We are hiring!

Brian Gifford & Associates, LLC is seeking an energetic and results-driven Business Development Intern in Reno, NV for a paid part-time position. As part of our team, you will be responsible for executing demand generation campaigns and activities in an expanding high-tech organization. We offer a flexible schedule and an excellent work environment.

If you want to jump-start a sales or marketing career in the information technology field and have the necessary skills, we would like to hear from you.

For more information, the send a current resume to:

Tagged , , , , , ,

Don’t forget – Experts in Technology Panel tomorrow!

This is going to be a great event. RSVP here!

Tagged , , , , , ,

Cisco Nexus 1000v – Free!

Today Cisco announced two new editions of the Nexus 1000v switch, which is designed for virtual environments. If you haven’t tried it already, we recommend downloading and installing the Essential Edition as this will provide most environments with deeper control and visibility into the network. This version will operate for 240 days, after which a nominal support fee is required.

From the announcement:

“The Nexus 1000V Essential Edition provides all the rich Layer-2 networking features to connect virtual applications to the network and integrate into VMware environments, including: VXLAN capability, Cisco vPath service insertion, integration with vCloud Director, and a plug-in for management and monitoring in VMware’s vCenter Server. This free version will enable rapid, low-risk adoption of Cisco’s virtual network technology environments.”

Here’s what other Cisco customers think of the 1000v:

For more information on how BG&A can help your network run better, contact BG&A.

Tagged , , , ,

Another Cisco VSS migration completed…

The BG&A team recently completed another Cisco Catalyst 6500 VSS upgrade, migrating a production single switch to a VSS cluster with minimal downtime. Here’s a shot of the final result:

Cisco Catalyst 6500 w/ VSS

If you haven’t looked at VSS before and are looking for maximum redundancy with minimal complexity, this is your ticket. Say goodbye to HSRP, spanning-tree, root syncronization, and other ugly issues.

For more information on how BG&A can help your network run better, contact BG&A.

Tagged , , , , , , ,

Join us at the Experts in Technology Panel!

Join BG&A, Charter Business, Cisco and a panel of experts to discuss the future of technology including:

•Network performance in the cloud
•Network optimization
•Virtualizing your work force
•How to maximize the effectiveness of your network with devices at the edge


When: Thursday, October 11

11:30-1:30 – Lunch will be provided

Where: The Grove

95 Foothill Rd Reno, NV

Our Panel:

Scott Fairchild | Director, Charter Business Product Management

Kyle Lindsey | Senior Account Manager, Cisco Systems

Brian Gifford | President, Brian Gifford & Associates

Ryan Gepford | Sales Engineer, Charter Business

Click HERE to register and RSVP!


Lunch menu:

Saffron Fume Blanc Poached Filet of Salmon, Tomato-Fennel Slaw

Pan Roasted Chicken Breast, Pesto Cream Sauce

Vegetarian entre option – Eggplant Parmasean

Mixed Green Salad

Herbed Rice Pilaf

Market Vegetables

If there are any dietary restrictions or allergy concerns, please send an email to the organizer at

Spearphishing 101

What’s the latest attack you need to know about?  Spear phishing.  By now we all know about the Nigerian wire transfer fraud emails, and we learned about clicking on spam emails way back when…but did you know that cyber criminals are now targeting certain individuals using their people in their social networks?  Entrepreneur Magazine has a great article with more info.

Specialists say the attacks are becoming very difficult for recipients to detect. From the New York Times:

“It’s a really nasty tactic because it’s so personalized,” said Bruce Schneier, the chief security technology officer of the British company BT Group. “It’s an e-mail from your mother saying she needs your Social Security number for the will she’s doing.”

Mr. Schneier said the attacks are more like a traditional con game than a technically sophisticated intrusion. “This is hacking the person,” he said. “It’s not hacking the computer.”

