September 28th, 2009


SACRAMENTO, Calif. – GNT Solutions has been named one of the Sacramento Region’s Fastest Growing Companies by the Sacramento Business Journal.

In September, the Sacramento Business Journal announced its 2008 Fastest Growing Company list makers. GNT Solutions was ranked 14th on the list with a significant growth of 163% over the past three years.

Topic News
October 25th, 2016

2016october25_security_bWhen it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on understanding the variances between two-factor and two-step authentication, read this article to learn more so you have a fuller understanding of your cyber security.

If you are seeking out a way to improve your business's cyber security, both for your business itself as well as for your customers, you are likely looking at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cyber security. And in current cyber security, many businesses use the terms two-step and two-factor authentication interchangeably.

There are, however, subtle differences between the two. A two-step authentication process requires a single-factor login (such as a memorized password or biometric reading) as well as another of the same type of login that is essentially sent to the user. For example, you may have a memorized password for your first step and then receive a one-time-use code on your cell phone as the second step.

Two-step authentication does function to add an extra step in the authentication process, making it more secure than a single-step authentication (i.e. just the password). However, if a person or business is hacked, it will do only a little to stop hackers from getting a hold of whatever they are looking for.

On the other hand, there is two-factor authentication (sometimes referred to as multi-factor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate. For example, it could be a combination of a fingerprint or retinal scan as well as a password or passcode. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication.

In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, you can be certain that you are using the right type of authentication in your business to keep your business and customer information as secure as possible.

Your network needs the best security technology has to offer. What type of authentication that results in is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call us today for all the help you could ever ask for.

Published with permission from Source.

Topic Security
October 19th, 2016

2016october19_businessproductivity_bWith YouTube, Reddit, and Instagram just a few clicks away, it’s a miracle you can get anything done during an eight-hour workday. As you’re probably well aware by now, there is a huge possibility for employees to waste precious time on sites not related to your business. This problem arises when a company does nothing to monitor or regulate internet usage. To fix this, consider using internet monitoring software.

Time-saving measures At times, the internet can be very addictive. Internet monitoring software saves employees from the temptation of online videos and games by restricting access to time-wasting sites that you deem unnecessary for business. But internet monitoring software doesn’t even have to be as extreme as denying permission to harmless social media websites. Just letting your employees know that you’ll be randomly monitoring their internet activity discourages them from taking prolonged visits to their Instagram page.

Avoiding harmful websites The internet hosts plenty of unsavory links and websites. Employees who haphazardly click phishing links or access malware-ridden pornography sites can put your business at risk. Working with infected machines can slow down the entire system and, in some cases, completely halt operations. But by using internet monitoring tools you can restrict access to dangerous websites, and identify reckless employees to remove their internet privileges, if necessary.

Controlling bandwidth usage Even while using the internet for the right purposes, bandwidth can be used up quickly. Internet monitoring gives you up-to-the-minute reports on your bandwidth usage. Once you have a clear understanding of your company’s overall bandwidth usage, you can then control its expenditure. This feature allows you to prioritize bandwidth for critical business applications and reduce bandwidth for less necessary websites.

Increasing productivity on the internet Internet monitoring software may be a powerful tool, but it should be used responsibly. As a business owner, you need to walk a fine line between over-surveillance and under-surveillance. What you should do is establish a clear internet policy. Then, explicitly define the disciplinary measures to be dispensed on anybody who goes against the requirements of the internet policy. And deal with time-wasting employees on a case-by-case basis. It’s unreasonable to remove everyone’s Facebook privileges because one or two abused theirs.

Employee productivity can be difficult to achieve, especially with the proliferation of what we would like to call, “procrastination software.” But with web monitoring software, you can truly get your business -- and your employees -- back on track. Looking for more ways to increase business productivity with technology? Give us a call. We’ll be happy to make suggestions.

Published with permission from Source.

Topic business
October 12th, 2016

2016october12_windows_bAt one point, Microsoft claimed it could convince 1 billion users to use their Windows 10 operating system. Obviously that’s an unattainable goal for the foreseeable future, but it hasn’t stopped Microsoft from releasing tools to push more people to their software. With its sights set directly on business deployments of the operating system, the tech giant has released a new tool to oil the gears of large-scale migrations. We’ve got all the details on the forthcoming software right here.

Named the Windows Upgrade Analytics Service (WUAS), Microsoft is gifting administrators and service providers with tools very similar to those it uses to do its own bulk installs. By gathering data on multiple devices, applications, and hardware drivers on a network simultaneously, massive disruptions and troubleshooting events can be avoided entirely.

If any of these variables are customized or outdated, they may not work in a Windows 10, derailing a focused migration workflow. Available right now, this service does more than just inventory your workstations, it also uses the data it has gathered to guide administrators step-by-step through the most efficient order of upgrades possible.

If all your IT components are uniform and compatible with the most recent Windows 10 service pack, it will recommend a straightforward migration. However, if you have pockets of older, or more specialized machines, WUAS may suggest splitting the process up by upgrading those machines first to smooth the process.

Microsoft delivers the features of this service through its cloud-based Operations Management Suite. Make sure it's installed on your machines and add ‘Upgrade Analytics’ from the ‘Solutions Gallery.’ From there, a simple wizard will guide you one item at a time through the four-step process.

Windows gets several updates per year, and it's a waste of company resources for your staff to be stuck waiting for their machines to get back up and running while they update. Why not just outsource the entire process to professionals who will finish the task in a fraction of the time? Our managed services come with a flat fee, regardless of whether you want to upgrade all or just some of your workstations. Don’t believe us? Just call today to find out more!

Published with permission from Source.

Topic windows
October 11th, 2016

2016october11_virtualization_bMicrosoft has found a way to incorporate virtualization protocols into the security of its Edge browser. With the protection of internet browsing inside a virtual container, hackers have a harder time exploiting unsuspecting web users. Read on to discover whether this development will compel you to switch internet browsers in your office.

Browsers are one of the most popular avenues for cyber-criminals to deliver their wares, and new security measures by Microsoft set out to reduce that risk significantly. In a first for internet browsers, Microsoft has burnt any potential bridges between malware and PC hard-drives. The new and virtualized Edge is only available for Windows 10, and administrators will be required to choose what runs inside, and outside of the container.

When enabled, malware cannot gain access to anything outside of the Edge browser. Think of it like reheating your leftover lasagna inside a covered container; when that gooey mozzarella tries to muck up the walls of your microwave, your tupperware ensures it stays clean. So in our case, the cheese is malware, and even if you download malware from an untrusted site, it cannot reach beyond the container that Edge uses to protect your files.

According to tests run by Microsoft, the Edge browser has the lowest chances of malware infection when compared to other browsers running on Windows. And that means a lot when you consider that when it comes to cyber-attacks, the default Windows browser is always the first target.

In addition to creating containers for limiting the exposure of workstations, any malicious data is deleted by resetting the virtual space after users are done with it -- not unlike tossing your dirty tupperware into the dishwasher after reheating last night’s saucy noodle goodness. Permanent cookies aren’t kept after the reset, and it’s impossible for malware to continue running without a space to do so. Every new session starts with a clear, clean browser.

For those new to the virtualization game, it may seem like running Edge in this environment could slow down the machine. But Microsoft has guaranteed a cutting-edge, extremely light burden when enabling the service. When your organization is looking for virtualization services, from creating all your desktops in a virtual, internet-based space, to simply making your browsing more secure with virtual Edge browsers -- there’s only one team to call. Pick up the phone and dial us today. You’re a short consultation away from a cheaper, safer IT infrastructure.

Published with permission from Source.

October 10th, 2016

2016october10_socialmedia_bFacebook has been used by people to connect and share information for a long time. However, until now Facebook struggled to break into the world of business. The good news is that starting today, the launch of Facebook at Work will make it possible to incorporate social media into your company’s workflow. Take a look at our review of the new service here.

Facebook releases generally take place in the company’s home country, the US. However, this time around the social media giant will launch its take on enterprise communication tools in London, where Facebook at Work was first dreamed up.

Facebook at Work has set its sights on improving productivity in the workplace. In addition to aesthetic updates like changing from the iconic blue color to a business-friendly grey, users will have a totally separate platform from the original Facebook. Work accounts are strictly for work interactions and will not mix with users’ personal profiles. So how is it different from just creating a work-friendly account on the original platform?

Facebook at Work creates a microcosm of the social media site, just for your company. Employees can communicate with coworkers, post pictures, plan for upcoming events, and make office announcements at ease. As an added bonus, Facebook at Work will employ auto-translate functionality to make communication between foreign nationals easy.

Aside from the fact that transitions will be easy with so many people already using the site for personal accounts, Facebook at Work is hoping Work Chat and Video Call options will be able to rival the likes of Skype for Business, Google Hangouts, and Slack. And with the addition of new avenues of privacy come new security guarantees. In an attempt to assuage the concerns of HR departments and paranoid employees alike, the improved security measures in Facebook at Work are separate from the personal platform and unique to the enterprise.

Regardless of whether or not you’re a fan of the original, Facebook at Work is a product keen on helping enterprises improve communications and increase work productivity. If you’re interested in getting in on the ground floor of this new workplace application, we’re your ticket. From product updates to completely new social media sites, we’re your one-stop-shop for getting the word out about your business and your product. Message us for more information today.

Published with permission from Source.

Topic Social Media
October 7th, 2016

2016october7_security_bThe technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information. If you’re worried about the ability of your employees to avoid scams such as these, we have a few quick tips for you.

As more and more of our information moves into the digital realm, criminals are turning to social engineering to trick people into trusting them with their delicate information. People often trust others too easily and make themselves the targets of easy attacks from criminals. These attacks may come in the form of messages, baiting scenarios, fake company responses, and many others.

Most often, messages are sent to users in the form of an email that might contain a link or something to download. Although they may look legitimate, these emails often contain viruses; once the link is opened or you attempt to download it, a virus latches onto your computer, giving its creator free access to your email account and personal information.

Emails such as these can also come with a compelling story about needing help, winning the lottery, or even paying taxes to the government. Under the veil of legitimacy, criminals will ask you to trust them with your account details so they can either reward you or help you avoid fines and punishments. What you actually get is a bad case of identity theft.

In another scenario, criminals will bait their targets with “confidential information regarding their account.” This may come in the form of fake company messages that appear to be responses to your claims, which are followed up by a request for login details. While victims believe they are slamming the door on a crime by providing their information, they’ve actually provided their attackers with the keys.

There are several ways people can avoid becoming victims of social engineering. First, always ensure that you delete all spam from your email, and thoroughly research sources before responding to claims from a company -- even if it seems like the one you normally use.

The same applies for links. Confirm the destination of any link before clicking on it. Sites like are often used to shorten long and cumbersome links, but because users have grown accusomted to them they are often used to hide malacious misdirections.

Never give out sensitive information that includes your password, bank information, social security, or any other private details. No respectable financial institution will request this type of information through email or a site other than their own. If you’re unsure, navigate away from the page you’ve been sent to and visit the page you believe to be making the request. If the address doesn’t have the letter ‘s’ after ‘http,’ it’s likely a scam.

Last but not least, check that all your devices are protected by the most recent antivirus software. While the strength of social engineering lies in the fact that it’s people-driven rather than technology-driven, antivirus software can help detect and prevent requests from known cybercriminals.

Cyber security is essential to the success of any modern business. Don’t let yourself become victim to criminals who have mastered the art of social engineering. While we’re proud of our extensive experience as technology professionals, we also have more than enough expertise to keep your business safe from those who are using people-based exploits. Get in touch with us today for all your security concerns.

Published with permission from Source.

Topic Security
September 30th, 2016

2016september30_businessvalue_bBesides looking like an early version of Cyclops from The X-Men, what’s with all the hype on virtual reality? How much of a difference can be made by slipping ourselves into a three-dimensional world? For businesses, operating with the same routine day in and day out can be quite monotonous for employees. Imagine if they were able to see the world in a new way -- what would happen? If the promise of futuristic fun doesn’t suffice, here are other reasons to embrace VR:

Create your own virtual product prototypes

With the help of virtual reality, you’ll no longer have to rely on manufacturing when you want to see what your product physically looks like and how it might work. These virtual products allow you to make any changes before going through with production. According to Abi Mandelbaum, CEO and co-founder of YouVisit, “Model creation in VR, for example, can save companies time and money, as these types of models or prototypes allow viewers to examine a product and make changes without the time or expense of building a physical model.”

Virtual designs for engineers

Especially beneficial for engineers, architects and other professionals that work with building or engineering large structures, virtual reality helps save both time and money. As an alternative to small models or 2D renderings, VR offers a more immersive experience that helps design and replicate structures.

Virtual tours

Let’s say that you’re a real estate agent showing houses to potential buyers. Your buyers might be in a different state or simply don’t want to spend time going from house-to-house. Virtual reality allows customers to see what the home looks likes in a three-dimensional setting without them having to actually be there.

Showing all the angles of a product

In order to entice buyers into making a purchase, they must first get an idea as to what it’s actually like, and they need to see as many angles as possible -- especially for products that customers don’t get to physically touch. With virtual reality, customers are given a better idea of what your product is like. Abi Mandelbaum says that “Virtual reality can allow current and potential customers to explore a product before they commit to making a purchase. Furthermore, VR completely immerses customers, helping place a product directly into their (virtual) hands or empowering viewers to see a product in action.”

Take customers on an adventure

If you are in any tourism or adventure-based business, you can use virtual reality to give customers a taste of what to expect from the attractions. Imagine that you have an amusement park and want to attract customers’ attention. You can opt to offer a short VR replication of one of your rides so people can see whether or not they’d like it. Or if you own a resort or campground, you’ll also be able to create reality versions of whatever activities you offer.

VR has the potential to take your small- and medium-sized business to the next level if done properly of course. If you have any questions about how you can mesh virtual reality with your company, don’t hesitate to send us an email or give us a call. We’ll be more than happy to assist with your queries.

Published with permission from Source.

Topic business
September 26th, 2016

2016september29_virtualization_bFor the average business owner, a virtualized network may not seem groundbreaking. And until recently, even the team at VMware didn’t realize just what they could do with it. Now that they’ve publicly announced what they’re calling “Project Goldilocks,” we finally see how relevant it is. Every small- or medium-sized business is concerned with endpoint security, and that’s why you absolutely must read on to learn about this new form of virtualization.

A virtual network is a way to connect two or more devices that aren’t physically linked by wires or cables. From the perspective of machines on a virtual network, they’re essentially sitting in the same room -- even if they’re on opposite sides of the globe. The advantages of this setup range from ease of management to reduced hardware costs. AT&T and Verizon have begun offering these services, and small- and medium-sized businesses have slowly begun to adopt them.

Meanwhile, another sector of the IT world has been making its own advances. Cutting-edge hardware firewalls are beginning to offer internal segmentation as a method of separating pieces of your internal network to keep them safe from threats that spread internally. The more segments you have, the safer your network is from poorly protected neighbors. But there are limits to how much capacity one of these hardware firewalls has for segmentation.

Virtualization giant VMware has taken notice and developed a prototype to combine these two services. In the hopes of unleashing ‘microsegmentation’ from the limits of physical hardware, Project Goldilocks will essentially create a virtual firewall for every virtualized application. When one of these applications is created or installed, it will come with a ‘birth certificate’ outlining every acceptable function it can perform. When making requests to the operating system, network, or hardware the application is installed on, Goldilocks will cross-reference the request with the birth certificate and deny anything that hasn’t been given permission.

