I will be leading our third webinar on the topic
of 'Leveraging "The Cloud" as a Core Business
Strategy.' I will be explaining how any
organization can strategically leverage cloud computing
across all areas of the business, beyond IT. I will
also discuss the incorporation of Cloud strategy
into strategic IT planning and how to start integrating
that plan today.
This webinar will be on
Thursday, October 20th, 2016 at 12PM Eastern time.
This will be a 30-minute presentation with time
at the end for questions. During this presentation,
we will also establish a medium for participants
to submit suggestions for future topics. Our goal
is to make these webinars strictly information-based
on critical topics that are top of mind for most
organizations as it relates to IT.
Posted on 9/13/2016
1:35:10 PM by Dr. Eugene Slobodzian
At the beginning of this year, Proofpoint researchers
identified a new form of social media-based phishing
attack, called angler phishing.
Proofpoint is a cybersecurity company that protects
the way people work and keeps businesses safe from
What is angler phishing?
angler phishing attack was created from the
'anglerfish', which lures and entices smaller prey.
In this type of attack, a fake customer-support
account promises to help customers but instead steals
the customer's credentials.
Posted on 9/7/2016
9:47:42 AM by Dr. Eugene Slobodzian
I've noticed an alarming increase in the frequency
and sophistication of cyberattacks, most notably
spear phishing. This increased effort and sophistication
of this type of attack is a disturbing trend. However,
there are always plenty of red flags that a well-
trained, informed and vigilant staff can spot.
Let's take a closer look at these and other
types of common attacks:
Phishing is a method hackers use to gain
unauthorized access to company resources. The
most common method is email, but it can occur
by phone or in person. Recently, more sophisticated
social engineering scam email messages don't
have bad English, low quality graphics, or obviously
suspicious links. Sometimes they look practically
identical to legitimate messages.
Posted on 9/27/2016
2:16:04 PM by Dr. Eugene Slobodzian
During my two-decade long
career in information security, I witnessed it go
from virtually non-existent niche to a relatively
mature field. Unfortunately, the main driving factor
behind this evolution was an ever-increasing number
of cybersecurity attacks. These attacks have become
more complex and sophisticated and as a result IT
departments are being challenged to keep their companies
secure. Often this means having access to talent
knowledgeable enough handle these attacks.
And here comes the challenge - that talent is
hard to find and keep. According to a
2015 Global Information Security Workforce Study
for Cyber Security and Education is expecting there
will be a shortfall of 1.5 million professionals
worldwide by 2020 if the issue isn't addressed.
Lisa Frank - Executive Assistant
Lisa Frank joins Winxnet as an Executive
Assistant in the Portland office. Lisa has
over five years of Executive Assistant and
Office Administration experience. She attended
college in Iowa City and San Francisco,
and has a degree in Massage Therapy and
Health Education. Her experience in organizational
management and executive support will continue
to help Winxnet provide outstanding service
to its growing client base.
About Winxnet Providing innovative IT solutions since 1999, Winxnet
is a leader in IT outsourcing and consulting, software
development, and strategic technical advisory services
to the private and public sectors. With offices
throughout the Eastern United States, Winxnet provides
a broad reach with local expertise.