Archive for the ‘Uncategorized’ Category

Do You Trust Leadership You Work For and With?

Posted on: August 9th, 2017 by Jessica Diehl No Comments

Can you trust leadership in the businesses you work for?  Can you trust the businesses you work with?

Trust in the marketplace always points back to the trustworthiness of those that lead them.  Look at the patterns that are emerging below.

Trust Leadership

The above report published by Edelman in their recent Trust Barometer paper represents their latest findings for the first half of 2017.  At the most basic of levels, you can see that people want to work with salespeople who are most like themselves.  Those who are most likely to tell them, “no,” or “you can’t do that,” are the least likely to be trusted.

This points to the value of relationships and connecting with those who are in front of us.

TNT Leadership Goals

At TNT, our leadership is thoughtful and engaged in the world outside of their hours working at TNT.  To combat the sentiment tracked above, it seems appropriate to share with everyone what leadership at TNT does to “lead.”

Dan Whitt - Sales Manager

Dan Whitt runs the sales side of TNT.  Dan is also an ordained minister and has rooted a ministry in East Africa, where he and his wife visit every few years.  Dan leads church services and weekly home fellowships and has recently had a radio call in program where he answers questions that others have about faith.  Dan is trusted by his congregation with matters much graver than any difficulties associated with IT Services.  Not trusting Dan is the same as not trusting your pastor.

Mike Wilson - Project Manager

Mike Wilson runs the engineering side of TNT.  Mike has 6 children and when asked, he thinks that he and his wife are not yet done having children.  Mike leads engineering projects during the day, recently finished a Masters in Information security, and handles a van full of children each evening and weekend, shuttling them around between events and activities.  The role of father and husband are serious matters to Mike.   Some of us cringe at the thought of 6 children and a full-time job.  Mike thrives under those conditions.  He has recently bought a 15 passenger van to accommodate their family and the anticipated needs.

Jessica Diehl - Marketing Director

Jessica Diehl does marketing, making sure that what people see about TNT matches what TNT actually does.  In addition to performing all marketing efforts for TNT, Jessica is an active member of The Union County Chamber of Commerce.  An avid supporter of local businesses, she serves as an ambassador, volunteering to help new Chamber members get acclimated to the Chamber, as well as serving at Chamber events and Luncheons. Jessica is also co-chair of the Young Professionals of the Chamber, helping to plan and execute professional networking events for young professionals.

Jeff Gaura - President

Jeff Gaura is the president of the company.  As is documented elsewhere, Jeff is a scoutmaster in a local scout troop, responsible for High Adventure Programming.  He has led boys and other adults to Central Canada, New Mexico and, in 2018, to remote Alaska.  He is a TeamUSA athlete and travels, speaking about the tribulations and joys of representing our country on the International stage.  Jeff’s heart is in Nepal, where he served as a Peace Corps Volunteer and has helped raise money and build 5 schools in the Dang Valley near the Himalayas.  Jeff enjoys talking to Nepali folks about Jesus.

As you can see, the drive to be engaged outside of the working world of TNT runs deep in our leadership, and throughout the company as well.  In the future, we’ll have more blogs that will help you get to know our Engineers and Sales team better.

Ransomware Attacks growing

Posted on: July 5th, 2017 by Jessica Diehl No Comments

Ransomware attacks are hitting countries across the world again, just weeks after TNT posted about the ransomware attack known as WannaCry on our website.

Ransomware Attacks on the rise

While camping recently with a friend who is a police officer in Charlotte, we discussed stolen vehicles.  My friend shared that when he gets a call to investigate a stolen car, nearly all the time, his first level investigations reveal that the owner of the car either was not in possession of his keys or he didn’t lock the vehicle.  The monologue goes something like this.

“Officer, I just went in the store for a minute to buy a cup of coffee.  It was so cold outside that I figured I could just leave the car running for 90 seconds without worrying about anything.”  Then, there is no car.

Or, this story happens.  “Look, I just went right into the school to pick up my son like I always do.  I have done this 100 times before with no worries.  Now, my car is gone.”

In each instance, the driver assumed that the protection required was minimal, since they had not yet experienced the loss.  However, once the loss occurs, they reel; especially when they come clean with their failure to do their part to prevent the theft.

My officer friend thinks the fix is easy.  As soon as insurance stops paying for claims for lost vehicles, the word will spread that if you don’t lock the car, it is your fault, with no exceptions allowed.

What makes the response to ransomware so fascinating is the ongoing failure to take the threat very seriously.  The FBI is not successful at either capturing or stopping the perpetrators from future attacks, and the number of businesses and people who get hurt continues to rise.  That said, you would think people would “get with the program” and address security using a recommended multi-tier approach that includes education, security hardware and software and company policy to prevent it from hitting them.

TNT can help.  President Jeff Gaura personally teaches classes to employees who use computers to help them understand the threat.  He shares strategies to help protect them and their employers from these attacks.  TNT sells both products and services in the form of monthly subscriptions to keep your business safe from this ever-changing threat.

Do you think you are safe?  Most car drivers do.

As a good first step, have your security checked.  We have a one-time fee associated with a network security test and penetration test.  It is inexpensive and auditors as well as business owners love “knowing” what their actual status is without having to rely on some IT person’s opinion.

Learn more about the growing threat of ransomware by clicking on the image below.

Ransomware

Managed IT Services Relieve Frustrations at Monroe, NC Non-Profit

Posted on: April 6th, 2017 by Jessica Diehl No Comments

“The best way to explain TNT and their work is that they exceed expectations…in ability, intelligence, dedication, customer care, responsiveness, etc.” Ashely Lantz, Turning Point Executive Director of TNT's managed IT services

Turning Point is a non-profit based in Monroe, NC that aims to end domestic and sexual assault.  Executive director Ashley Lantz approached The Network Team after receiving less than ideal experience with the current IT provider.  This included frequent disruptions in service that adversely affected the ability of employees to do their jobs effectively. The current managed IT services provider was not meeting expectations with regards to responsiveness and on-site support.

The Network Team performed a migration project that enabled Turning Point’s technology environment to be better equipped in serving its business needs. This included moving Turning Point’s server from their old MSP’s cloud to on-premises, ensuring better up-time availability and simplifying the setup, as well as migrating Turning Point’s e-mail services to the Microsoft Office 365 cloud. TNT also installed Cisco Meraki access points, switching, and a firewall for better WiFi coverage, faster connection speeds, and more reliable security. Referencing the project, Lantz noted that

“TNT has provided the BEST customer service and dedication to our needs that I have ever had. They have consistently exceeded my expectations in response time and grit to get the transition completed successfully. Any issues that have occurred have been corrected. The engineers worked through the night to have us ready to work the next day.”

TNT will continue to proactively manage the IT environment of Turning Point, providing help desk support via e-mail, phone, ticketing system, chat and on-site support.  TNT will also proactively monitor the server, switches, firewall and wireless access points, and maintain continuous IT security.

“I have nothing but great things to say about our transition from our old IT provider to The Network Team (TNT). They worked diligently to make sure that everything was taken care of. We met from the start to decide what was needed and they worked with ourold provider to make sure that everything was moved over correctly. IT transitions are always scary, but TNT made sure to answer all of our questions and worked around the clock to make sure that we weren’t down during this time,” said Lantz.

Wondering if Managed IT Services can help your business?  Learn more by downloading our free E-Book, "Should Your Company Outsource IT?"

Managed IT Services

Could a Whistle Disable Your Cell Phone?

Posted on: March 29th, 2017 by Jessica Diehl No Comments

“Let’s hack and disable your cell phone.  Start whistling in three, two, one, GO!”

Researchers at the University of Michigan and University of South Carolina claim to have discovered that music could be used to disable or, to a certain extent, even control some IoT devices.  The researchers say they were able, through sound waves, to add steps to a Fitbit tracker and interfere with a cell phone app’s ability to control and access Internet of Things devices.

What does this mean?  As IP enabled devices become more and more common, we are culturally on a course that the most likely device that we will use to control and interface with them is our cell phones.  These IoT devices use chip based devices that are built upon the architecture of micromechanical systems (MEMs).  Since these devices lack standards or shared design criteria, there is no governing body to say, “this is good or this is bad,” when a new product comes out.

Common examples where exploits are known and published include the interfaces between fitbits, drones and toy cars with your cell phone.

There are IoT devices in your workplace, today, whether you approved them or not.  For example, I am wearing a Garmin watch that supports Bluetooth and wireless, and it is connect to our office public Wi-Fi.  Since I know the logon information for the corporate Wi-Fi, I COULD put my watch on the private network, and, more likely than not, no one would know that it was a watch.  After all, it has logged on with a valid username and password, and it is logging on from a known location-the office.  What if my watch got hacked and became a proxy for, say, a server that was sending out inappropriate content?

Who is at fault?  The network admin for not having enough security?  Me, for not notifying the network admin that I have an IP enabled watch?  Garmin, for making a watch that is hackable?

The IoT world is changing who we use technology.  The lack of standards or the inability to track device proliferation shall make the news with ever growing frequency.

It is best to respond to this threat before it is a problem.  Mobile Device Management can help.  Learn more about TNT's Mobile Device options here. 

The Network Team