<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Cisco Live 2017 Recap, News & Product Updates

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] August 8, 2017 [fa icon="tags'] Virtualization, Cisco, Networking, Unified Communication & Collaboration, Email Security, Cloud Computing, Product Announcements, Data Security, Information Security, Meraki

Guest post by Lewan Solutions Architect Priyank Ghedia. 

Cisco Live is one of the most awaited events every year for networking enthusiasts. This year the conference returned to Las Vegas, June 25 – 29 with some impressive stats: 28,000 attendees , 3,000 speakers and 1,000 education sessions.

There was something for every type of IT professional with sessions on Border Gateway Protocol (BGP), firewalls, data center architectures, cloud security plus opportunities to talk to industry specialists, peers and networking experts.

Read More [fa icon="long-arrow-right"]

Ransomware Case Study: How to Restore Affected Files without an Incremental Backup System

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 11, 2017 [fa icon="tags'] How To Guide, Email Security, Data Security, Information Security

Guest post by Corey Blackwell, a Technical Coordinator at Lewan. 

Read More [fa icon="long-arrow-right"]

Internet Proxy Servers, VPN and Ransomware: Beware!

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 14, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

Proxy servers and VPN services are an important feature for today’s mobile business to adapt. They allow users to remotely access the company network when working from a virtual office. They can also open the door to a malicious attack if not properly managed and allowed to users in limited form. Here’s a breakdown of what you need to know and how your company can protect itself from ransomware like CryptoLocker and the newest incarnation, Cerber.

Read More [fa icon="long-arrow-right"]

Fake Mobile Retail Apps and How to Protect Yourself from ID Theft

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] November 23, 2016 [fa icon="tags'] Email Security, Data Security, Information Security

A new scam just in time for Black Friday and holiday shopping.

Our mobile devices are a great way to accelerate our lives and make them easier and less hectic, especially when navigating the holiday shopping rush. Unfortunately, malicious scammers know this too and are now hijacking retail stores’ mobile applications, hoping you’ll install their fake version on your mobile device so they can steal your identity.

Read More [fa icon="long-arrow-right"]

Are you confident in your Disaster Recovery plan? Request a Free Review

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] August 30, 2016 [fa icon="tags'] Managed Services, Data Storage, Data Backup & Recovery, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, Microsoft Azure

In the case of an outage, it's important for organizations to prepare their disaster recovery (DR) strategy now so they have a plan in place to prevent business downtime and revenue loss.

Read More [fa icon="long-arrow-right"]

Six Underused Multifunction Printer Features & Apps

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 3, 2016 [fa icon="tags'] Managed Services, Xerox, How To Guide, Paperless Solutions, Paper, Printers & Copiers, Data Security

Guest post by Rebecca Tuka, who heads learning & development and leadership skills training for our printer repair and copier service team at Lewan Technology.

Your "copier" does a lot more than just make copies these days. Like most of today’s technology, your Xerox multifunction/all in one printer (MFP) it full of features and apps to enhance the device’s capabilities. However, most users take advantage of very few of the features and best practices on their office devices.

Here are my TOP 6 underused productivity enhancements on your Xerox multifunction printer.

Read More [fa icon="long-arrow-right"]

12 Ways App & Desktop Virtualization Is Transforming IT (Infographic)

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] March 22, 2016 [fa icon="tags'] Virtualization, Citrix, Citrix XenApp, Citrix XenDesktop, Microsoft Windows, Data Security, infographic

"More than 35 million Americans in the workforce did some or all of their work at home in 2014."
"Mobile workers will account for nearly three quarters (72%) of the total U.S. workforce by 2020."

What does this all mean? Forward-thinking businesses of every size are turning to application delivery and desktop virtualization to reduce IT costs, provide greater mobility and productivity for employees, and to improve data security and compliance.

Read More [fa icon="long-arrow-right"]

Beware! What is Spear Phishing Email and How to Avoid Getting Scammed

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] March 3, 2016 [fa icon="tags'] How To Guide, Lewan News & PR, Microsoft Outlook, Email Security, Data Security, infographic

Are your employees on the lookout for spear phishing emails? Could they spot and prevent one if an attempt is made?

91% of targeted attacks involve spear phishing emails. (Trend Micro)

We're unfortunately seeing an increase in clients falling prey to a common phishing technique called spear phishing. Unlike the wide net cast by other common phishing attempts, spear phishing is directed at specific individuals or companies.

Read More [fa icon="long-arrow-right"]

Lewan Named as 2015 CRN Triple Crown Award Top IT Services Companies

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] December 9, 2015 [fa icon="tags'] Managed Services, Virtualization, Data Storage, Data Backup & Recovery, Lewan Awards & Certifications, Unified Communication & Collaboration, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, IT Solutions

Lewan Technology is proud to announce that we have been honored with the esteemed 2015 CRN Triple Crown Award, recognizing standout top IT services companies. Lewan was chosen as one of just 57 North American companies to qualify for the list.

Read More [fa icon="long-arrow-right"]

Lewan partners with Webroot to deliver zero-day threat protection

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] August 18, 2015 [fa icon="tags'] Data Security

Lewan Technology is excited to announce a new partnership with Broomfield, Colorado based Webroot, a market leader and Gartner Magic Quadrant Visionary, in real-time internet threat detection.

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts