News / Events

Keep up to date with the latest developments at NobleNetworks. From advancements in computer technology to new network security strategies, we stay current so that we can provide our clients with the best IT support services available.

IT Services
8/21/2017

In our last blog post, we discussed how emails are not secure. In today's post, we're going to look at what you – and your IT services provider – can do about it: encryption. Encryption has been around for hundreds of years and uses mathematical principles to encode your message, allowing intended recipients to "decode" it with a password, key, or other credentials. Of course, this description vastly simplifies what is a very, very complex subject that should be discussed – in depth – with your IT provider prior to implementation. To help clarify things, however, we are going to look at two common ways that email is encrypted: message encryption and connection encryption.

7/6/2017

In both our personal lives and our businesses, email is an essential tool. Allowing us to communicate directly, quickly, and inexpensively, it has become the standard form of communication for countless companies across the globe. But, among email's many benefits, it's important to remember: security is not one of them. It is a common misconception that only the sender and the recipient of an email are able to read it. Many people imagine their emails as a sealed envelope, sent unopened from A to B, with their contents shielded from everyone in between. This is not true: emails are not secure. Today, we're going to look at why.

Computer Network Services
4/19/2017

When it comes to retaining your business' information, there are two methods: backups and archives. As a provider of computer network services, NobleNetworks feels that it is important to understand the core differences between these two concepts. Depending on your needs, one may be preferable to the other or – as is the case most of the time – you may find yourself needing a mix of the two methods. In today's post, we're going to look at the differences between backups and archives and, more importantly, discuss why – and when – each method should be used.

Managed Services
3/8/2017

If you're like most people, you have used – or are currently using – a public email system. The portability and cross-platform compatibility of services like Gmail, Yahoo, and Hotmail make them extremely convenient to use in the office, in the home, and on the go. Designed primarily for personal use, these services are occasionally used by businesses, as well. While these free accounts can be used for such purposes, they aren't generally recommended, as they lack the robustness and security offered by more reliable, business class solutions.

Managed Services
1/19/2017

Every network administrator knows that regular backups are essential to running a server. But, when it comes to your employees' personal computers, maintaining backups is just as important. While your business' server may host its databases, web sites and client information, your employees' personal computers may store information that is critical to their duties: documents, e-mail contacts, photographs and more. While ensuring that these items are stored on a backed up server is the best option, sometimes it is not practical or possible to do.

IT Support
12/20/2016

In the first two installments of this series, we discussed how to identify dangerous e-mails and went on to define "spam e-mail." In this, the third installment, we will discuss the different options available to you when dealing with unwanted e-mails. As we've talked about before, there are various types of unwanted emails: from unsolicited advertisements to dangerous phishing scams. When dealing with these e-mails in your inbox, it's important to correctly identify which type you are dealing with so that you can respond accordingly.

IT Services
11/14/2016

In the previous installment of this series, we talked about the pitfalls of dangerous emails. We covered how to identify them and, more importantly, what to do about them. In that post, we discussed – broadly – what constitutes a dangerous email. But, there is a certain kind of email that most people are familiar with and, thankfully, able to recognize: spam. While spam emails are not always dangerous – as the word has been commonly-adopted to include any mass email – they are typically guided by a malicious intent. In the second part of this series on working with your emails, we're going to discuss what spam is and, more importantly, what you can do about it.

10/12/2016

Dealing with dangerous emails can be challenging if you aren't technically inclined. Because scammers have become good at obfuscating their motives, many people aren't able to differentiate between legitimate and malicious emails. That's why, more than anything, it's important to understand the warning signs of scams, phishing attempts and efforts to spread viruses. In the first part of this series on working with your emails, we're going to look at how to identify dangerous emails.

Managed Services
9/7/2016

It goes without saying that computers are a major part of running most businesses. From managing accounting and payroll to tracking inventory and shipping dates, computers handle a wide range of tasks and, for the most part, all of those tasks have one thing in common: data. The goal of managed services isn't just to keep things running smoothly, it's to protect your data... your customer lists, employee information, bank account numbers and more. To that end, the fundamental purpose of managed services is to address small issues before they become major problems.

IT Support Services
5/23/2016

If you're a regular visitor, you've undoubtedly noticed that NobleNetworks' website has undergone a massive change. While we've retained the original color scheme, don't let the similarities fool you: we've overhauled the whole site from the ground up! Now completely mobile responsive, our new site includes a number of top-notch features that current – and future – customers are certain to enjoy.