<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Colorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] August 21, 2018 [fa icon="tags'] Email Security, Data Security, Information Security, Cyber Security

Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data breach notification timelines in the world. It goes into effect September 1, 2018.

Read More [fa icon="long-arrow-right"]

What is SOC 2 certification and should your Managed Security Provider have it?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 30, 2018 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security, Lewan Awards & Certifications

We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA Security and Breach Notification Requirements.

This is a notable achievement that few providers possess and as such, many clients don’t know to look for these certifications when vetting a new managed services or managed security company.

Read More [fa icon="long-arrow-right"]

5 Reasons You Need a Security Operations Center (SOC)

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 15, 2018 [fa icon="tags'] Information Security, Email Security, Data Security, Managed Services

And 4 reasons you don’t want to do it yourself...

Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering and antivirus. These are the right basics to secure your employees against the Wild West that is the internet, but is this equipment enough to keep your company truly safe?

Yes…and no.

Defensive equipment keeps out the things you have it configured to keep out. But what about the things we don’t know about?

Read More [fa icon="long-arrow-right"]

How to Build a Secure Network of Internet of Things (IoT) Devices

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] April 10, 2018 [fa icon="tags'] Networking, Information Security, Data Security, IoT, Cisco

The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call home and execute functions that it’s designed for.

It’s become a hot topic in the last decade, but IoT has actually been around much longer than that even. One of the first mainstream consumer-facing applications was implemented in 1982. It was a smart Coca-Cola vending machine that reported the status of the vending machine so a technician could be sent to refill the cans when it was running low. If we fast forward to 2020, researchers predict 30-50 BILLION devices will be connected. By comparison, that’s 4-7x the world’s population.

Read More [fa icon="long-arrow-right"]

5 Key Reasons to Upgrade Now to VMware vSphere 6.5

[fa icon="pencil'] Posted by Mike Garner [fa icon="calendar'] March 28, 2018 [fa icon="tags'] VMware vSphere, VMware Horizon, VMware vCenter, VMware, Managed Infrastructure & Helpdesk, Virtualization, Information Security, Data Security

How time flies! Old reliable – Vmware vSphere 5.5 – is set for retirement in September of this year, meaning it will no longer be supported as of September 19, 2018.

See the Entire VMware Lifecycle Matrix

It’s had a good run and due to its impressive stability and wide adoption, I still see it deployed within many of our clients’ environments.

So what now? Our recommendation is to upgrade your systems to vSphere 6.5. Not only do you get the essential extension of support, but some really great new features.

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Information Security, Data Security, Email Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Information Security, Data Security, Email Security, Managed Infrastructure & Helpdesk, Microsoft Windows

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Data Security, Email Security, Information Security, Managed Infrastructure & Helpdesk

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Email Security, Data Security, Information Security, Data Backup & Recovery, Data Storage

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

How to Select a Managed Security Service Provider

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] September 20, 2017 [fa icon="tags'] Data Security, Email Security, Information Security, Managed Services

We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run our Security Operations Center (SOC) and provide over-watch for our Network Operations Center (NOC). These teams take security seriously for our clients who take security seriously.

With this have come a lot of best practices and insights. Here are two main points that I hope you’ll find helpful when looking for a managed security service provider.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts