Posts in Cloud

Successful IT Transitions Need These 5 Components

July 12th, 2019 Posted by Best Practices, Cloud, Communication, Data, Security, Staff 0 thoughts on “Successful IT Transitions Need These 5 Components”

Change is easy to get excited about and easy to get started, but it’s tough to follow through and keep the momentum going. Especially when it feels like there’s no end in sight, as can happen with IT projects if you’re not careful. But it doesn’t have to be an endless slog. If you build these 5 components into your IT transition, the entire process will be much smoother and more successful from beginning to end.

1. A tracking system – a simple list of major goals and initiatives, refer to it often (especially if you’re thinking about adding anything), and check off progress as you go. This helps to keep the direction clear, make the steps and goals feel attainable, and makes progress easy to see. All of these will make it easier for your staff to maintain motivation and momentum.

2. Clear communication – When people don’t understand what they’re doing or why, they lose focus, motivation, and enthusiasm. So, make all communications regarding the transition as transparent and simple as possible. Lose the tech jargon and talk about the benefits, challenges, and goals in a way that everyone can understand.

3. Available support personnel – It’s likely that there will be a handful of people in your organization who are always in demand during any IT transition. They’re the ones who always seem to know what’s going on and how to fix it. It’s essential that these people be free to work on higher level issues, while anything else is delegated to employees with less expertise and/or less demand on their skills and time. This will help the transition move more quickly and smoothly while encouraging less experienced staff to learn and take on new responsibility.

4. Clear transitions and expectations – make sure that your employees know when and how to transition from doing things the “old way” to adopting your new solutions and processes. Whether this is an entirely new role or just a new approach, you can cut down on confusion, frustration, and unnecessary delays by ensuring that everyone knows what to do and when to do it.

5. Data-based targets – It’s important to both morale and progress that you and your team can identify what “done” is for any given stage or goal in the transition. This gives you a framework to discuss their progress and direction, and it gives them a definite path to follow.

5 Reasons Your Business Needs a Backup and Recovery Plan

May 6th, 2019 Posted by Best Practices, byod, Cloud, Data, Disaster, Hackers, Security, Staff 0 thoughts on “5 Reasons Your Business Needs a Backup and Recovery Plan”

If you lost all your business data today, how long would it take for your business to recover? What steps would you take to get everything up and running again? How would it impact you financially? Knowing the answers to these questions is all part of being prepared. Just like having a back up and recovery plan. Here is some more compelling evidence that this is a necessary part of any business today:

1. Data is Easy to Lose – not just major events, a lot of it is human error. This is especially true in a BYOD culture where you may have business data being stored on personal laptops or in personal cloud accounts of your employees.

2. Cyber Attacks Keep Coming – the average cost of an attack for a company with 10 – 24 employees is over $38,000, and it just goes up from there. It doesn’t matter what type of business or the size, hackers will target anything they can profit from.

3. Downtime – loss of data can bring your entire business to a grinding halt. And if that data can’t be recovered, it takes even more time to replace (if that’s even an option).

4. Irreplaceable Data – some documents or files are truly invaluable. Everything from client lists and research to files on upcoming projects. If all that disappeared in one day, where would your business be?

5. Reputation – do you hold any sensitive or personal data on for your clients or customers? Or data that your clients will need to access in the future, like health care records or financial information. How would telling them it was all gone impact your relationship with them? Or your reputation in the business community?

A variety of back up and recovery options are available and can be customized to suit your business. Contact one of our engineers today if you would like to learn more about your options or get an expert’s perspective on developing your own backup and recovery plan.

Pros and Cons: Cloud Computing

March 18th, 2019 Posted by Best Practices, Cloud, Data, Devices, Internet, Managed Service Provider 0 thoughts on “Pros and Cons: Cloud Computing”

Should you be entrusting your data to the cloud or keeping it down to earth on your own servers? This is a decision facing every business. It’s one you’ll be forced to consider carefully, because it’ll impact your business practices and expenses for the foreseeable future. There’s plenty to be said for both cloud storage and dedicated servers, which makes the question which one is right for you. In this post we’ll be covering the pros and cons of the cloud.

Advantages of the Cloud

Cost Savings
One of the biggest benefits of cloud computing is the cost savings. With cloud computing, you can save substantial IT costs by eliminating the need to purchase, operate, and maintain server equipment. You pay for what you use, and you can stop whenever you like. This can make cloud computing ideal for some businesses all by itself. Though it is worth noting that in some instances an on-site server can actually be less expensive than using the cloud.

