<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Lewan Named to 2018 CRN MSP500 List as Top IT Managed Services Provider

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] February 27, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2018 Managed Services Provider (MSP) 500 list in the MSP Elite 150 category. The CRN’s MSP 500 list recognizes Lewan as one of the preeminent IT managed services companies in Denver and North America.

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Email Security, Data Security, Information Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Microsoft Windows, Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

Fix: Running Cisco Spark on Citrix XenDesktop w/ Windows Server 2016

[fa icon="pencil'] Posted by Phillip Martin [fa icon="calendar'] January 30, 2018 [fa icon="tags'] Unified Communication & Collaboration

Spark is an awesome cloud-based solution from Cisco for meetings, messaging and calling. We use it for internal meetings, presentations and have been setting up for clients. Shiny and new unfortunately also means there are still some bugs to work out and Cisco’s support and documentation on Spark doesn’t cover it all.

Here’s one of the issues I’ve encountered and some steps to hopefully help you resolve it.

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

3 Reasons to Bring Outsourced Printing In-House with a Digital Press

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 26, 2017 [fa icon="tags'] Paper, Printers & Copiers, Managed Print Services

Business cards, letterhead, brochures, catalogs, labels, banners, postcards...these are all common collaterals that companies need to print to support their employees and market to their customers. With the ease of today’s online printing sites with drag and drop proofs and point and click ordering, many organizations think outsourced printing is their best option for both efficiency and price.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Data Storage, Data Backup & Recovery, Email Security, Data Security, Information Security

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

How to Save Presets in Xerox Printer Drivers

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 3, 2017 [fa icon="tags'] Xerox, How To Guide, Paper, Microsoft Outlook, Printers & Copiers

Some of the most helpful and most underused features of your Xerox printer are the printer settings you can manage from your computer, also referred to as the Xerox printer driver. Within these printing preferences, you have the ability to save presets for frequently used settings. For example, if you often want a first page printed on letterhead then the proceeding pages printed on normal paper.

You can also apply program specific presets which will affect all jobs printed from a particular program. For example, you can use this style of preset to make all emails print in grayscale to reduce unnecessary color printing.

Let’s look closer at these two examples to show you how creating presets works.

Read More [fa icon="long-arrow-right"]

How to Select a Managed Security Service Provider

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] September 20, 2017 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run our Security Operations Center (SOC) and provide over-watch for our Network Operations Center (NOC). These teams take security seriously for our clients who take security seriously.

With this have come a lot of best practices and insights. Here are two main points that I hope you’ll find helpful when looking for a managed security service provider.

Read More [fa icon="long-arrow-right"]

3 Steps to Design an IT Vision and IT Roadmap

[fa icon="pencil'] Posted by Todd Johnson [fa icon="calendar'] September 12, 2017 [fa icon="tags'] Managed Services, How To Guide, Sales Technique, IT Solutions

If you’ve read Simon Sinek’s book, Start With Why, you’re familiar with the methodology that your organization’s “why” needs to sync with your vision, determining both how and what you do. (Check out Sinek’s TED Talk on the topic.)

Inspired by this, I want to share how this concept applies specifically to your IT vision.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates

[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.

[fa icon="calendar"] Recent Posts