<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

6 Steps to Keep Your Computer Running Like New

[fa icon="pencil'] Posted by Heidi Van Anderson [fa icon="calendar'] April 17, 2018 [fa icon="tags'] Managed Services, How To Guide, Managed Infrastructure & Helpdesk, IT Solutions

No matter what industry you work in, there is probably a good chance you spend a lot of your day on a computer or laptop. The last thing you need is to have an issue with it right before an important deadline or even just during a regular busy work day.

Read More [fa icon="long-arrow-right"]

How to Build a Secure Network of Internet of Things (IoT) Devices

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] April 10, 2018 [fa icon="tags'] Cisco, Networking, Data Security, Information Security, IoT

The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call home and execute functions that it’s designed for.

It’s become a hot topic in the last decade, but IoT has actually been around much longer than that even. One of the first mainstream consumer-facing applications was implemented in 1982. It was a smart Coca-Cola vending machine that reported the status of the vending machine so a technician could be sent to refill the cans when it was running low. If we fast forward to 2020, researchers predict 30-50 BILLION devices will be connected. By comparison, that’s 4-7x the world’s population.

Read More [fa icon="long-arrow-right"]

5 Key Reasons to Upgrade Now to VMware vSphere 6.5

[fa icon="pencil'] Posted by Mike Garner [fa icon="calendar'] March 28, 2018 [fa icon="tags'] Virtualization, VMware, Managed Infrastructure & Helpdesk, Data Security, VMware vSphere, VMware vCenter, Information Security, VMware Horizon

How time flies! Old reliable – Vmware vSphere 5.5 – is set for retirement in September of this year, meaning it will no longer be supported as of September 19, 2018.

See the Entire VMware Lifecycle Matrix

It’s had a good run and due to its impressive stability and wide adoption, I still see it deployed within many of our clients’ environments.

So what now? Our recommendation is to upgrade your systems to vSphere 6.5. Not only do you get the essential extension of support, but some really great new features.

Read More [fa icon="long-arrow-right"]

Lewan Named to 2018 CRN MSP500 List as Top IT Managed Services Provider

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] February 27, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2018 Managed Services Provider (MSP) 500 list in the MSP Elite 150 category. The CRN’s MSP 500 list recognizes Lewan as one of the preeminent IT managed services companies in Denver and North America.

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Email Security, Data Security, Information Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Microsoft Windows, Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

Fix: Running Cisco Spark on Citrix XenDesktop w/ Windows Server 2016

[fa icon="pencil'] Posted by Phillip Martin [fa icon="calendar'] January 30, 2018 [fa icon="tags'] Unified Communication & Collaboration

Spark is an awesome cloud-based solution from Cisco for meetings, messaging and calling. We use it for internal meetings, presentations and have been setting up for clients. Shiny and new unfortunately also means there are still some bugs to work out and Cisco’s support and documentation on Spark doesn’t cover it all.

Here’s one of the issues I’ve encountered and some steps to hopefully help you resolve it.

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

3 Reasons to Bring Outsourced Printing In-House with a Digital Press

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 26, 2017 [fa icon="tags'] Paper, Printers & Copiers, Managed Print Services

Business cards, letterhead, brochures, catalogs, labels, banners, postcards...these are all common collaterals that companies need to print to support their employees and market to their customers. With the ease of today’s online printing sites with drag and drop proofs and point and click ordering, many organizations think outsourced printing is their best option for both efficiency and price.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Data Storage, Data Backup & Recovery, Email Security, Data Security, Information Security

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts