March News:


On The Calendar March Events Fulcrum Group By now, we hope its impossible to have missed that The Fulcrum Group took the Fort Worth Chamber's 2017 Small Business of the Year award for businesses with 11-50 employees! Check out our blog which includes links to relevant Small Business of the Year announcements. If you missed our February webinar, 8 Steps For Creating A Disaster Recovery Solution & Plan, we hope you'll check it out.  You can access the recording here. This webinar features points to consider when crafting a disaster recovery plan for your organization.  On March 22nd from 11:30 a.m. to 1:00 p.m., the DFW Business Intelligence Community meeting will be spotlighting how Tetra Pak transformed their entire global BI delivery framework from a traditional, centralized model to a distributed, self-service model with hundreds of users in "Democratizing BI:  A Self-Service Case Study." More info, and link to RSVP on our Events page. Our March webinar - 5 Steps For Improving Email Security - will be Thursday, March 23rd from 10:00 - 10:30 a.m.  RSVP today - afterward, you can expect to receive an Outlook calendar appointment with all relevant details inside.  Quick links to our social media pages are accessible right from our website and in every monthly newsletter email you receive from us. If you're new to our newsletter and you'd like to subscribe, let us know.
Email Security Tips from The Fulcrum Group5 Steps To Improving Email Security Although email was invented all the way back in 1972 by Ray Tomlinson, a contractor for ARPANET, email didn’t become widely used until the 1990s (thanks to AOL, Prodigy, and CompuServe). One "fun fact" you may not realize about email is that it was never meant to be a secure communication platform.  Much of the underlying infrastructure for original email technology remains the same, even today. This lack of security makes email ripe for hackers and spammers as an attack vector. Our upcoming webinar, 5 Steps for Improving Email Security, will help you ensure that your email communications are as secure as possible. Step 1 – Understand how email works. If you’re an end user trying to use email properly and securely, it’s helpful to know how email works.   Step 2 – Understand the critical security risks in email. Once you understand how email works, you’ll have a better understanding of its security limitations.   Step 3 – Understand the best options for reducing email spam and viruses. Reducing email spam and viruses is a critical first step in securing your email.   Step 4 – Know the do's and don’ts of sending sensitive information via email. For some people, it might be common to not know that you shouldn’t send credit card numbers, medical information, or other information through standard email.   Step 5 – What are Secure Send and Compliant Archiving? For some organizations, being able to send sensitive information in a secure, encrypted manner, is required by law.  The same can be said for compliant email archiving.   Learn more about these 5 steps and you’ll be on your way to breathing a little easier about your organization’s email security.  Don't forget to signup for our upcoming webinar to discover more on the subject!
Arnold Schwarzenegger is an IT Security Genius Fulcrum Group IT Security Management Outsourcing Tips

Contributed by Steve Meek

Do you ever wish someone could just explain computer security in easy terms?

As a security practitioner, I've invested a good portion of my life - and many a detailed discussion - in technology and Internet security, and I've got a theory...I believe I may have recently uncovered a hidden agenda where Arnold seems to have laced great security tips into the dialogue of some of his movies, which - in pure, simple Arnold style - break complicated ideas down, making them much easier to understand...If only I would have known sooner.

