May 2014
In This Issue:

Brian's Blog
Business Referral Program
7 security habits of highly effective PC users
Heartbleed May Cause You Some Heartache
The Internet of Everything: Four Technologies We'll Actually Use within Three Years
Business Continuity Tip
Quote and Cartoon


Business Continuity Tip

Social Media & Disaster Recovery

There's no doubt about it - social media is changing the way we communicate. These online tools, once thought to be for personal use only, have asserted their dominance in times of emergency as go-to sources for news and updates.

Here are two great resources to help bring sense to this subject. Check out this on-demand webinar "Social Media & Disaster Recovery" and this blog post, "The Link between Crisis Management and Social Media."


 

 Laugh a Little



 

 Quote of the Month


The interent is the most important single development in the history of human communication since the invention of call waiting.

Dave Barry
 

Follow us on . . .
Please share this newsletter
with anyone who might be interested.
Brian's Blog
by Brian Gregory, President

Are you leveraging social media for your business? Along with this monthly newsletter, I maintain a company facebook page and twitter account. I try to make a relevant post every couple of days. This keeps us engaged and top of mind with our clients. I got a call out of the blue last week from the Kansas City Star, who noticed one of my timely tweets and interviewed me for a short article! It’s easy and it works.

You’ll notice on my regular tweets and posts, as well as the newsletter below, that very little of the content is my own. I certainly do provide my own content from time to time, especially in this monthly blog post. However, I am too busy to prepare an entire newsletter or regular technology posts on my own. I can prove with many years worth of history, that if I tried to bite off that much work, nothing would get sent out. I am able to share good content from others with just a few clicks. I have several sources for that content:

  • Industry partners (you’ll note articles in my newsletter from Microsoft, Lenovo, Cisco, HP, etc.)
  • Subscriptions (There is an industry group that has a searchable content database that I subscribe to, so I can quickly provide articles on specific topics)
  • My own surfing – I read many other blogs and IT news sites for my own benefit, and often share from those
  • Peers – Every day I see posts in my feed from other IT professionals that are great. We all borrow from each other from time to time

Read more


Business Referral Program

Send your referrals to www.netinn.com/referral
or e-mail sales@netinn.com

Your personal referrals are the greatest compliment we can receive. Referrals are one of the primary reasons we have been successful for over 20 years. Our business referral program thanks you for assisting us in finding new clients in need of IT resources. If one of your referrals engages with us for projects or services, you may be eligible to receive a $50 Visa gift card. For more information, visit www.netinn.com/referral or give us a call!


7 security habits of highly effective PC users
used with permission from HP Technology at Work

You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands and at your fingertips. Developing and maintaining good habits can make online activity much safer and more enjoyable for you and your colleagues.

The following 7 good habits take only minutes to learn and are easy enough to incorporate into your daily work life.

Read More


Heartbleed May Cause You Some Heartache
used with permission from FTC Business Center Blog
By Nicole Vincent Fleming


If you’re thinking “Heartbleed” sounds serious, you’re right. But it’s not a health condition. It’s a critical flaw in OpenSSL, a popular software program that’s used to secure websites and other services (like VPN and email). If your company relies on OpenSSL to encrypt data, take steps to fix the problem and limit the damage. Otherwise, your sensitive business documents and your customers’ personal information could be at risk.

The Internet of Everything: Four Technologies We'll Actually Use within Three Years
Used with the permission of http://thenetwork.cisco.com
by Kristi Essick


There is so much talk about the Internet of Everything, but how much of it is a futuristic pipe dream? After all, for nearly two decades, companies have tried to sell consumers Internet-connected fridges and microwaves, automated home lighting and heating systems, and smart entertainment devices, yet these devices have never caught on in a big way.

Clearly, the IoE is colossal, and growing. According to a January 2014 research report from Raymond James & Associates, there were 12.5 billion devices connected to the Internet in 2011, including nearly every computer in the world and over a billion smartphones.

Read More

Network Innovations, Inc.  |  2012 Prairie Circle, Suite B  |  Olathe, Kansas 66062  |  (913) 780-0494