthreatsYou can say a lot of things about 2017, but one thing is for certain—information has moved at a frenetic pace. Few can recall a time when data was deployed at such breakneck speed, with such profound impacts. As fall approaches and we begin to settle back into our work routine it is time to look back on the threat landscape and see how we’ve done so far this year.

How SMBs Can Benefit from Cloud Communications

Posted by Susan Sison on Aug 31, 2016 10:30:00 AM

Today’s business environment is much different from 20 or even 10 years ago. Employees are more productive and expect more from their business tools, while companies run a tighter, more streamlined work environment. As a result, every tool is utilized to its fullest capabilities, with little room for downtime.

Blog Post 11 Cloud communications can save

Are You Protected from Advanced Persistent Threats?

Posted by Susan Sison on Aug 2, 2017 12:29:05 PM

 Advanced Persistent Threats

Malware and cyber criminals are becoming more advanced. Is your IT security?

The rise of advanced persistent threats (APTs) drives the need to rethink IT security measures to deal with a new level of sophistication and an increased frequency of threats. Unfortunately, hackers are outwitting security measures faster than security professionals are adapting to new hacking techniques.

Just two months after the WannaCry ransomware caused an estimated $4billion in losses, Petya was able to attack companies using the exact same EternalBlue vulnerability.

NCA Announces Virtual CISO Services

Posted by Susan Sison on Aug 7, 2017 9:22:46 AM

BELLEVUE, WA, August 7, 2017—Experts agree it has never been more important for enterprises to have robust information security measures. Businesses of all sizes find themselves under attack by a growing spectrum of cybercriminal activities that can cost millions of dollars.

Now, with Virtual Chief Information Security Officer (vCISO) services from NCA, it is easier than ever for companies of all industries, size categories, and geographies to benefit from true security expertise. NCA aims to fill an unmet market need expressed by CxOs from coast to coast.

For many school districts, the move to online testing is part of an overall trend

Posted by Susan Sison on Mar 23, 2016 6:42:00 AM

Overall public school enrollment is increasing at a time when the number of new teachers holds steady or declines in many states. Instructional technology is the key to ensuring vital education resources are disseminated among the young people who need them even as class sizes grow. Adding to the pressure, curricula are transforming to address changing needs, thus demanding fresh ideas from both educators and administrators.


Contemporary Challenges and Solutions for Wireless Networking in Education

Posted by Susan Sison on Mar 17, 2016 1:23:10 PM

 education classroom

This year, educators and administrators are going beyond standardized testing and looking for exciting new ways to improve learning outcomes. As instructional technology grows more sophisticated and effective, it becomes ever more important that schools at all levels are fully equipped to deliver a premium learning experience backed by the latest online methods.

How to Detect Data Breaches Before It's Too Late

Posted by Susan Sison on May 10, 2017 8:12:00 AM

DatabreachCyber attacks are growing at an alarming rate, and unfortunately, breaches are all but inevitable. We’ve all heard about the recent attacks that embarrassed Sony, Ashley Madison and Yahoo. But the problem is more far-reaching than those high-profile cases.

Top Ransomware Attack Tactics

Posted by Susan Sison on Feb 16, 2017 3:10:58 PM


RansomwareRansomware is a growing threat, with a recent Malwarebytes study finding that 40% of businesses worldwide experienced a ransomware attack in just the last year.

Not only does ransomware cripple productivity by encrypting PCs, servers and databases to the point where they’re unusable, but it can also lead to significant business losses. The same study found that more than a third of ransomware victims lost revenue, while 20% were forced to stop business completely after an attack. How can you prevent your business from becoming the next victim?

Hiring for Network Security Point Products

Posted by Susan Sison on Feb 24, 2017 11:43:02 AM

cyber security

Are you considering hiring for network security point products to make your business more secure? Hiring for network security point products can be a challenge – and there may be faster, more cost-effective approaches for getting the world class security you need.

Building an internal information security team is hard work. It can take months to recruit the right talent. Rolling out a complete security strategy can take just as long. Risk-conscious businesses want to see immediate results.

Luckily, there is a solution: Managed security services from NCA.

More Articles ...