<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Colorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] August 21, 2018 [fa icon="tags'] Email Security, Data Security, Information Security, Cyber Security

Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data breach notification timelines in the world. It goes into effect September 1, 2018.

Read More [fa icon="long-arrow-right"]

What is SOC 2 certification and should your Managed Security Provider have it?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 30, 2018 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security, Lewan Awards & Certifications

We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA Security and Breach Notification Requirements.

This is a notable achievement that few providers possess and as such, many clients don’t know to look for these certifications when vetting a new managed services or managed security company.

Read More [fa icon="long-arrow-right"]

Finding Information in Multiple Repositories…the Struggle is Real

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 18, 2018 [fa icon="tags'] Document Workflow, M-Files, Paperless Solutions

This is a sponsored guest post by M-Files, a Lewan technology partner.

Information is a key asset to any organization. Even more important is how high the return on that information is. That return is strongly influenced by the ability to manage it and deliver the right information to the right person at the right time.

But how do you do this when your data all over the place?

Read More [fa icon="long-arrow-right"]

5 Reasons You Need a Security Operations Center (SOC)

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 15, 2018 [fa icon="tags'] Information Security, Email Security, Data Security, Managed Services

And 4 reasons you don’t want to do it yourself...

Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering and antivirus. These are the right basics to secure your employees against the Wild West that is the internet, but is this equipment enough to keep your company truly safe?

Yes…and no.

Defensive equipment keeps out the things you have it configured to keep out. But what about the things we don’t know about?

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Information Security, Data Security, Email Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Information Security, Data Security, Email Security, Managed Infrastructure & Helpdesk, Microsoft Windows

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Data Security, Email Security, Information Security, Managed Infrastructure & Helpdesk

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

3 Reasons to Bring Outsourced Printing In-House with a Digital Press

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 26, 2017 [fa icon="tags'] Printers & Copiers, Managed Print Services, Paper

Business cards, letterhead, brochures, catalogs, labels, banners, postcards...these are all common collaterals that companies need to print to support their employees and market to their customers. With the ease of today’s online printing sites with drag and drop proofs and point and click ordering, many organizations think outsourced printing is their best option for both efficiency and price.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Email Security, Data Security, Information Security, Data Backup & Recovery, Data Storage

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

How to Save Presets in Xerox Printer Drivers

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 3, 2017 [fa icon="tags'] Xerox, Paper, Printers & Copiers, How To Guide, Microsoft Outlook

Some of the most helpful and most underused features of your Xerox printer are the printer settings you can manage from your computer, also referred to as the Xerox printer driver. Within these printing preferences, you have the ability to save presets for frequently used settings. For example, if you often want a first page printed on letterhead then the proceeding pages printed on normal paper.

You can also apply program specific presets which will affect all jobs printed from a particular program. For example, you can use this style of preset to make all emails print in grayscale to reduce unnecessary color printing.

Let’s look closer at these two examples to show you how creating presets works.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts