Joy on the job?




Every business is different – the goals, services and priorities shift from workplace to workplace. This is what makes our world go round. Businesses work with one another to provide their own expertise, creating a well-oiled machine that fuels the American workforce and creates the communities, cities and country we aspire to be a part of.

Citon fits into that equation as the company that provides area businesses with the IT tools they need to succeed. In doing so, it strives to improve the lives of those it does businesses with – one job at a time.

Joy is the ingredient that transforms good service to tremendous service. It sets companies apart and, ultimately, improves lives and the collective experience.

Take Menlo Innovations, for example. Its CEO and chief storyteller, Richard Sheridan, is the author of a book that addresses this very issue: Joy, Inc: How We Built a Workplace People Love. As a testament to his theory, his company has received numerous awards throughout the years for its dedication to joy in the workplace. It has consistently won the Alfred P. Sloan Award for Workplace Flexibility since 2006, largely in part due to its joy factor.

It’s safe to say Sheridan practices what he preaches – and it works.

Guy Kawasaki, former chief evangelist for Apple and author of Enchantment: The Art of Changing Hearts, recently wrote an article in which he stressed the importance of intentionally creating a joy-filled workplace. Referencing the work of Sheridan, he compiled a list of the key components to a joyful workplace:

Imagine joy. Set out to intentionally build the company and workplace that you want to work for. If you don’t try to build a joyful company, you’ll never achieve one by accident.

Build community. Good attitudes spread. A contagious joyful attitude can spread from your employees, to your clients, and to the community. A rising tide of joy floats all boats.

Foster communication. An open work environment creates natural opportunities for conversation and growth. “A culture that embraces and honors its people with a changeable space encourages serendipity.”

Use storytelling. Engage your clients and visitors with stories of your company and your team. “If you can get the world to start telling your company’s stories, you will reinforce your mission every single minute of every day, even when you’re not in the room.”

Tear down towers of knowledge. One person shouldn’t be so integral to your organization that they can’t go on vacation or has to be on-call all the time. While these could seem like job security, ultimately, it’s too much pressure on one person and the infrastructure.

Design for living. “Whatever you do for a living, design plays a role.” Design helps tell your companies story and should help create the joyful user experience for your brand.

Kill fear. “Fear is one of the biggest killers of joy,” so it holds your team back from making bold decisions unless the bold decisions mirror what management wants. Which, come to think of it, often means they’re not really bold.

Make mistakes faster. “Small, fast mistakes are preferable to big, slow, deadly mistakes.” Create a culture where people can fail and succeed to survive and thrive. A small, fast mistake means you’re learning. A big, slow mistake means you’re dumb.

Rely on discipline. There’s no replacing hard work and accountability for your work. Discipline creates results. Joy and discipline are not polar opposites nor are joy and anarchy the same thing.

Catalyze teamwork. At Menlo Innovation, they work in a pairing system. Each week they switch pairs and maximize the skills of each employee as they rotate through different pairings. This pairing and re-pairing strengthens the whole team.”

Need some joy? Contact us.

Your Name (required)

Your Email (required)

Your Message

The Benefits of Going Pro with Wireless Routers



As a small business, it might be tempting to purchase a wireless router from a big-box electronics store — they’re cheap and, in terms of connecting your business to the Internet, they work.

But, those low costs come with a great risk. Home routers are increasingly becoming the target of online criminals who are exposing vulnerabilities and creating loopholes to steal sensitive data.

According to the Internet Storm Center, a wave of comprised Linksys home routers were reported in February within a span of a few days – and that sort of mass exploit isn’t rare. The same fate hit Asus routers, which have also recently been subjected to hacks.

The virus impacting traditional home router systems is being labeled as “The Moon.”  Here’s how it works: The virus essentially takes over the router and scans for vulnerabilities. This could mean a weak password or other non-secure avenue that allows hackers to access the system.

In the midst of the panic, Linksys released a statement on its website indicating the company is aware of “The Moon” and is working to eradicate the problem. However, Craig Young of Tripwire says the issue is far from over.

“In recent years, the computing power of the average home router has increased substantially to support features like streaming media and file or print sharing,” Craig Young of Tripwire told the BBC. “These additional features offer new attack surface while the additional computing power creates new possibilities for what an attacker can do with a compromised device.”

While perhaps more affordable at the onset, the use of a vulnerable router is one that could lead to greater costs down the road – not only to your business, but also to your customers and overall professional reputation.

