May 2013
In This Issue:

Brian's Blog
Business Referral Program
Network Security Checklist
Spam, Spam, Go Away
Think Before Sharing Your Location
Business Continuity Tip
Quote and Cartoon


Business Continuity Tip

Rivers on the Rise

The Mississippi and countless other Midwestern rivers are still significantly above flood stage, spurred by the heavy rain last week. Disasters have been declared in half a dozen states due to the deadly flooding that swept away vehicles, submerged homes and shut down bridges throughout the Midwest. Click here to view a current flood map.

And while the Mississippi River topped out at some problematic spots on Monday, river towns aren’t in the clear yet. Forecasters are predicting another inch or more of rain this week in addition to heavy snow accumulations in the north.

For helpful tips on how to keep your business afloat, download the Agility Flood Preparedness Checklist for actionable advice on what to do before, during and after a flood.
 

 Laugh a Little



 

 Quote of the Month


It is often easier to fight for a principle
 than to live up to it.

Adlai Stevenson
 

Follow us on . . .
Please share this newsletter
with anyone who might be interested.
Brian's Blog
by Brian Gregory, President

Help Wanted – Network Innovations is looking for a responsible, mature high school or college student to help at our office over the summer. An applicant should be pretty computer savvy and have access to a car – interested candidates can email me at brian@netinn.com for more information.

Have you considered hiring someone like this in your business? For one thing, employing a teenager and providing job experience is great for the community as a whole, but selfishly I’ve found it’s great for our company too. Our employees really enjoy the chance to mentor a young person, and that change of mindset can be a great catalyst for growth. Also, some of these kids are just phenomenal! It’s also a great way to get some of those things done that just never seem to make it to the top of the to-do list. I highly recommend you give it a try – if you have any questions about how we do it, give me a call!

This month I’ll continue my “cloud” discussion. Probably the biggest issue we have to address is what does cloud computing really mean? What people generally mean when they use this term is using data or an application from shared servers outside your control versus local servers that you own.

Read more


Business Referral Program

Send your referrals to www.netinn.com/referral
or e-mail sales@netinn.com

Your personal referrals are the greatest compliment we can receive. Referrals are one of the primary reasons we have been successful for over 20 years. Our business referral program thanks you for assisting us in finding new clients in need of IT resources. If one of your referrals engages with us for projects or services, you may be eligible to receive a $50 Visa gift card. For more information, visit www.netinn.com/referral or give us a call!


Network Security Checklist
used with permission from Cisco

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do.

Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons:

Read more


Spam, Spam, Go Away
used with permission from Norton by Symantec

Spam. In some ways, it's the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it's also a pervasive problem that's clogging and overwhelming the Internet's email systems. Spam accounts for approximately 80 percent of worldwide email volume.

In other ways, spam is worse than junk mail or junk phone calls. Although some spam is simply unwanted but legitimate advertising, much of it is worse. It can include everything from scam offers to malicious code--all designed to wreak havoc on your financial well-being or on your computer. Here are some of the most current and prevalent spam threats:

Read More


Think before sharing your location online
used with permission by HP Technology at Work

Many online alerts and notifications signal your real-life movements to the outside world. Location-based apps are trusted tools for keeping clients, colleagues and friends updated on your whereabouts. However, before you “Check in” everywhere, all the time, it is important to think about who exactly can access this information. Your old school friends? That funny guy you met at the airport? Their connections?

Read More

Network Innovations, Inc.  |  2012 Prairie Circle, Suite B  |  Olathe, Kansas 66062  |  (913) 780-0494