December, 2013

Happy New Years from Marcus Networking Inc.

We at Marcus Networking Inc. wanted to be the first to wish you a Happy 2014 New Year! We hope you have a happy and healthy year full of prosperity.   
Read more

Day 5 of the Do’s and Don’ts of Protecting Your Data

5 Do – Publish policies and educate employees. Data security is not just the responsibility of the IT group — it also depends on the day-to-day behavior of all employees. But employees need help to become security-aware. To encourage positive behavior by employees, IT departments need to publish policies that clarify expectations and the reasons […]
Read more

Marcus Networking Listed in 2014 Book of Lists

Did your IT or Telecom Company make the list? We sure did for 2 different categories. We are proud to be associated with the Phoenix Business Journal and what they stand for.
Read more

Day 4 of the Do’s and Don’ts of Protecting Your Data

4 Do – Use integrated products with simplified operations and management. SMBs are taking advantage of the same new technologies as large enterprises. Unfortunately, all too often, IT administrators end up with separate management tools for each new technology. For example, in a recent study, 50% of IT managers at SMBs reported using three or […]
Read more

Day 2 of the Do’s and Don’ts of Protecting Your Data

2 Do – View security and backup as partners in protecting data. Even organizations that pay a lot of attention to security sometimes look at data backup as a secondary priority. But security and backup are actually equal partners in protecting data. To minimize downtime of business processes, organizations need to prevent the loss of […]
Read more

Day 1 of the Do’s and Don’ts of Protecting Your Data

Advice for SMBs on simple but effective security and backup Small and midsized businesses have a particularly challenging time protecting company data. They have many of the same security and backup challenges as large enterprises, but fewer resources in terms of funding, time and specialized expertise. The stakes are high: Symantec’s State of Information Survey […]
Read more

Protecting yourself from a security breach

Being vigilent about properly disposing of old equipment will assist you in protecting yourself from potential security breaches. According to Tech Republic, “systems running software with high licensing costs are decommissioned, and system breakdowns lead to consolidation of functionality rather than repairs. This may increase the rate at which we dispose of computer equipment — [...]
Read more

The battle of BYOD

A great article on BYOD…. As a IT company we deal with these issues daily.   Submitted by Teo UC News on Tuesday, August 13, 2013 The increased adoption ofBring Your Own Device(BYOD) policies has resulted in the need for additional security resources at many enterprises. As IT professionals struggle to address security concerns associated […]
Read more

Telecommuting Leads to Better Workers

Submitted by Teo UC News on Wednesday, August 14, 2013 Anything that can enhance worker productivity and engagement is worthy for any enterprise leader to pursue. By improving employee performance by just a few percentage points, companies can see that spike turn into a positive monetary gain. With the right business communications technology, executives may be able […]
Read more