<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Colorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] August 21, 2018 [fa icon="tags'] Email Security, Data Security, Information Security, Cyber Security

Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data breach notification timelines in the world. It goes into effect September 1, 2018.

Read More [fa icon="long-arrow-right"]

What is SOC 2 certification and should your Managed Security Provider have it?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] July 30, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, Email Security, Data Security, Information Security

We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA Security and Breach Notification Requirements.

This is a notable achievement that few providers possess and as such, many clients don’t know to look for these certifications when vetting a new managed services or managed security company.

Read More [fa icon="long-arrow-right"]

5 Reasons You Need a Security Operations Center (SOC)

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] May 15, 2018 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

And 4 reasons you don’t want to do it yourself...

Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering and antivirus. These are the right basics to secure your employees against the Wild West that is the internet, but is this equipment enough to keep your company truly safe?

Yes…and no.

Defensive equipment keeps out the things you have it configured to keep out. But what about the things we don’t know about?

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Email Security, Data Security, Information Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Microsoft Windows, Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

How to Choose an Identity Management Provider

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] December 22, 2017 [fa icon="tags'] Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Guest post by Todd Moore, a Technical Architect at Lewan Technology.

We are living in a world where we are facing digital technology disruption in every organization and every industry.

Forbes reports that an average of 65 cloud applications are being used in enterprise size companies. With that comes the growing concern of how we can allow employees to quickly access information in a fast and secure manner. 

Enter Identity Management.

Read More [fa icon="long-arrow-right"]

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Jeff Wilkinson [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Data Storage, Data Backup & Recovery, Email Security, Data Security, Information Security

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

How to Select a Managed Security Service Provider

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] September 20, 2017 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run our Security Operations Center (SOC) and provide over-watch for our Network Operations Center (NOC). These teams take security seriously for our clients who take security seriously.

With this have come a lot of best practices and insights. Here are two main points that I hope you’ll find helpful when looking for a managed security service provider.

Read More [fa icon="long-arrow-right"]

Cisco Live 2017 Recap, News & Product Updates

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] August 8, 2017 [fa icon="tags'] Virtualization, Cisco, Networking, Unified Communication & Collaboration, Email Security, Cloud Computing, Product Announcements, Data Security, Information Security, Meraki

Guest post by Lewan Solutions Architect Priyank Ghedia. 

Cisco Live is one of the most awaited events every year for networking enthusiasts. This year the conference returned to Las Vegas, June 25 – 29 with some impressive stats: 28,000 attendees , 3,000 speakers and 1,000 education sessions.

There was something for every type of IT professional with sessions on Border Gateway Protocol (BGP), firewalls, data center architectures, cloud security plus opportunities to talk to industry specialists, peers and networking experts.

Read More [fa icon="long-arrow-right"]

Ransomware Case Study: How to Restore Affected Files without an Incremental Backup System

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] July 11, 2017 [fa icon="tags'] How To Guide, Email Security, Data Security, Information Security

Guest post by Corey Blackwell, a Technical Coordinator at Lewan. 

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts