ANX Corporate Blog
Showing 91 through 95 of 159 total posts
Twitter, OAuth, Contests and More
So it has been a little while since I talked about anything website related, so I figured I would take this chance to do so and fill you in on some changes that have happened around here - along with some things that are in the works!
First and foremost, we have launched our new and improved Media section. To start with, this section will be supplying you with podcasts and webinars that are presented by ANX. It will be expanded in the future to accomodate related downloads (such as slides/powerpoints and the likes). There are also RSS feeds associated with these either as a combination, just webinars or just podcasts.
We have also opened this media up to anyone. You are not required to create an account on ANX.com to download/subscribe to/view this media. However, by doing...
Read more
Don't let your information get CAUGHT!
Over the past decade, a number of standards, laws and regulations have emerged that require organizations to provide strong security and privacy guarantees. The end result is high expectations when it comes to cyber security awareness and training, both of employees and customers. Take a look at this Anti-Phishing game. For those unfamiliar with the term, a phishing attack occurs when bait is used to “catch” financial information and passwords. This game brings awareness to the scam, while providing key warning signs of phishing scams. When a user falls for a simulated attack and clicks on the URL, PhishGuru takes advantage of the “teachable moment” in the form of a cartoon that offers steps to avoid falling for these attacks.
Banca Poploare di Sondrio, an Italian bank,...
Read more
Broadband Support- Don't leave your Network without It
In our last blog, we talked about the benefits of incorporating broadband (BB) into the corporate WAN. Now, let’s talk about how you realize those benefits. Really, it’s all in the support. Unlike those more expensive private, leased-line options, BB is not 99.99999% reliable. Come on, there is no such thing as a free lunch, right? Being that much cheaper (for so much more bandwidth), there had to be a catch. And the catch is that BB flaps and dips. You know this from your Internet connection at home.
The key to making BB reliable enough for deployment in a demanding corporate environment is having the tools and support to start remediating performance loss immediately upon occurrence. Imagine having a tech sitting with you at home ready to trouble-shoot your Internet...
Read more
Contest: Share you funny or harrowing remote access story for a chance to win $100 or a HD Flip Video Recorder (Your Choice)
Do you have a remote access story to share? Perhaps you’ve had to access your network from a strange place? Or maybe you have a story about a time when you’ve had a heck of a time accessing your network remotely?
ANX connects thousands of users to their company networks each day. Our Help Desk Team answers questions working from hotels, airports, commuter trains, the beach and even the opera! Whether you use ANX's award-winning remote access service or someone else's, we want to know where you are when remote work happens.
Have you needed to access your corporate networks externally in a pinch? We have too.
So we want to know…
What was your funniest or most trying remote access experience? Share it with us, and we will enter you into a drawing for a $100...
Read more
Red Flag Rules... Ready, Set, Comply!!
Red Flag Rules…. Ready, Set, Comply
Part 1: Interpretation
On June 1, 2010 the Federal Trade Commission will implemented compliance to the Red Flag Rules. While the official date has been somewhat of a moving target, it looks like June 1st is the final. So the questions to ask is are you ready?
As with most regulatory compliance statues they are heavy on ambiguity and light on practical substance. As such interpretation is left up the person responsible for first determining IF Red Flag applies to you and if so what to do about it. The good news is that Red Flag Rules are based on IT Governance which is based in part on ISO 27000:2005 standards for Information Security best practices.
This is part one of a three part blog on Red Flag Rules. In part one we cut through...
Read more