Segmenting virtual networks and applying them to individual applications rather than entire networks or operating systems could revolutionize the market for endpoint security. Not only would it be easier to block malware infections, but those that made it through could be quarantined and terminated immediately because of the virtual nature of their location.

While virtualization may be a complicated state-of-the-art technology, all it really takes is a helping hand. With our full team of specialists, we’re ready to pull you into the next stage of your virtualized infrastructure. All you need to do is reach out us -- why not do it today?

Published with permission from Source.

September 23rd, 2016

2016september23_microsoftwindowsnewsandtips_bRegardless of the app, platform, or operating system, digital notifications are a tricky business. Our devices are overcrowded with software of varying importance, and without proper customization the stream of information can become overwhelming. Thankfully, Windows 10’s action center is built atop a solid foundation -- it just needs a bit of help. If Windows notifications are driving you up a wall, try out the three steps we’ve listed here to get them under your thumb.

Overarching action center settings

The place to start is customizing system-wide notifications settings. To view these, click on the Cortana icon on your taskbar, type ‘Notifications,’ and click ‘Notifications & actions settings.’ From here you can turn off alerts entirely, adjust those on the lock screen, or customize the alerts for core functions such as alarms and incoming calls.

Settings for individual applications

If you’re interested in taking a far more nuanced approach to your notifications, there are options to create rules on an app-by-app basis. At the bottom of the ‘Notifications & actions settings’ screen is a section titled ‘Get notifications from these senders.’ At first glance it may look as though you can only turn alerts completely off or on for these apps, but that’s not the case.

By clicking on any of the items in this list, you can open a new window full of more graded notifications options. From here, users can specify lock screen, sound, and priority settings for individual software.

Closing the blinds

For users who have no interest whatsoever in the Windows 10 action center, there is a way to banish it entirely. Open Cortana again and search ‘Notification area.’ Halfway down the page, click the menu titled ‘Turn system icons on or off.’ Toggling the Action Center option (third from the bottom) allows you to remove the icon from your taskbar altogether.

While you’re at it, why not take this philosophy one step further? Click the back arrow to return to the ‘Notification area’ window and this time choose ‘Select which icons appear on the taskbar.’ Here you can choose which apps to remove from your taskbar entirely, eliminating any annoying icons that change to alert you of distracting notifications.

Everyone is different. If artists have tools unique to their style, why shouldn’t the tools of your trade be tailored to your preferences? Our paintbrush is technology, and we’d love to show you how we work by helping you achieve new levels of productivity and efficiency on your Windows machine. Get in touch with us today to speak with one of our tech-savvy specialists about your technology goals.

Published with permission from Source.

Topic windows
September 21st, 2016

2016september21_security_bEveryone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.


For a long time, the phrase ‘computer virus’ was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as a type of malware.


Don’t let all the other words ending in ‘ware’ confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is ‘ransomware,’ which encrypts valuable data until a ransom is paid for its return.

Intrusion Protection System

There are several ways to safeguard your network from malware, but intrusion protection systems (IPSs) are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can deploy an exploit or take advantage of a known vulnerability.

Social Engineering

Not all types of malware rely solely on fancy computer programming. While the exact statistics are quite difficult to pin down, experts agree that the majority of attacks require some form of what is called ‘social engineering’ to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.


Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy, and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value -- always verify the source of any service requesting your sensitive data.


Anti-virus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well known malware variants.

Zero-day attacks

Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyber attackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.


When software developers discover a security vulnerability in their programming, they usually release a small file to update and ‘patch’ this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest advances in malware.

Redundant data

When anti-virus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.

We aren’t just creating a glossary of cyber security terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out for yourself.

Published with permission from Source.

Topic Security