2011 Newsletter Header

Like us on Facebook   View our profile on LinkedIn   Follow us on Twitter   Find us on Pinterest   View our videos on YouTube   Visit our blog

Aug 2017
In This Issue
NPS Update
Ask the Expert
Superhero of the Month
Avaya Demo
Mitel Blog
Fortinet Blog
Axcient Merger
Old-School IT
Quick Links to CCC...
Manufacturer Links Below are links to manufacturer support and/or update sites. Please note some sites may require registration.  


NPS® Update
 NPS Score: 79.71%
Surveys Completed: 4384

Click here to learn more about Net Promoter Score. 

This movie premieres and contains the verbal exchange,

"When they opened Disneyland in 1956, nothing worked. 

Yeah, but John, if the 'Pirates of the Caribbean' breaks down, the pirates don't eat the tourists."

Jurassic Park, 1993

Brigette Stanback
Sheila Jaycox
Jerry Pawinski

At the 70th Annual Academy Awards, this person wins an award and proclaims, "I'm the king of the world!"
Ask the Expert:
Avoiding the Most Common Social Engineering Attacks
Gregorio Chaves, ConvergeSecure® Engineer
Are we ever safe?

As time progresses and anti-virus solutions continue to become more and more robust, the odds of machines being infected by an automated virus greatly decrease. What does that mean? It means the black hats (malicious hackers) need your help to infect machines, gain access to networks, and obtain sensitive data. The practice of engaging end users to spread a virus is typically referred to as "social engineering." Today I'm going to discuss the most well-known types of social engineering attacks and share some things you can do to protect yourself, your home, and your business.

Superhero of the Month:

Operations and Purchasing Manager, Jerry Pawinski, is our Superhero of the Month for July.

Jerry is recognized by his peers month in and month out for his outstanding dedication to CCC and his teammates. He's a superhero every month!

Avaya DEMO:
Avaya IP Office with WebRTC

Mitel Blog:
Choosing the Right Network Performance Tool Part 2: Mitel Networks Need Mitel UC Monitoring
The "All in One" Approach Explained

Most network monitoring software options provide Simple Network Management Protocol (SNMP)-based, end-to-end IT infrastructure monitoring, delivering detailed performance metrics on everything from servers to switches and VMWare. Taking this "all in one" approach to network management has its benefits: monitoring from a single dashboard certainly improves efficiency.

These suites typically specialize in the performance of the IT infrastructure, staying on top of router misconfigurations, for example, or CPU and memory utilization metrics for servers and switches. This is critical to the ongoing health of your  VoIP network - after all, most voice quality problems stem from an issue within this infrastructure.

However, to efficiently troubleshoot and resolve user-reported voice quality problems on your VoIP network, you need deeper visibility into what's happening on each call - jitter, packet loss, delay, codec. That's where the "all in one" option can fall short - and leave you without the insight you need to solve a problem on your network.

Fortinet Blog:
Securing the Digital World, Part I
Ken Xie| July 12, 2017
Fortinet Logo
Today's  digital economy is driving a technology revolution. Networks now include on-demand infrastructure, cloud-based services, software defined perimeters, and the growth of smart devices and IoT. Networks and infrastructures are also increasingly hyperconnected.

What's been missing is a  security strategy to protect these new environments.

The Internet was first begun as a point-to-point networking solution 50 years ago. The first generation of security was connection-oriented because it was primarily a firewall and VPN that simply protected network gateway connections.

As devices became more sophisticated, application traffic began to grow, and a new generation of security began. This second generation was focused on content. Security tools had to look inside permitted connections and applications to find malicious content. This drove the development of tools like the Next-Generation Firewall, which is where most security stands today.

Axcient and eFolder Announce Merger
DENVER, CO AND MOUNTAIN VIEW, CA, July 28, 2017 - eFolder, the leading provider of data protection solutions for the IT Channel, and Axcient, the recognized leader in Disaster Recovery-as-a-Service (DRaaS) solutions, today announced their merger.

The combination brings together proven innovators with a shared belief in simplifying the way businesses protect data, ensure IT infrastructure availability, and maximize employee productivity. The eFolder family of products makes it simple for managed service providers (MSPs) and their SMB clients to protect data, sync and share information, and recover servers, through leading products including eFolder Replibit, Anchor, and Cloudfinder. Axcient makes it easy for SMBs and mid-market customers to replicate and recover their entire IT infrastructure in less than an hour through its award winning Disaster Recovery as a Service (DRaaS) platform, and is recognized by Gartner, Forrester and IDC as a leader in the space. 

By bringing together the strengths of both Axcient and eFolder, the combined company will be able to service the full spectrum of businesses - from SMB to mid-market - with a broader set of solutions designed to maximize IT availability and employee productivity.

10 Old-school IT Principles That Still Rule
Bob Lewis | July 25, 2017
The more things stay the same, the more they change.

That's not exactly how the saying goes, but it is the phrase that should be engraved over every door leading to IT. It's certainly better than "Abandon all hope, ye who enter here."

Not a lot has changed since our early days, when IT was EDP and programmers were the high priests of the glass house.

Except for everything.

Luckily, much of the fundamental wisdom of the early days of IT still applies, just in a different, modernized guise. Here are 10 old-school principles that will guide you through next-generation IT, and the fundamental differences in the ways you should apply them.