<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Lewan Technology Recognized for Excellence in Managed IT Security Services

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] February 26, 2019 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2019 Managed Service Provider (MSP) 500 list in the Managed Security 100 category, recognizing MSPs focused primarily on off-premises, cloud-based security services.

The list recognizes Lewan an part an exclusive group of North American solution providers with innovative approaches to managed services. These services help customers improve operational efficiencies, maximize return on IT investments, and continuously help them navigate the complexities of IT solutions.

Read More [fa icon="long-arrow-right"]

Happy 80th Anniversary Xerography: The Invention of the Xerox Copier

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] October 22, 2018 [fa icon="tags'] Xerox, Lewan News & PR, Printers & Copiers

When you walk up to your printer today to make a copy, wish it a happy anniversary. Today celebrates 80 years since the invention the original “xerox” process—xerography.

On October 22, 1938 this revolutionary copying method was created in a small makeshift lab in Queens, NY by a patent attorney named Chester Carlson, who was looking for a more efficient replacement for carbon paper.

Read More [fa icon="long-arrow-right"]

Colorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] August 21, 2018 [fa icon="tags'] Email Security, Data Security, Information Security, Cyber Security

Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data breach notification timelines in the world. It goes into effect September 1, 2018.

Read More [fa icon="long-arrow-right"]

What is SOC 2 certification and should your Managed Security Provider have it?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 30, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, Email Security, Data Security, Information Security

We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA Security and Breach Notification Requirements.

This is a notable achievement that few providers possess and as such, many clients don’t know to look for these certifications when vetting a new managed services or managed security company.

Read More [fa icon="long-arrow-right"]

Lewan Recognized as Top IT Solutions Provider on CRN's 2018 SP500 List

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] June 29, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

For a 5th time, we're excited to announce that Lewan Technology has been recognized on CRN's 2018 Solution Provider 500 list as one of the top largest technology integrators, IT solution providers and IT consultants in Denver, Colorado and North America.

The SP500 list is the predominant channel partner award list, serving as the industry standard for recognition of the most successful solution provider companies.

Read More [fa icon="long-arrow-right"]

Finding Information in Multiple Repositories…the Struggle is Real

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 18, 2018 [fa icon="tags'] Paperless Solutions, Document Workflow, M-Files

This is a sponsored guest post by M-Files, a Lewan technology partner.

Information is a key asset to any organization. Even more important is how high the return on that information is. That return is strongly influenced by the ability to manage it and deliver the right information to the right person at the right time.

But how do you do this when your data all over the place?

Read More [fa icon="long-arrow-right"]

5 Reasons You Need a Security Operations Center (SOC)

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 15, 2018 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

And 4 reasons you don’t want to do it yourself...

Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering and antivirus. These are the right basics to secure your employees against the Wild West that is the internet, but is this equipment enough to keep your company truly safe?

Yes…and no.

Defensive equipment keeps out the things you have it configured to keep out. But what about the things we don’t know about?

Read More [fa icon="long-arrow-right"]

CRN Names Lewan as top IT Service Provider on 2018 Tech Elite 250 List

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] April 30, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2018 Tech Elite 250 list. The list recognizes Lewan an part of an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers like Cisco, VMware, Dell EMC, HPE and Microsoft.

Read More [fa icon="long-arrow-right"]

6 Steps to Keep Your Computer Running Like New

[fa icon="pencil'] Posted by Heidi Van Anderson [fa icon="calendar'] April 17, 2018 [fa icon="tags'] Managed Services, How To Guide, Managed Infrastructure & Helpdesk, IT Solutions

No matter what industry you work in, there is probably a good chance you spend a lot of your day on a computer or laptop. The last thing you need is to have an issue with it right before an important deadline or even just during a regular busy work day.

Read More [fa icon="long-arrow-right"]

How to Build a Secure Network of Internet of Things (IoT) Devices

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] April 10, 2018 [fa icon="tags'] Cisco, Networking, Data Security, Information Security, IoT

The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call home and execute functions that it’s designed for.

It’s become a hot topic in the last decade, but IoT has actually been around much longer than that even. One of the first mainstream consumer-facing applications was implemented in 1982. It was a smart Coca-Cola vending machine that reported the status of the vending machine so a technician could be sent to refill the cans when it was running low. If we fast forward to 2020, researchers predict 30-50 BILLION devices will be connected. By comparison, that’s 4-7x the world’s population.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts