Contact Us Today! 408-927-8700
facebooktwitterlinkedinRSS

Rick Dexter

This is some blog description about this site

Rick Dexter is founder and CEO of NDYNAMICS. He has over 30 years of experience designing and supporting computer networks, particularly for small and mid-sized businesses seeking reliable and scalable IT infrastructure.

Why Your IT Toolkit Should Include a VPN

Why Your IT Toolkit Should Include a VPN

Have you ever felt like someone was watching you while you’re doing your work from somewhere outside of your business’ infrastructure? If you’re working from a remote location, this situation might not be far from the truth. If you’re not using a private connection, onlookers could see everything that you’re doing or steal data. How can you keep your business secure while working out of the office?

Continue reading
0 Comment

Tip of the Week: How to Avoid Spam Emails

Tip of the Week: How to Avoid Spam Emails

Would you just give your bank account information to anyone who called you up and asked for it? Probably not. For the same reason, you wouldn’t just download attachments from your email messages without a second thought. This can be a dangerous practice, as some of the most common threats nowadays spread themselves via unwanted email attachments. It’s important that you can identify when it’s the right time to download an attachment, and when it’s best to just leave it be without exposing your business to unnecessary risk.

Continue reading
0 Comment

Are Mobile Devices Putting Your Workplace at Risk?

Are Mobile Devices Putting Your Workplace at Risk?

How many devices find their way into your office every day? In this age of mobile devices, it’s no surprise for each of your employees to have everything from a smartphone or tablet, to wearable technology like a Fitbit. Depending on the type of device, you’ll want to ensure that you have every opportunity to secure it so that it doesn’t become a security problem later on down the road.

Continue reading
0 Comment

Are the Apps on Your Device Safe?

Are the Apps on Your Device Safe?

It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re charged with taking the security of your mobile devices into your own hands, but thanks to Google Play Protect, this responsibility is a bit more mild.

Continue reading
0 Comment

Tech Term: Understanding Encryption

Tech Term: Understanding Encryption

With data security becoming paramount for almost everyone, encryption is one of the more important technology terms you will need to know. Since data security has to be a priority--not just for your business--but for you, understanding what encryption is, and how its used can put you in a better position to understand tomorrow’s security solutions. For this week’s tip, we will take you inside cryptography, and more specifically, data and network encryption.

Continue reading
0 Comment

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Upcoming Events