Posts in byod

blog header image engineer's week

Celebrating Engineer’s Week

February 12th, 2019 Posted by Best Practices, byod, collaboration, Communication, Community, Managed Service Provider, Services 0 thoughts on “Celebrating Engineer’s Week”

Engineer’s Week is February 17th – 23rd, and here at Think we’re pretty excited. In part, because engineering is a huge part of what we do and who we are, but also because engineering is amazing. This is the perfect chance to shine the spotlight on some of the wonderful things engineering has helped us accomplish as well as recognize the dedicated engineers who’ve made them possible, throughout the world and here at Think.

When most people think of engineering, their minds go to fantastic bridges and skyscrapers, which makes sense. Structural engineering makes a splash, because we get to see and use bridges and buildings.

But we have some pretty amazing engineering feats happening right here at Think as well, and some pretty amazing engineers making them happen.

Dan Palmer, Network Engineer, recently received Cisco Certification CICD-Implementing Cisco Collaboration Devices.  By obtaining this certification he has demonstrated knowledge of administrator and end-user interfaces, telephony and mobility features, and Cisco UC solutions maintenance.  This means that he’s ready to help businesses take advantage of systems that facilitate unified communication in offices large and small, from VoIP voice services, visual voicemail, instant messaging, chat, and presence.  Dan sought out this certification because it’s important to him (and to all of us at Think) to provide the best possible support for our customers in all the services we offer. He’s currently working with a new client to set up the communication services that will support their business’s needs and help make communication easy and efficient. Dan is dedicated to doing what it takes to provide the experience our customers are looking for, and we’re happy to celebrate him and all he does.

Some of Dan’s favorite engineering marvels are The Hubble Telescope and NASA’s Voyager. Honestly, it doesn’t get much cooler than seeing galaxies that are billions of light years away and visiting distant parts of our solar system.

Darrell Brooks, Director of Network Infrastructure, recently earned his certification as an Information Systems Security Professional (CISSP). This is one of the most highly regarded certifications in this area, and it allows Darrell to help businesses take care of their security from a business perspective as well as a technological perspective. This is a vital step in information security, because even the most advanced technological security solutions can be undermined by inefficient or incomplete policies and procedures. And all the best intentions in the world can’t compete with well-trained and educated employees.

Darrell chose to pursue this certification because it was important to him to have a more complete skill set that allows him to support our clients on multiple levels. Every business, no matter the size, needs information security. And every business has the opportunity to create policies and procedures that will keep the core of their business secure, stable, and successful regardless of the ways technology and technological threats evolve.

One of Darrell’s favorite engineering marvels is the Internet, because it allows us to access knowledge that wouldn’t have been available in the past. Want to see the pyramids? You can do it from your living room. Need to do a home repair project, but don’t know how? There are videos for that.

To Dan, Darrell, and all of the engineers of the world, we want to extend our thanks. You’ve made the world a better place for so many people and in so many different ways. It doesn’t get any more worthy of celebration than that.

relationship issues blog post header

Relationship Problems: 5 Ways Your Outdated Tech is Getting Between You and Your Staff

February 12th, 2019 Posted by Best Practices, byod, collaboration, Desktop, Internet, Managed Service Provider, Services 0 thoughts on “Relationship Problems: 5 Ways Your Outdated Tech is Getting Between You and Your Staff”

Technology exists to make our lives easier, our work more efficient, and our businesses more productive. It’s the perfect marriage of need and solution. At least it’s perfect until these 5 issues start causing downtime that interferes with your staff and their ability to do their jobs. Are any of these outdated tech issues getting between you and your staff?

1. Low Bandwidth: Nothing is quite as frustrating as waiting for a slow internet connection. Whether it’s downloading files or folders, accessing a database, or waiting on that important email, low bandwidth can make simple business functions torture for your staff. This can lead to everything from frustration to high turn-over, and both of those will impact your bottom line. Create an easy and enjoyable experience as well as an efficient work day for your staff by ensuring that your hardware and network are set up for optimum speeds.

2. Security Issues: Your staff is responsible for handling information that is vital to your business every single day. It’s important that this happens in a safe and productive way. In a digital age this means up to date firewalls, backups, security patches, and policies to ensure that your staff can do their jobs without worrying about an outside threat. Because losing data or getting hacked could cost you far more than just money; it could cost you your business.

3. Outdated Hardware: Old hardware can be the source of all kinds of issues, from overheating components that can fry entire systems to outdated software that leaves your system wide open to digital attacks. The good news is basic maintenance and regular upgrades are a lot easier and less costly than dealing with aging hardware and band-aid fixes. And your staff will be able to focus on their tasks instead of spending their time troubleshooting themselves or with technical support.

4. Inefficient Solutions: Sometimes the biggest problem a business has is not knowing what the best solution is for their IT needs. There are multiple options for every kind of hardware and software need, and choosing the wrong one will slow you down and ultimately cost you. Is cloud the right solution? How advanced is your antivirus? What is the best firewall? Do you have the IT policies and procedures in place that will ensure the security and success of your business? Knowing the right direction for your business will ensure that your staff is as productive as possible.

5. User Error: All the high-end technology in the world can’t save you from an employee who isn’t prepared to use it correctly. This can be devastating when there’s a security breach or a network outage because an employee misplaced a password or deleted the wrong setting. Taking the time to properly educate and train your staff on the digital aspects of your company will not only save you trouble, it will give your business an important edge. We always recommend a business have an IT policy and properly train employees on the BYOD culture. This will give your staff the peace of mind that comes with knowing they’re doing the right thing the right way.

Did a few of these sound a little too familiar? The good news is everything on this list is easy to address, which makes for a happier and more productive workplace. Who doesn’t want that?

Are you ready to get your relationship with technology back on track, but don’t know how? Think’s engineers are highly trained and certified to assist with all of your business technology needs. Contact us for a consultation.

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.