Internet Proxy Servers, VPN and Ransomware: Beware!

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] December 14, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

Proxy servers and VPN services are an important feature for today’s mobile business to adapt. They allow users to remotely access the company network when working from a virtual office. They can also open the door to a malicious attack if not properly managed and allowed to users in limited form. Here’s a breakdown of what you need to know and how your company can protect itself from ransomware like CryptoLocker and the newest incarnation, Cerber.

Read More [fa icon="long-arrow-right"]

Fake Mobile Retail Apps and How to Protect Yourself from ID Theft

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] November 23, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

A new scam just in time for Black Friday and holiday shopping.

Our mobile devices are a great way to accelerate our lives and make them easier and less hectic, especially when navigating the holiday shopping rush. Unfortunately, malicious scammers know this too and are now hijacking retail stores’ mobile applications, hoping you’ll install their fake version on your mobile device so they can steal your identity.

Read More [fa icon="long-arrow-right"]

Are you confident in your Disaster Recovery plan? Request a Free Review

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] August 30, 2016 [fa icon="tags'] Managed Services, Data Storage, Data Backup & Recovery, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, Microsoft Azure

In the case of an outage, it's important for organizations to prepare their disaster recovery (DR) strategy now so they have a plan in place to prevent business downtime and revenue loss.

Read More [fa icon="long-arrow-right"]

Six Underused Multifunction Printer Features & Apps

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 3, 2016 [fa icon="tags'] Managed Services, Xerox, How To Guide, Paperless Solutions, Paper, Printers & Copiers, Data Security

Guest post by Rebecca Tuka, who heads learning & development and leadership skills training for our printer repair and copier service team at Lewan Technology.

Your "copier" does a lot more than just make copies these days. Like most of today’s technology, your Xerox multifunction/all in one printer (MFP) it full of features and apps to enhance the device’s capabilities. However, most users take advantage of very few of the features and best practices on their office devices.

Here are my TOP 6 underused productivity enhancements on your Xerox multifunction printer.

Read More [fa icon="long-arrow-right"]

12 Ways App & Desktop Virtualization Is Transforming IT (Infographic)

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] March 22, 2016 [fa icon="tags'] Virtualization, Citrix, Citrix XenApp, Citrix XenDesktop, Microsoft Windows, Data Security, infographic

"More than 35 million Americans in the workforce did some or all of their work at home in 2014."
"Mobile workers will account for nearly three quarters (72%) of the total U.S. workforce by 2020."

What does this all mean? Forward-thinking businesses of every size are turning to application delivery and desktop virtualization to reduce IT costs, provide greater mobility and productivity for employees, and to improve data security and compliance.

Read More [fa icon="long-arrow-right"]

Beware! What is Spear Phishing Email and How to Avoid Getting Scammed

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] March 3, 2016 [fa icon="tags'] How To Guide, Lewan News & PR, Microsoft Outlook, Email Security, Data Security, infographic

Are your employees on the lookout for spear phishing emails? Could they spot and prevent one if an attempt is made?

91% of targeted attacks involve spear phishing emails. (Trend Micro)

We're unfortunately seeing an increase in clients falling prey to a common phishing technique called spear phishing. Unlike the wide net cast by other common phishing attempts, spear phishing is directed at specific individuals or companies.

Read More [fa icon="long-arrow-right"]

Lewan Named as 2015 CRN Triple Crown Award Top IT Services Companies

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] December 9, 2015 [fa icon="tags'] Managed Services, Virtualization, Data Storage, Data Backup & Recovery, Lewan Awards & Certifications, Unified Communication & Collaboration, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, IT Solutions

Lewan Technology is proud to announce that we have been honored with the esteemed 2015 CRN Triple Crown Award, recognizing standout top IT services companies. Lewan was chosen as one of just 57 North American companies to qualify for the list.

Read More [fa icon="long-arrow-right"]

Lewan partners with Webroot to deliver zero-day threat protection

[fa icon="pencil'] Posted by April Fingerlos [fa icon="calendar'] August 18, 2015 [fa icon="tags'] Data Security

Lewan Technology is excited to announce a new partnership with Broomfield, Colorado based Webroot, a market leader and Gartner Magic Quadrant Visionary, in real-time internet threat detection.

Read More [fa icon="long-arrow-right"]

Lewan receives Customer Satisfaction Excellence distinction from Cisco

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] August 4, 2015 [fa icon="tags'] Virtualization, Data Storage, Lewan Awards & Certifications, Cisco, Networking, Unified Communication & Collaboration, Data Security

Lewan is pleased to announce we have again achieved the Cisco Channel Customer Satisfaction Excellence award, the highest distinction a partner can achieve within the Cisco Channel Partner Program.

Read More [fa icon="long-arrow-right"]

Cisco to Secure the IoE (Internet of Everything)

[fa icon="pencil'] Posted by Brian Pitts [fa icon="calendar'] June 22, 2015 [fa icon="tags'] Cisco, Data Security

To building security across their products, Cisco says it is adding more sensors to network devices to increase visibility, more control points to strengthen enforcement, and pervasive threat protection to reduce time-to-detection and time-to-response.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.