News / Events

Keep up to date with the latest developments at NobleNetworks. From advancements in computer technology to new network security strategies, we stay current so that we can provide our clients with the best IT support services available.

Computer Services in Kalamazoo

As the premier computer service in Kalamazoo, NobleNetworks knows that USB drives are everywhere. They’re used to move files from one department to another, to back up important documents, to transfer work from your office computer to your home computer, and in a massive number of other ways. Businesses across the city – and the world – rely on them as a cheap, fast, and easy way to store, transfer, and back up their essential files. What most people don’t know, however, is that – for a whole host of reasons – it is extremely important to secure their USB drives. In today’s post, we’re going to look at why USB security is important, how to implement it, and who should consider it.

IT Support

If you’ve come across an email or website that doesn’t seem quite “right” to you, the first thing you should do is contact your IT support team. Whether it’s a suspicious popup window with an intimidating countdown, a strangely worded virus scan dialog, or an email from a coworker containing an unfamiliar link, phishing attempts can often be difficult to identify. And, while falling victim to a phishing scam can be heartbreaking if it happens to your personal computer, it can be absolutely devastating to your business’ networks. In this post, we’re going to take a closer look at what phishing is, how it works, and how to keep your networks protected.

Business Computer Maintenance

As a provider of business computer maintenance, the team at NobleNetworks hears about it all the time: work computers being used for unproductive, inappropriate, or dangerous things. Whether your employees are viewing adult material, scanning their social media accounts, or playing online games, it doesn’t only eat up their time, it costs you money and puts your network at risk. To solve this issue, NobleNetworks can help you set up web content filtering, which helps to filter out inappropriate sites while still allowing your staff to view the websites that they need in order to do their jobs. In today’s post, we’re going to look at three benefits to implementing web filtering at your business.


As the leading provider of managed services in Kalamazoo, NobleNetworks is committed to keeping our clients’ networks and data secure. Recently, a vulnerability known as “KRACK” delivered a powerful reminder: it is essential to regularly update your company’s computer systems. Since 2006, WPA2 has been the industry standard when it comes to Wi-Fi connections. Far more secure than WEP or WPA, WPA2 utilizes mandatory AES algorithms and CCMP. For many years, the security of WPA2 was touted as “unhackable.” That was, until recently…

IT Services

In our last blog post, we discussed how emails are not secure. In today's post, we're going to look at what you – and your IT services provider – can do about it: encryption. Encryption has been around for hundreds of years and uses mathematical principles to encode your message, allowing intended recipients to "decode" it with a password, key, or other credentials. Of course, this description vastly simplifies what is a very, very complex subject that should be discussed – in depth – with your IT provider prior to implementation. To help clarify things, however, we are going to look at two common ways that email is encrypted: message encryption and connection encryption.


In both our personal lives and our businesses, email is an essential tool. Allowing us to communicate directly, quickly, and inexpensively, it has become the standard form of communication for countless companies across the globe. But, among email's many benefits, it's important to remember: security is not one of them. It is a common misconception that only the sender and the recipient of an email are able to read it. Many people imagine their emails as a sealed envelope, sent unopened from A to B, with their contents shielded from everyone in between. This is not true: emails are not secure. Today, we're going to look at why.

Computer Network Services

When it comes to retaining your business' information, there are two methods: backups and archives. As a provider of computer network services, NobleNetworks feels that it is important to understand the core differences between these two concepts. Depending on your needs, one may be preferable to the other or – as is the case most of the time – you may find yourself needing a mix of the two methods. In today's post, we're going to look at the differences between backups and archives and, more importantly, discuss why – and when – each method should be used.

Managed Services

If you're like most people, you have used – or are currently using – a public email system. The portability and cross-platform compatibility of services like Gmail, Yahoo, and Hotmail make them extremely convenient to use in the office, in the home, and on the go. Designed primarily for personal use, these services are occasionally used by businesses, as well. While these free accounts can be used for such purposes, they aren't generally recommended, as they lack the robustness and security offered by more reliable, business class solutions.

Managed Services

Every network administrator knows that regular backups are essential to running a server. But, when it comes to your employees' personal computers, maintaining backups is just as important. While your business' server may host its databases, web sites and client information, your employees' personal computers may store information that is critical to their duties: documents, e-mail contacts, photographs and more. While ensuring that these items are stored on a backed up server is the best option, sometimes it is not practical or possible to do.

IT Support

In the first two installments of this series, we discussed how to identify dangerous e-mails and went on to define "spam e-mail." In this, the third installment, we will discuss the different options available to you when dealing with unwanted e-mails. As we've talked about before, there are various types of unwanted emails: from unsolicited advertisements to dangerous phishing scams. When dealing with these e-mails in your inbox, it's important to correctly identify which type you are dealing with so that you can respond accordingly.