2016 December Email Newsletter

November 21st, 2016

Happy Holidays from Proactive Network Technologies! We will be closed on the upcoming holidays on December 26th and January 2nd. Happy Holidays!

10 top holiday phishing scams

IT WORLD
Ryan Francis By Ryan Francis, CSO

Here are a six holiday threats to watch out for.

2016 November Email Newsletter

October 25th, 2016

Security Awareness Training
Employees are the building blocks of every business, so it’s key that they are equipped with the best knowledge and trained with the proper procedures. With ever-evolving cyber threats like phishing attacks, malware or viruses, how sure can you be that traditional security awareness methods are cutting it?

That’s where Proactive Network Technologies comes in.

2016 October Email Newsletter

September 27th, 2016

Upcoming Client Appreciation Event!
Save the date for the Friday November 11th Portland Trailblazers game at 7 PM!

We’ve got a limited number of tickets and they are sure to go fast.

Email or give us a call if you are interested in reserving a couple tickets for your company in the Skybox suite.

2016 September Email Newsletter

August 24th, 2016

Security Awareness Training
Employees are the building blocks of every business, so it’s key that they are equipped with the best knowledge and trained with the proper procedures. With ever-evolving cyber threats like phishing attacks, malware or viruses, how sure can you be that traditional security awareness methods are cutting it?

That’s where Proactive Network Technologies comes in.

2016 August Email Newsletter

July 29th, 2016

Security Awareness Training
Employees are the building blocks of every business, so it’s key that they are equipped with the best knowledge and trained with the proper procedures. With ever-evolving cyber threats like phishing attacks, malware or viruses, how sure can you be that traditional security awareness methods are cutting it?

That’s where Proactive Network Technologies comes in.

2016 July Email Newsletter

June 24th, 2016

The Value of a Hacked Company

Krebs on Security | Written by Brian KrebsMost organizations only grow in security maturity the hard way — that is, from the intense learning that takes place in the wake of a costly data breach. That may be because so few company leaders really grasp the centrality of computer and network security to the organization’s overall goals and productivity, and fewer still have taken an honest inventory of what may be at stake in the event that these assets are compromised.

2016 June Email Newsletter

May 30th, 2016

Hosted Voice
Voice is a central piece of the puzzle for hosted unified communications or UCaaS, unified communications as a service. Proactive Network Technologies offers multiple solutions for Cloud based business telephony; we do this because we realize that not all businesses have the same priorities.

2016 May Email Newsletter

May 17th, 2016

Hosted Voice
Voice is a central piece of the puzzle for hosted unified communications or UCaaS, unified communications as a service. Proactive Network Technologies offers multiple solutions for Cloud based business telephony; we do this because we realize that not all businesses have the same priorities.

2016 April Email Newsletter

March 11th, 2016

End User Tips for Connecting to Secure WiFi
by, Ryan Orsi, Director of Strategic Alliances at WatchGuard Technologies

Ever since businesses began to offer Wi-Fi access to customers, experts have warned that open hotspots are not secure. Open Wi-Fi hotspots don’t ask a user for a password, so most data ferrying between users’ devices and the access point(s) are not encrypted.

2016 February Email Newsletter

January 20th, 2016

Hosted Voice

Voice is a central piece of the puzzle for hosted unified communications or UCaaS, unified communications as a service. Proactive Network Technologies offers multiple solutions for Cloud based business telephony; we do this because we realize that not all businesses have the same priorities.