August 2013
In This Issue:

Brian's Blog
Business Referral Program
Protect Your Small Business
Avoid Repeating Yourself
Patch Right - Keep Hackers Out
Business Continuity Tip
Quote and Cartoon

Business Continuity Tip

Beat the Heat

As we prepare for the heat waves of the summer, we're all reminded of the real risk and dangers associated with the rising temperatures. Here are some tips and resources to help you beat the heat, no matter where you live.


 Laugh a Little


 Quote of the Month

How many people here have telekenetic powers? Raise my hand.

Emo Philips

Follow us on . . .
Please share this newsletter
with anyone who might be interested.
Brian's Blog
by Brian Gregory, President

If your bottom line could use a boost, one of the best things you could do is have us evaluate your telecom expenses. We work with companies every day to evaluate their current bills for voice and data services (phone lines, Internet connectivity, branch office connections), evaluate their current needs, and align them with the best solutions. We’ve helped several companies reduce their telecom expenses by over $50,000 per year! However, we can help even if your telecom expenses are just a few thousand dollars per year. Give me a call – your bottom line will thank you.

I do have one more thought to add to our cloud discussion. I need to point out that in all cases I was referring to paid cloud services. Free cloud services are pretty much never appropriate for business use, and Google gave us a reminder of that this month. In a legal brief filed by Google on July 13th, they cited a statement recently made by the Supreme Court “Indeed, a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties”. Even with paid cloud services, privacy and security remain the most significant concerns, and it is imperative that you understand and trust the service provider’s privacy and security policies. However, certainly as these developments indicate, any data you entrust with a free cloud provider should be considered fair game. The service provider is free to use and expose that data in any manner they choose. Keep in mind, if you send email to a gmail user, (or other free cloud service), you are also surrendering your expectation of privacy.

For more of my rambling thoughts, check out my blog.

Business Referral Program

Send your referrals to
or e-mail

Your personal referrals are the greatest compliment we can receive. Referrals are one of the primary reasons we have been successful for over 20 years. Our business referral program thanks you for assisting us in finding new clients in need of IT resources. If one of your referrals engages with us for projects or services, you may be eligible to receive a $50 Visa gift card. For more information, visit or give us a call!

7 Ways to Protect Your Small Business from Fraud and Cybercrime
used with permission from
by Caron Beesley

How secure are your small business assets from fraud, identity theft and cybercrime?

According to the Association of Certified Fraud Examiners (ACFE), companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than larger companies and non-business owners. One of the most frequent sources of fraud is credit card abuse – largely due to the fact that few business owners actually take the time to go through every line item on their bill or choose to mingle business and personal accounts.

Read More

Avoid repeating yourself: Create a Word macro
used with permission from Microsoft
by Emily Warn

Repeatedly entering the same information in document after document, over and over...there has to be a quicker way, right? Word macros can save you time (and potentially, some sanity) by automating repetitive tasks.

Let's say you're a real estate agent. Every time you sell a house you have to add a client's name and address to multiple documents. Creating a macro automates adding all of a client's contact information wherever you need to.

Setting up the macro

Read More

Patch right and keep hackers out
used with permission from HP Technology at Work

In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes.

Vendors are working to make patching easier and more trustworthy - like Microsoft and its monthly Patch Tuesday release - but you shouldn't necessarily deploy every patch to every system in your enterprise the day it's released. To best protect your network, you should develop a plan for patching that is based on best practices and tailored to your unique enterprise.

Read More

Network Innovations, Inc.  |  2012 Prairie Circle, Suite B  |  Olathe, Kansas 66062  |  (913) 780-0494