Newsletter Archives


Digital Agent Newsletter

Nexus 7 Drawing!

January's Nexus 7 drawing.

Winner will be announced on or before January 31, 2013 HERE.

If you are not already a subscriber to the Digital Agent Newsletter you will become one by entering this contest.

It pays to subscribe to the Digital Agent Newsletter. You don't have to be a Digital Agent customer to win.
Clay Cheshire, Principal

- on winning last month's Nexus 7. Good luck with your new gadget!

Digital Agent helps rural GA break new ground.

Haralson County, in a rural area west of Atlanta, has benefited from the fiber project associated with the Appalachian Valley Fiber Network. The U.S. Commerce Department’s NTIA awarded a $21M Grant to AVFN, a public-private partnership, for construction of fiber optic cable in the Northwest Georgia and Eastern Alabama areas. The County now has fiber connectivity in all government buildings with high speed, centrally secured Internet access over the entire 3+ mile separated campus. This has allowed for a new VoIP implementation for the failing PBX systems in each of the government buildings.

Digital Agent has been there every step of the way from planning implementation to connecting to securing to installing the phones and computers on the desks. Another example of how Digital Agent can handle projects of any size and scope.

4 Ways to Safeguard and Protect Your Small Business Data
used with permission from SBA.gov, by Caron Beesley

Are you doing enough to safeguard and protect your small business data?

Small businesses are widely adopting data back-up practices to ensure data is retrievable should a disaster occur, but gaps remain. According to a July 2012 study by accounting software company Sage, the bulk of small businesses are backing up key data such as financial information, but most businesses back up that data on-site only. Furthermore, the study found that only 38 percent of surveyed small businesses have a formal emergency or disaster preparedness plan.

Read more

Ransomware in the Enterprise
used with permission from Microsoft
by Marianne Mallen, Vidya Sekhar, & Ben Hope

The enterprise space isn’t immune to emerging malware threats – an infection can be costly and frustrating to any organization. One problem affecting the enterprise space is ransomware - a type of malware designed to render a computer or its files unusable until you pay a certain amount of money to the attacker. This threat is affecting machines in greater numbers, and because it locks users out of their files, it can be an expensive problem for an organization with time-sensitive deadlines.

Read more

The Pocket Office Revolution
used with permission from MSFT for Work

Fun fact: your smartphone contains more computing power than the entire Apollo program used to put astronauts on the moon. That kind of power in your pocket means more than just playing Angry Birds: it’s the means by which technology is finally enabling business to move out of the cubicle and into the pocket office revolution—the most disruptive change to work since replaceable parts.

Read more

Tips, tricks and techniques for mastering Word
used with permission from HP Technology at Work

As ubiquitous as Microsoft Word is on our work computers, it’s amazing just how few of its powerful features most people actually use. Many of us get by using the bare minimum of options, but getting the most out of Word is not just about the features you don’t use at all or didn’t know about; it’s also about shortcuts to features you might be using all the time.

Read more

Avoid tech support phone scams
used with permission from Microsoft Safety & Security Center

Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft.

They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following:

Read more

December Newsletter
In this issue:

Digital Agent helps rural GA break new ground.

Safeguard & Protect Your Data

Ransomware in the Enterprise

The Pocket Office Revolution

Tips for Mastering Word

Avoid Tech Support Phone Scams

Debunking Cyber Security Myths

Business Continuity Tip

Debunking Cyber Security Myths
used with permission from Microsoft
by Marian Merritt

How did you decide where to live? You probably wanted a good neighborhood close to your work or local shops, maybe in a top school district. I’ll bet you gave it a lot of thought and did your research. But, even if you are lucky enough to live in a safe area with low crime rates, you probably still lock your house when you go out and check the door before you open it to a stranger. We take certain precautions to ensure our safety.
Read more

Business Continuity Tip

Winterize Your Kit

This winter there was a story on the news about a family of 6 that survived for two days stranded in the wintery Nevada Mountains. This remarkable story of survival prompts many of us to wonder – what would I do in that situation? Would I have the tools, resources and know-how to help my family survive?

Let's not leave it to chance. As travel picks up during the holiday season, it's important to stock your car's emergency kit with the winter essentials. Supplies like rock salt, extra hats and blankets, and emergency flares will help to ensure your employees and co-workers are prepared no matter what.

For a full list of supplies, click here for a comprehensive checklist from the Center of Disease Control and Prevention.

Quote of the Month

I am certain there is too much certainty in the world.

- Michael Crichton

Digital Agent  |  1000 Cir 75 Pkwy Ste 550  |  Atlanta, Georgia  30339  |  4044463185  |  www.digitalagent.net