Blog-Hero.jpg

Blog

Securing Your Greatest Asset

This week is week 3 of National Cybersecurity Awareness Month (NCSAM). Each week of NCSAM is focused around a different theme meant to address specific challenges organizations face and identify how to address those challenges. Week 3 is focused around educating employees of the importance of online security and safety and their role in keeping your organization safe from online threats.  

Continue reading  

Keep Your Credentials Safe from the Dark Web

Halloween is coming and most of us are looking forward to haunted houses, scary movie marathons, and spooky decorations. October is about more than the candy, costumes, tricks and treats for IT teams and cybersecurity experts – it’s National Cybersecurity Awareness Month.

Continue reading  

Keep Your Business Secure from a Cyber-Attack

It’s our favorite time of year again – October. This love for October is more than the fall weather, leaves changing, upcoming holidays and pumpkin spice everything. October is National Cyber Security Awareness Month and here at LookingPoint we love cybersecurity.

Continue reading  

Ransomware: Secure Your Data from a Breach

Recently we had a business owner come to us asking for help recovering their files from a ransomware attack.

Continue reading  

Infrastructure Management Best Practices

From a high level, managing your IT infrastructure can be boiled down to 5 basic steps:

Continue reading  

Fireside Chat: Cisco Meraki Cloud Networking

Cloud networking deployments are meant to be simple, scalable, and effective. In this Fireside Chat LookingPoint CEO, Sean Barr, sits down with Network Engineer, Trevor Butler, to discuss cloud networking deployments, specifically our experience deploying Cisco Meraki into the network.

Continue reading  

Cisco SD-WAN Series Part 3 – vEdge Router Bringup Sequence of Events.

Hello, my loyal blog post readers, in this my third installment of our SD-WAN series I am going to walk you through how our vEdge router locates, communicates and authenticates itself onto our SD-WAN fabric. Along the way we will take a look at a few packets captures and command line output to see what is going on under the hood.

Continue reading  

Cybersecurity Check-In

What if you could see into the future and knew when an attack on your network was coming and were able to stop it, or at least mitigate its impact?

Continue reading  

Cisco Room Kit – A Guide to a Successful Deployment Easy as 1, 2, 3!

There are many video solutions in the industry.  When deciding on a solution it’s important to understand the primary needs for a Collaboration Conference Room.  This includes whether the room will be used purely for video and content sharing or if it’s more of a multi-purpose room with movable tables.  Conference rooms where everyone sits around a table are quite different than a classroom style room where there is a speaker at the front of the room.  It’s also important to review the user experience with any video / collaboration solution.  Many technologies look good on paper, however successful video room deployments are directly tied to the user experience.  This includes how easy is it to schedule a meeting, start the meeting, and join the meeting.  I’ve seen this be a complicated process that involves IT for the entire process and I’ve seen it as easy as placing a FaceTime call from an iPhone. When video rooms have been designed with usability at the top of the list, you will see an increase of collaboration.

Continue reading  
Subscribe to Our Blog

Subscribe to the informative Newsletter to be Notified Updates in the Technology world.

subscribe to our blog

CONTACT INFO

Phone Number: 925-566-3480

Email: sales@lookingpoint.com

HEADQUARTERS
391 Taylor Blvd. Suite 120
Pleasant Hill, California 94523
GET IN TOUCH
Join our mailing list to stay up to date and get notices about our new releases!

© 2016 Lookingpoint - ALL RIGHTS RESERVED