<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Microsoft Windows, Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Data Storage, Data Backup & Recovery, Email Security, Data Security, Information Security

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

How to Select a Managed Security Service Provider

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] September 20, 2017 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run our Security Operations Center (SOC) and provide over-watch for our Network Operations Center (NOC). These teams take security seriously for our clients who take security seriously.

With this have come a lot of best practices and insights. Here are two main points that I hope you’ll find helpful when looking for a managed security service provider.

Read More [fa icon="long-arrow-right"]

Cisco Live 2017 Recap, News & Product Updates

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] August 8, 2017 [fa icon="tags'] Virtualization, Cisco, Networking, Unified Communication & Collaboration, Email Security, Cloud Computing, Product Announcements, Data Security, Information Security, Meraki

Cisco Live is one of the most awaited events every year for networking enthusiasts. This year the conference returned to Las Vegas, June 25 – 29 with some impressive stats: 28,000 attendees , 3,000 speakers and 1,000 education sessions.

Read More [fa icon="long-arrow-right"]

Ransomware Case Study: How to Restore Affected Files without an Incremental Backup System

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 11, 2017 [fa icon="tags'] How To Guide, Email Security, Data Security, Information Security

Guest post by Corey Blackwell, a Technical Coordinator at Lewan. 

Read More [fa icon="long-arrow-right"]

Internet Proxy Servers, VPN and Ransomware: Beware!

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] December 14, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

Proxy servers and VPN services are an important feature for today’s mobile business to adapt. They allow users to remotely access the company network when working from a virtual office. They can also open the door to a malicious attack if not properly managed and allowed to users in limited form. Here’s a breakdown of what you need to know and how your company can protect itself from ransomware like CryptoLocker and the newest incarnation, Cerber.

Read More [fa icon="long-arrow-right"]

Fake Mobile Retail Apps and How to Protect Yourself from ID Theft

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] November 23, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

A new scam just in time for Black Friday and holiday shopping.

Our mobile devices are a great way to accelerate our lives and make them easier and less hectic, especially when navigating the holiday shopping rush. Unfortunately, malicious scammers know this too and are now hijacking retail stores’ mobile applications, hoping you’ll install their fake version on your mobile device so they can steal your identity.

Read More [fa icon="long-arrow-right"]

Are you confident in your Disaster Recovery plan? Request a Free Review

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] August 30, 2016 [fa icon="tags'] Managed Services, Data Storage, Data Backup & Recovery, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, Microsoft Azure

In the case of an outage, it's important for organizations to prepare their disaster recovery (DR) strategy now so they have a plan in place to prevent business downtime and revenue loss.

Read More [fa icon="long-arrow-right"]

Six Underused Multifunction Printer Features & Apps

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 3, 2016 [fa icon="tags'] Managed Services, Xerox, How To Guide, Paperless Solutions, Paper, Printers & Copiers, Data Security

Guest post by Rebecca Tuka, who heads learning & development and leadership skills training for our printer repair and copier service team at Lewan Technology.

Your "copier" does a lot more than just make copies these days. Like most of today’s technology, your Xerox multifunction/all in one printer (MFP) it full of features and apps to enhance the device’s capabilities. However, most users take advantage of very few of the features and best practices on their office devices.

Here are my TOP 6 underused productivity enhancements on your Xerox multifunction printer.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts