Contact Us Today! 408-927-8700
facebooktwitterlinkedinRSS

Rick Dexter

This is some blog description about this site

Rick Dexter is founder and CEO of NDYNAMICS. He has over 30 years of experience designing and supporting computer networks, particularly for small and mid-sized businesses seeking reliable and scalable IT infrastructure.

Why You Shouldn’t Chuck Your E-Waste In the Garbage

e_waste_management_400.jpgToday’s society practices a policy of upgrading to brand-new devices whenever the next big thing drops. We see this all the time when businesses want to keep up with the latest trends by upgrading to new workstations that utilize recent operating systems, or because their old hardware feels slow. However, this can have a negative effect on the environment in the form of e-waste.

Continue reading
0 Comment

How a Nearby Hacker Can Access Your Phone Through Google Now and Siri

b2ap3_thumbnail_cell_phone_hack_400.jpgThese days, mobile exploits aren’t anything to be surprised about. Most people consider their smartphones to be more secure than their desktops or laptops, but the fact remains that there are just as many exploits, if not more, for mobile devices as there are for PCs. One of the latest mobile threats that can infiltrate your iPhone or Android device takes advantage of Siri and Google Now.

Continue reading
0 Comment

Tip of the Week: 4 Common Email Mistakes and How to Avoid Them

b2ap3_thumbnail_email_gaffs_400.jpgEmail is a staple in offices around the world, but many organizations are finding it easier than ever to make simple mistakes that can be easily avoided with proper training procedures. It’s a best practice to ensure that your team is adequately trained on how to efficiently use your chosen email client to its maximum potential. Here are four of the most common email mistakes that the average employee can make, and how they can easily be avoided in the future.

Continue reading
0 Comment

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpgWith new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to truly shake the public into action; for example, what if the Central Intelligence Agency were hacked by a teenager?

Continue reading
0 Comment

3 Ways to Make Sure that Your Technology Doesn’t Get Stuck In the Past

b2ap3_thumbnail_cloud_management_400.jpgThe purpose of business technology is to propel an enterprise into the future. Yet, too many businesses are reluctant to make major adjustments to their current IT systems, wrongly believing that it’s not worth the investment. The best way to approach upgrading is to use an IT roadmap that lays out a plan for your technology’s future. This way, you won’t be surprised by what the future holds.

Continue reading
0 Comment

Newsletter Sign Up

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Upcoming Events