News / Events

Keep up to date with the latest developments at NobleNetworks. From advancements in computer technology to new network security strategies, we stay current so that we can provide our clients with the best IT support services available.

IT Support

If you’ve come across an email or website that doesn’t seem quite “right” to you, the first thing you should do is contact your IT support team. Whether it’s a suspicious popup window with an intimidating countdown, a strangely worded virus scan dialog, or an email from a coworker containing an unfamiliar link, phishing attempts can often be difficult to identify. And, while falling victim to a phishing scam can be heartbreaking if it happens to your personal computer, it can be absolutely devastating to your business’ networks. In this post, we’re going to take a closer look at what phishing is, how it works, and how to keep your networks protected.

Business Computer Maintenance

As a provider of business computer maintenance, the team at NobleNetworks hears about it all the time: work computers being used for unproductive, inappropriate, or dangerous things. Whether your employees are viewing adult material, scanning their social media accounts, or playing online games, it doesn’t only eat up their time, it costs you money and puts your network at risk. To solve this issue, NobleNetworks can help you set up web content filtering, which helps to filter out inappropriate sites while still allowing your staff to view the websites that they need in order to do their jobs. In today’s post, we’re going to look at three benefits to implementing web filtering at your business.


As the leading provider of managed services in Kalamazoo, NobleNetworks is committed to keeping our clients’ networks and data secure. Recently, a vulnerability known as “KRACK” delivered a powerful reminder: it is essential to regularly update your company’s computer systems. Since 2006, WPA2 has been the industry standard when it comes to Wi-Fi connections. Far more secure than WEP or WPA, WPA2 utilizes mandatory AES algorithms and CCMP. For many years, the security of WPA2 was touted as “unhackable.” That was, until recently…

IT Services

In our last blog post, we discussed how emails are not secure. In today's post, we're going to look at what you – and your IT services provider – can do about it: encryption. Encryption has been around for hundreds of years and uses mathematical principles to encode your message, allowing intended recipients to "decode" it with a password, key, or other credentials. Of course, this description vastly simplifies what is a very, very complex subject that should be discussed – in depth – with your IT provider prior to implementation. To help clarify things, however, we are going to look at two common ways that email is encrypted: message encryption and connection encryption.


In both our personal lives and our businesses, email is an essential tool. Allowing us to communicate directly, quickly, and inexpensively, it has become the standard form of communication for countless companies across the globe. But, among email's many benefits, it's important to remember: security is not one of them. It is a common misconception that only the sender and the recipient of an email are able to read it. Many people imagine their emails as a sealed envelope, sent unopened from A to B, with their contents shielded from everyone in between. This is not true: emails are not secure. Today, we're going to look at why.

Computer Network Services

When it comes to retaining your business' information, there are two methods: backups and archives. As a provider of computer network services, NobleNetworks feels that it is important to understand the core differences between these two concepts. Depending on your needs, one may be preferable to the other or – as is the case most of the time – you may find yourself needing a mix of the two methods. In today's post, we're going to look at the differences between backups and archives and, more importantly, discuss why – and when – each method should be used.

Managed Services

If you're like most people, you have used – or are currently using – a public email system. The portability and cross-platform compatibility of services like Gmail, Yahoo, and Hotmail make them extremely convenient to use in the office, in the home, and on the go. Designed primarily for personal use, these services are occasionally used by businesses, as well. While these free accounts can be used for such purposes, they aren't generally recommended, as they lack the robustness and security offered by more reliable, business class solutions.

Managed Services

Every network administrator knows that regular backups are essential to running a server. But, when it comes to your employees' personal computers, maintaining backups is just as important. While your business' server may host its databases, web sites and client information, your employees' personal computers may store information that is critical to their duties: documents, e-mail contacts, photographs and more. While ensuring that these items are stored on a backed up server is the best option, sometimes it is not practical or possible to do.

IT Support

In the first two installments of this series, we discussed how to identify dangerous e-mails and went on to define "spam e-mail." In this, the third installment, we will discuss the different options available to you when dealing with unwanted e-mails. As we've talked about before, there are various types of unwanted emails: from unsolicited advertisements to dangerous phishing scams. When dealing with these e-mails in your inbox, it's important to correctly identify which type you are dealing with so that you can respond accordingly.

IT Services

In the previous installment of this series, we talked about the pitfalls of dangerous emails. We covered how to identify them and, more importantly, what to do about them. In that post, we discussed – broadly – what constitutes a dangerous email. But, there is a certain kind of email that most people are familiar with and, thankfully, able to recognize: spam. While spam emails are not always dangerous – as the word has been commonly-adopted to include any mass email – they are typically guided by a malicious intent. In the second part of this series on working with your emails, we're going to discuss what spam is and, more importantly, what you can do about it.