Want to know more? Fill out this form to get our attention:
[contact-form-7 404 "Not Found"]

Protect Yourself from Ransomware Attacks

security_vector_icon_368The virtual criminal underworld has adopted a new way to make a quick dishonest buck through “ransomware,” a practice by which cyber criminals use spam to access and hold your files ransom.

According to the United States Computer Emergency Readiness Team (US-CERT), ransomware cases began popping up in 2013. In less than one week after the phenomenon’s emergence, more than 12,000 users fell victim to ransomware schemes, largely through infected emails.

The most common ransomware on the scene is CryptoLocker. By using the same techniques used to encrypt files for good, cyber criminals have found a way to put data behind bars… and then dangle the key in front of you.

Here’s how it works:

A user is exposed to spam through an email or link, which opens the door for the games to begin. That spam often includes a malware attachment that infects the user’s PC. It attaches and encrypts all of the user’s documents. At that point, they’re locked out of their own data. In the midst of this, they’re provided a link to unlock their files – for a price, typically between $100 and $300.

Will the hackers start to adjust the price based on the number of files? Almost certainly. The number of CryptoLocker-like attacks is going to skyrocket, which means the need to guard against these attacks is more important than ever.

Here’s what you can do to protect yourself:

  • Use a good spam filter. Spam is still the #1 entry point for malware.
  • Use a good firewall with application defense and antivirus features. Packet filters don’t cut it.
  • Use a good AV/anti-malware product. They are not perfect, but they will stop a lot of the junk before it has a chance to do damage.
  • Use software restriction policies on Windows and blacklist known malware executables.
  • Keep your systems patched. Java, Acrobat and other problem programs can be used to automatically launch malware.
  • Use a good backup system. If you don’t pay the ransom, you better have some good backups to recover from.
  • Restrict user rights. CryptoLocker can only encrypt files the user has access to.
  • Use your brain. Most malware doesn’t work without one crucial ingredient: a sucker to open the email or attachment. User awareness is key.
  • Respond quickly. “Ransomware” needs time to encrypt files. Shut down infected machines immediately and live CD-based tools to clean up the mess.


We’d love to tell you more. Fill out the form below to get our attention:
[contact-form-7 404 "Not Found"]

20 Years, 25,000 Custom-Made Computers

It’s a milestone that takes Citon Computer Corp founders Steven Dastoor and Sean Dean down memory lane.

What started as a company that solely built custom computers has now grown into one that offers a broad spectrum of IT services, including its cloud computing center and information security practice.

Yet even with its growth, it hasn’t abandoned its roots. This month marks a major milestone for Citon, as it celebrates the construction of its 25,000th custom-made computing device.

The first Citon computer stands next to the company's 25,000th model, representing how far technology -- and Citon -- has come in 20 years.

The first Citon computer stands next to the company’s 25,000th model, representing how far technology — and Citon — has come in 20 years.

The timer began ticking in 1994 when Citon opened its doors for business. Twenty years later, the creation of the 25,000th custom-made machine is reminding employees just how far they’ve come.

“We are really passionate about getting the right technology in the hands of our customers,” Dastoor said. “Some twenty years ago, the only way was to sit down and understand the actual need before designing the system. While the landscape for PCs has certainly evolved, the theory remains the same. We want to diagnose the need before we prescribe a solution, be that for security, mobility or high-performance. Or in many cases, all three.”

While Citon has always stood against solid competition in the world of computing, two key factors have propelled it to success: a quality, custom-made product and the promise of outstanding customer service.

“That’s one of the main reasons they choose us,” Dan Murto, Citon’s System Build Supervisor, said. “They know we build a great product, and you don’t get much more local than this…. They do it for the great localized service and our ability to be boutique while adhering to industry best practices.”

Citon’s custom-made computer customers run the gamut – from home users to hospitals. While many of the custom-builds have remained in relatively normal territory, Citon has been stretched over the years to create products that are out-of-this-world, literally.

A mining company approached Citon, seeking a machine with the horsepower to 3D map the planet– and Citon delivered.

That wasn’t the only time Citon stepped outside of the box. On another occasion, Citon built a computer to generate airflow dynamics models.

For Citon employees, these are the projects that keep life interesting, yet it’s their mission to help area businesses succeed that keeps it growing – from 25,000 computers and beyond.