The best way to protect yourself is to use a layered approach to security.  Here’s the basics:

  • Use a web security product.  A great free service is available from OpenDNS, but this only protects you from certain types of attacks.  To fully protect your organization, use an on premise or cloud solution from McAfee or Cisco Systems.  These filters are updated hundred of times per hour based on the latest threat information from around the world.  They can protect you and your employees from the latest threats as well as provide content filtering and reporting.
  • Filter your email before it gets inside your network.  Many organizations these days have spam filters in place, but how often are they updated?  The best, such as from Cisco Systems or McAfee, are updated constantly and pass an email through a half dozen filters.  Additionally, these products allow an administrator to block certain types of content according to regulatory compliance or security policies.  Want to block the ability to send credit card or SSN numbers?  No problem.
  • Get a quality antivirus product.  Most antivirus products these days are great at detecting worms and viruses, but those attacks are so 2002.  Make sure your antivirus product has protections against malware and spyware.  BG&A’s centrally managed services include one of the best such products combined with our own blend of automated tools that provide defense in depth.
  • The FBI recommends to never follow a link to a secure site from an e-mail—always enter the URL manually.  This includes Facebook, Google, banks, credit cards, etc.  Assume an email asking for this or directing you to their site is fradulent.
  • Use your instincts.  If your mother sends you an email asking for you or your childrens SSN in an email, alarms should go off.  Always best to confirm this type of information is needed and provide it over the phone in any case.

Unfortunately, the risks associated with the Internet are not going away and it’s getting more complicated every day to protect personal and business information, intellectual property, and bank information.  If you have any questions, don’t hesitate to give us a call at 775.284.7100 or send us a message .

Tagged ,

Having trouble communicating I…

Having trouble communicating IT investment value? New MIT study finds IT can return more ROI than advertising and R&D.


The BG&A team attended the Cis…

The BG&A team attended the Cisco #SecureX seminar yesterday. Great stuff on the current state of security.


Flashback Trojan hits Mac users

Well it turns out that all those Mac users touting the imperviousness of the Mac OSX operating system are going to have to worry like everyone else.  Thanks to a well documented flaw that Apple didn’t patch for 3 months, a vulnerability has allowed over 500,000 computers worldwide to become infected by a “trojan” that allows attackers to intercept usernames and passwords.  That’s 500,000+ computers infected, not vulnerable.

Let’s survey the damage: bank accounts, emails, ebay, etc.  What’s happening now is that these attacks are happening in eastern Europe or China.  Once they have access to your checking, savings, or investment accounts, they initiate an account transfer to an offshore account.  The infected computer then intercepts the websites you visit and can rewrite the account balance so that it appears your balance is normal when in fact it is empty.  Tidbit: Once the money is offshore, Federal bank insurance (FDIC) will typically not protect you unless you can preserve forensic evidence to prove the transfer was done by someone else and not you (on your own computer).

While Windows users are also affected by this, a patch for them was released months ago.  The Flashback trojan vulnerability is found in previous versions of Java software and is explained in detail here.

A word of advice: after updating, go get yourself a quality antivirus program like ESET and install it today.  The built in antivirus that Apple provides is in adequate, as these compromised computers prove.

Going forward, it seems that Apple users are going to become increasingly more likely targets of attacks like these as the company continues to gain market share with its personal computers.  Additionally, with the Bring Your Own Device (BYOD) trend of employees connecting to business networks, it’s only a matter of time before smartphones and tablets like the iPhone and iPad are used as a launchpad for cyber crime.

It really is a game of whack-a-mole, and proactive, multilayer security is the only way to protect yourself from this.  I’ll cover this approach in upcoming posts.

Tagged , , ,

Cisco 2011 Annual Security Report

Here’s an interesting (but not too technical) read on not only the current state of security, but of trends in computing and the ramifications they can have to your business.  Click here to download the Cisco Systems 2011 Annual Security Report.

Some key topics that every manager or business owner should have an understanding of:

  • Attitudes of young professionals toward work and technology-and the effect on security
  • The “bring your own device” trend and its impact on workers and the enterprise
  • Security implications of “hacktivism” and social media-driven political uprisings
  • Ten crucial actions to take to improve enterprise security

Items 1 and 2 are especially relevant to nearly every business in the world these days.  Unfortunately, most organizations I talk to don’t have a strategy or policy in place to handle these changes.  Take a look at the section entitled “2012 Action Items for Enterprise Security” for some great information that will help improve the security of your business data.

If you have any questions or would like more information, send us a note or call (775) 284-7100, option 3.

Tagged , ,
Page 1 of 212