"First I'm gonna use you as a human shield, then I gonna take that chisel and kill the guard with it. Then I was thinking about breaking your neck." - Harry Tasker of 'True Lies'  Organized doesn't mean expensive. Some organizations buy a cool security technology then figure out what they need to protect, as opposed to doing the reverse. There are many tools you can use but you have to know what you're trying to protect and also what you're trying to protect it from. - I love it when a plan comes together. "Milk are for babies, when you get older you drink beer." - Arnold Schwarzenegger, in 'Pumping Iron' Arnold didn't realize this at the time, but he was really communicating that 20 years ago we just needed antivirus and firewall. Changing times and technologies require complementary tools such as email filtering, web filtering, intrusion prevention systems and specialized backups to help protect our most important data and systems. - See, you don't take milk to a beer fight. "Get to the chopper!!" - Dutch Schaeffer, 'Predator' Arnold is reminding us that the cheapest and best way to secure your technology is with clear and simple instructions to your end-users. Creating a standard IT policy and then conducting security awareness training will go a lot further in protecting your data than buying tons of security tools and devices, especially if your people don't have some basic rules and procedures to follow. - Then everyone makes it out alive. "Have you ever killed anyone?"  "Yes, but they were all bad!" - Harry Tasker, 'True Lies' Arnold knows that everybody loves cool devices and technologies. Consumerism has led many people to want to go download free software and smartphone apps without the skill set to understand the potential impact. That's not anyone's fault, but having a system for approving applications can help limit the unapproved apps that might cause your network problems. - No one needs to die. "Hasta la vista, baby." - Terminator, 'Terminator 2: Judgment Day'  Arnold knows things. Like users should be aware of the implications of using public access Wi-Fi and connecting to networks they don't recognize. Being on a network gives you access to the Internet and other resources. Likewise, anything on your connected device can become fair game to others on the network. - Don't get sent packing. "I'll be back." - Terminator, 'Terminator' Arnold was prolifically trying to convey that malware will keep coming back. There's tons of it out there and more gets created every day because so many users fall for it. You can conduct your own phishing exercises to test your users and find out if they need additional training. See, Arnold really knows his stuff!  In very simple terms, he's been a breath of enlightenment to help you recognize some of the things you can do to help secure your environment by taking his advice. It's amazing to think about all the technological advances of the past 20 or so years. However, pervasiveness of high-speed connectivity means your neighborhood is a lot bigger and just about anybody in the world can attempt to burst through your front door, uninvited. Don't let them. Do what Arnold would do..
SPOTlight On: Dale Hauser, New Fulcrum Group VCIO The Fulcrum Group - Dallas Fort Worth IT Outsourcing We're proud to announce former engineer, Dale Hauser, has embraced his new role of Fulcrum Group VCIO with his typical enthusiasm and vigor.  Dale is putting his natural inclination for relationship building and customer service to work by helping manage some of our top SPOT Managed Services clients. Dale Hauser Fulcrum Group VCIODale comments, "I am excited to be an advocate for our SPOT clients and assist in this way, in meeting their IT needs!" We're confident this position will be a great fit for Dale, and our clients, alike. Perhaps its no coincidence that Dale's announcement falls directly under the Arnold article above...Dale's fitness & health personal priorities are a great complement to Fulcrum Group's health and wellness goals as well. He hosts a weekly "Fulcrum Fit Club" group meeting for any Fulcrum employees who want to prioritize their own personal fitness, overall health and nutrition goals.  Feel free to give him a shout out on our Facebook page, just for fun!
  More Than Tech Tips: Favorite Podcasts & YouTube Fun Tech Tips from The Fulcrum Group, Dallas Fort Worth IT Managed Services Provider

While tech can be the scourge of your day sometimes, you gotta love it when its fun! In our downtime some of us here at The Fulcrum Group like to partake of podcasts, YouTube and other media fun, so we rounded up some of our favorites to share with you.  If you're unsure of how to get the most from podcasts, check out this article, then see below for our list of favs to add to your library if you'd like:

Doug HendersonThe Tim Ferriss Show, The Journal by Kevin Rose, This American Life, The Moth, and Stuff You Should Know and favorite YouTuber, Casey Neistat.

Bobby Barham - YouTube Chain of Fools - an upgrade journey of the Microsoft Operating System from DOS 5.0 through Windows 7.

Steve Meek - a favorite Ted Talk, Amy Cuddy: Your Body Language Shapes Who You Are.

Share some of your favorites with us on our Facebook page!


  Did You Know...SPOT Email SecurityThe Fulcrum Group Dallas Fort Worth IT Outsourcing Managed Services If you need email spam and virus filtering, or need advanced email security services such as secure send or compliant email archiving, SPOT Email Security is the perfect solution.  It’s also a great add-on for Office 365, especially if you only need secure send or compliant email archiving for a subset of users.  Contact your Fulcrum Group Account Manager via email or at 817-337-0300 for more details.