CS Design Studios has now partnered with LeeShanok Network Solutions. We were invited to their event today, which had a great turn out! They discussed how Cisco Desktop Vitualization is using Cisco UCS B-Series Blade Servers and Nimble Storae CS-Series storage appliances to partner on SmartStack for a virtual desktop infrastructure (VDI) solution.
With SmartStack for VDI you can:
- Lower security risks on your VDI
- Simplify deployment with pre-tested reference architectures
- Improve the ROI and lower costs with simple, efficient infrastructure
- Flexibly scale to handle the growing number of users and increasing end-user requirements
Virtualization and Storage Event with your IT Heroes
ALL CFO's, CIO's, IT Directors, IT Managers, Technology Executives, Operations Managers of Companies with 50 or more employees are invited to:
THE AVENGERS 2 : AGE OF ULTRON MOVIE AND LUNCH EVENT
Join us on May 1, 2015 from 11 am to 3 pm for the battle of the century.
Where earth’s greatest heroes LeeShanok, Cisco, VMware and Nimble will battle the evil forces of high IT cost and low productivity and show you a way to reduce IT cost and improve productivity.
These powerful Heroes will use their combined powers to create the greatest infrastructure utilizing Cisco UCS technology, VMware vSphere virtualization platform to enhance your desktop experience (VDI) on Nimble Storage for high performance efficient storage. This is all brought together by your IT Heroes.
Right after the IT Heroes presentation, we will present the Marvel Heroes and at the end of the event you will have time to mingle with other IT professionals and the IT Heroes: Cisco, VMware, Nimble and the LeeShanok Team.
REGISTER FOR THE EVENT HERE:
Who's managing your IT security? Security is not just product but a multilayered process including: Hardware, Software, People, Processes, & Policies. Keep the bad guys off of your network. We help healthcare instructions, financial firms, banks, real estate, construction, architectural, and engineering companies with 10 to 250 employees with the following security levels:
- Security Best Practices
- Next Generation Firewalls
- Intrusion Prevention Services (IPS)
- Intrusion Detection Services (IDS)
- Advanced Malware Protection
- Meet Regulatory Compliance (PCI, SOX, HIPAA)
- Meet Legal Compliance
- Security Event Monitoring and Auditing
- Multi Factor Authentication (Passwords alone are not enough)
- Certified Network Security Specialists
Don't forget to RSVP & Attend Our: How To Secure your Cloud Solutions and Office 365 for Business Event TOMORROW! - TEMPE
As your Networking Solutions Experts, we are going to be discussing how to keep your Cloud Solutions secure and how to make the most of your Online Strategy:
Register to win a Microsoft Windows 8 Tablet, Copy of Office 2013 Professional and more!
Business Owners, IT Managers, CIO's, CTO's of companies with 50 employees and above should make sure to attend!
Wednesday March 18, 2015 from 11:00 AM to 1:30 PM MST
Microsoft Southwest District Offices
60 E. Rio Salado Pkwy
Tempe, AZ 85281
Inspire Data Solutions
Here’s some of our pictures from our March 18th’s How To Secure your Cloud Solutions and Office 365 for Business Event in Tempe
We discussed how to keep your Cloud Solutions secure and how to make the most of your Online Strategy by understanding the benefits of cloud computing and security features, 2-Factor Authentication, bridge on premises IT security to cloud security, tips on how to manage cloud solutions, how to use existing cloud solutions with Microsoft Office 365 for Business, how to keep files secure with SharePoint Online, password strategies and much more!
Craigslist Email Malware
There is a malware attack that originates from Craigslist job postings. Although the initial target is narrow, this could quickly spread as the threat pattern changes fairly quickly. This makes detection harder for antivirus to detect.
This new threat’s main point of infection is via an email message. Most of the time the email will look something like the text below, and will have a Microsoft Word file attached.
“Hey, My name is [redacted] and I'm interested in your posting. Attached is my CV. Thanks Sent from my iPhone “
The best course of action is to delete the email, and NOT open any attachments it may have.
If you have any questions about this or questions about cyber security and virus threats, please don't hesitate to contact us: