Guest post by Corey Blackwell, a Technical Coordinator at Lewan.
Proxy servers and VPN services are an important feature for today’s mobile business to adapt. They allow users to remotely access the company network when working from a virtual office. They can also open the door to a malicious attack if not properly managed and allowed to users in limited form. Here’s a breakdown of what you need to know and how your company can protect itself from ransomware like CryptoLocker and the newest incarnation, Cerber.
Our mobile devices are a great way to accelerate our lives and make them easier and less hectic, especially when navigating the holiday shopping rush. Unfortunately, malicious scammers know this too and are now hijacking retail stores’ mobile applications, hoping you’ll install their fake version on your mobile device so they can steal your identity.
In the case of an outage, it's important for organizations to prepare their disaster recovery (DR) strategy now so they have a plan in place to prevent business downtime and revenue loss.
Guest post by Rebecca Tuka, who heads learning & development and leadership skills training for our printer repair and copier service team at Lewan Technology.
Your "copier" does a lot more than just make copies these days. Like most of today’s technology, your Xerox multifunction/all in one printer (MFP) it full of features and apps to enhance the device’s capabilities. However, most users take advantage of very few of the features and best practices on their office devices.
Here are my TOP 6 underused productivity enhancements on your Xerox multifunction printer.
"More than 35 million Americans in the workforce did some or all of their work at home in 2014."
"Mobile workers will account for nearly three quarters (72%) of the total U.S. workforce by 2020."
What does this all mean? Forward-thinking businesses of every size are turning to application delivery and desktop virtualization to reduce IT costs, provide greater mobility and productivity for employees, and to improve data security and compliance.
Are your employees on the lookout for spear phishing emails? Could they spot and prevent one if an attempt is made?
91% of targeted attacks involve spear phishing emails. (Trend Micro)
We're unfortunately seeing an increase in clients falling prey to a common phishing technique called spear phishing. Unlike the wide net cast by other common phishing attempts, spear phishing is directed at specific individuals or companies.
Lewan Technology is proud to announce that we have been honored with the esteemed 2015 CRN Triple Crown Award, recognizing standout top IT services companies. Lewan was chosen as one of just 57 North American companies to qualify for the list.
Lewan is pleased to announce we have again achieved the Cisco Channel Customer Satisfaction Excellence award, the highest distinction a partner can achieve within the Cisco Channel Partner Program.