Internet Safety – 5 Best Practices for Keeping Your Business Safe

Posted by Brandt Weatherl on Jul 13, 2016 3:09:14 PM


It is no secret that your business could be under attack by cybercriminals at any moment of any day. It is the basic fact of business in the internet age. Providing small business security against these probing cyber criminals requires a culture of security within a business. Check out the five best practices for keeping your business safe below.

Read More

Topics: Security

Service Desk vs Primary Engineer Model

Posted by Jeff Newton on Jul 6, 2016 10:21:33 AM


If you have looked to outsource your IT needs in recent years the words, "Service Desk" or "Primary Engineer" have probably come up. What do they really mean and what is the difference?

The Service Desk can be defined as - The single point of contact between users and IT service management. Or more simply put the individual on the other end of the phone when you call the designated phone number. Typically a Service Desk team is made up of tier one support level engineers who will do their best to complete your request within a given time frame. If they are unsuccessful at solving your issue they will then push you up to a tier two individual, and so on until your request meets the corresponding tier to provide a resolution.

A Primary Engineering model takes a more strategic approach to providing IT support. A company is typically matched with a team of one or two tier two level support engineers, based on their industry, needs, culture and support requirements. The primary engineer(s) are available 24x7 to handle anything that may come up in the companies environment. Typically the engineer(s) are assigned to a select few number of accounts that they then become responsible for their overall success and most of the time become a part of their clients team and organization.

How do you choose one over the other? Well, that’s for you to decide but here are a few key factors to consider:

Read More

Topics: Outsourced IT

7 Things You Should Know About Allo Coming to Lincoln

Posted by Blaine Kahle on Jun 22, 2016 3:23:57 PM

You may remember hearing the buzz about Nelnet acquiring Allo in 2015. Prior to the acquisition Allo was and still is providing fiber optic network options to Western Nebraska. After the acquisition Allo became the first company to provide fiber optic cables from the street directly to homes and businesses across the city of Lincoln.

What does this mean for your business?

Read More

Topics: Allo

Top 5 Things to Consider When Debating Internal vs Outsourced IT

Posted by Brandt Weatherl on Jun 15, 2016 11:47:04 AM

The world of technology is always changing. Recently, IT has become a multifaceted Human Resource issue as companies look to hire good IT people, find someone with the knowledge to manage them, and then keep them in that position, all while staying up-to-date with technology certifications and trainings.

Here are the top 5 things to consider when debating hiring an internal IT staff or outsourcing your IT needs.

Read More

Topics: Outsourced IT

Windows 7 & Windows 8 End of Sale – What you need to know before upgrading to Windows 10

Posted by Jessica Spangler on Jun 9, 2016 12:08:23 PM

Windows 10, quickly became a hot topic after its release date in July, 2015. Many people were extremely excited to take the leap and upgrade to the latest software. For those of you who have waited – you are probably in a much better place. Before upgrading it’s vital to understand the details behind the change and the safest way to upgrade your computer.

You may be thinking, “but I have Windows 7 or Windows 8 which goes END OF SALE this year.” End of Sale just means that you will no longer be able to purchase PC’s with this version of Windows pre-installed. Luckily, support for Windows 7 and 8 will be covered until 2020 and 2023 respectively.


What should you know before upgrading to Windows 10?

Read More

Topics: End of Life

Top 10 Benefits to having a Mobile Device Management Plan

Posted by Jeff Newton on Jun 1, 2016 3:48:46 PM

Mobility, efficiency and time sensitivity are all too common business drivers in today's world. With the presence of mobile devices in every pocket in America, the need for businesses to keep themselves and their clients secure has become a major topic in technology. What used to all be data stored and secured on mainframes, servers or CRM databases locked within the walls of an office building is now very easily in the pocket or purse of all the employees, exposed to the world every moment of every day.

Enter Mobile Device Management or MDM, the plan behind the security of those walking computers and your companies valued information.

There are currently three scenarios within a company in regards to mobile devices:

1. Company Furnished Device

2. Bring Your Own Device (BYOD)

3. Mobile Devices Not Available for Employees to Link to the Company 

Read More

Topics: Mobile Device Management

The Year of Ransomware: What you need to know to protect your data

Posted by Blaine Kahle on May 25, 2016 4:10:39 PM

"Help_Decrypt_Your_Files," the year of ransomware has officially arrived. These 4 words can turn a business upside down with one click of the mouse. Your calendar, your kid's baseball schedule, payroll information for hundreds of nurses - to nothing, everything is encrypted. The emotional moments following are filled with panic and distress; someone or something has locked all of your files. A popup will then notify you of a specific amount of time you have to pay via untraceable bitcoins in order to retrieve your files, or lose them forever.

This has become the reality for many businesses across the country. With 90,000 machines being infected on a daily basis, it’s a dire situation. For Hollywood Presbyterian Medical Center in Los Angeles, it was more than a harsh reality. After being attacked with ransomware, the hospital was forced to shuffle its patients to nearby facilities for weeks as they paid their attackers to regain file control.

Traditional antivirus solutions require manual intervention by a human to review new potential virus or malware threats. Only after a threat has been captured and analyzed is it is added to the database of known threats. While this was a successful method for a long time, hackers have since found ways to disguise and mutate viruses to pass detection. So, while the traditional method of virus detection helps to contain known “old” viruses, it does very little in preventing new ones from invading.

What do you need to know to protect your data?

Read More

Topics: Security

Hello World, it's me Five Nines! This company is filled with insanely smart people who are always collaborating inside our walls but rarely get the chance to share their knowledge! This blogs sole purpose will be to allow insanely smart people to share information from well, behind their computer screen of course!

Technology is an ever changing beast. Follow us on our journey to provide Nebraska with the knowledge and advice to stay ahead of the technology curve in business and your personal life! Five Nines fans, rest assured we will always throw a little cultural humor in along the way.

Ready to join us on this journey? Subscribe to the blog to receive up to date information!

Subscribe to Email Updates