Blog 2018-05-25T08:04:09+00:00

Recent Posts

Archives

Categories

Virtualization Giants Are Pairing Up

For companies trying to create employee desktops stored on a server and delivered over the internet, security and optimization often entail a mess of vendors, settings, and updates. But, now, two of the biggest names in the industry just announced a partnership that aims to simplify the whole process: Azure [...]

By | March 28th, 2017|Categories: Business Value, Cloud Services, Virtualization|Tags: , , , , , |

Infected with Ransomware? Don’t Panic Just Yet.

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the more it spreads, the more resources are allocated to fighting it. If your data is held hostage, check these lists for free decryption tools first! The state [...]

Head’s Up: We’re Hiring!

Are you looking for an opportunity to work with a small, closely-knit team of dedicated professionals? NCG has been in business or 25 years and is a recognized leader in the telecommunications and I.T. consulting industry. The average employee tenure is about 10 years and the company offers a comprehensive [...]

By | March 20th, 2017|Categories: Business Value|Tags: , , , , |

SDN & Virtualized Networks: How They Differ

Many people wonder what the difference between Virtualized Networks and SDN (Software-Defined Networks). Let’s take a look at what sets them apart. Software-defined networking (SDN) Managing storage, infrastructures, and networks with high-level software is something I.T. technicians have been doing for a long time. It’s a subset of virtualization and [...]

By | March 10th, 2017|Categories: Business Value, Cloud Services, Virtualization|Tags: , , |

Fileless Malware: Who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. But don't panic! Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, fileless malware is [...]

By | March 3rd, 2017|Categories: Security|Tags: , , , , , |

Real-World Case Study: Implementing a Disaster Recovery Plan

Failing to stop a cyber attacker, or to pass a Disaster Recovery Plan (DRP) audit could mean you're focused on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you receive, nothing beats real-world case studies. If that’s what you’re looking for, a [...]

4 First Steps for Preventing Cyber Attacks

Do you need some proactive strategies to prevent cyber attacks? Here's our strategy. 1. Understand the threats you’re facing Before any small- or medium-sized business can work toward preventing cyber-attacks, everyone involved needs to know exactly what they’re up against. Whether you’re working with in-house IT staff or an outsourced [...]

By | February 15th, 2017|Categories: Security|Tags: , , , , , |

Why Should You Care About SD-WAN?

SD-WAN (Software-Defined Wide Area Network) is the future of networking. It enables you to use a broadband internet connection to virtualize your legacy network hardware to reduce the costs associated with traditional MPLS networking. Some providers of SD-WAN even claim they can cut your networking costs by 90%, a [...]

By | February 2nd, 2017|Categories: Business Value, Cloud Services, SaaS, Virtualization, Web & Cloud|Tags: , , , , |

The Top Tips for Cloud-Based Unified Communications

The number of small businesses that will have their unified communications in the cloud will increase from 10% to 48% by 2020, and medium-sized firms and large enterprises follow in this trend, albeit in smaller percentages. These numbers are not surprising because migrating unified communications to the cloud presents a host of benefits [...]

By | February 1st, 2017|Categories: Cloud Services, VoIP|Tags: , , , , |

Hackers Can Use Autofill to Get Your Credit Card Info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card [...]

By | January 27th, 2017|Categories: Business Value, Security|Tags: , , , , , |