Reliability
With a managed service platform, your business can benefit from a large pool of IT resources that are dedicated to ensuring a reliable connection to your data at all times. These generally include redundancies that most businesses wouldn’t have built into their own personal servers.

Manageability
With a service level agreement (SLA) you get all the benefits of a high-end system without the hassle of performing updates and maintenance yourself.

Strategic Edge
The ease and accessibility of computer resources can give you a competitive edge, since the time you require for upgrading your IT resources to meet the needs of your business is basically nothing. This allows you to focus on moving your business forward.

Disadvantages of the Cloud

Downtime
If the internet is down, you have no access to your data and possibly the applications you use to run your business. Depending on the quality of internet service available in your area, this could be a significant disadvantage.

Security
Cloud service providers do everything they can to ensure the security of your data. But any time you’re storing data and important files with external service providers, it opens up some risk. It’s unlikely to be an issue, but you should consider the potential consequences any time you’re trusting someone else to safeguard your business’s information.

Vendor Lock-In
Moving to the cloud can be a quick, easy process. But moving between cloud services can get rather difficult. Not all services are cross-compatible, and you may end up staying with a less-than-ideal set up for a few features that you’re not sure how to do without.

Limited Control
Since the cloud infrastructure is entirely owned, monitored, and managed by the service provider, control over what you can change, update, or access is limited to the applications, data, and services you’re paying to use.

The advantages of cloud computing are many, and it’s well worth considering as an option for your business. But don’t forget about on-site servers just yet, because they have some pretty great advantages of their own. We’ll discuss both the advantages and disadvantages of on-site servers in our next blog post.

If you’re considering the future of your business IT and want input from the experts, our engineers here at Think would be happy to help. Contact us to schedule a consultation.

Speed Up Your Browser

Speed Up Your Browser with 5 Simple Steps

December 11th, 2018 Posted by Best Practices, Cloud, Data, Desktop, Internet, Managed Service Provider, Services 0 thoughts on “Speed Up Your Browser with 5 Simple Steps”

Is Your Browser Running Slow?

There’s nothing worse than a website that won’t load. Over time, high volumes of content can cause your Internet browser to slow down. However, with a bit of maintenance, it’s easy to ensure your browser stays speedy for longer.

The following tips apply across all major Internet browsers, including but not limited to Google Chrome, Mozilla Firefox and Internet Explorer.

5 Tips to Speed Up Your Browser

1. Remove unused extensions – Too many plug-ins and extensions can slow down your browser. They take up system resources and can even cause bugs and crashes. Extensions can add useful features to your browser, but it’s a good idea to occasionally remove the ones you no longer use or need.

For extensions you need, make sure they’re regularly updated. Your browser should automatically handle updates this, but it’s worth double-checking. Just like keeping the browser itself updated, ensuring you’re running the latest versions of your add-ons keeps them bug-free and running smoothly.

2. Clear your cache and cookies – As you surf the web, your browser keeps records of your files in its cache to speed up your experience. The next time you visit a site, the cached files are already present, so your browser only needs to download the new bits from the web. This means less time waiting, and in general, a faster browsing experience.

However, it is recommended to occasionally cear out your cache and start again. Your browser should automatically manage the cache, but it can get unwieldy and cause the occasional bug or glitch. If you want to keep your browsing speed as good as new, then wipe the slate clean every few months or so. Afterwards, you might notice a slight slowdown to begin with, as your browser rebuilds the cache, but it should quickly go back to normal.

At the same time you clear your cache, you should clear your cookies as well. Cookies are bits of data that websites record on your machine to identify who you are, where you’re from, your website preferences, etc. Usually these cookies are harmless and useful, but a regular purge will quickly get rid of any corrupt or unnecessary ones.

3. Uninstall and reinstall your browser – Removing unused extensions and clearing the cache/cookies are great tips for stopping browser slowdowns – sort of like returning your car to its original state by erasing all the issues and problems that have built up. Uninstalling and reinstalling your browser is a quick shortcut to do the same job.

Once the old version of your browser is uninstalled, you can reinstall the latest update from the Internet. As well as eliminating any corrupted data caches and unneeded extensions, this will make sure that you’re running the most up-to-date version of the software, an important factor in keeping your browser running smoothly. Staying up to date is vital in fixing bugs and blocking security threats and most modern browsers download updates automatically.

4. Manage your tabs – Managing your open tabs more efficiently will help you browse faster. The more tabs you have open, the slower your browser will run. For faster browsing, keep the number of open tabs to a minimum and resist the urge to have a dozen tabs open at once. If you need to keep track of several sites to return to later, you can bookmark the pages for later. Pro tip: Set up a “Temporary” folder within your bookmarks for this scenario.

5. Install a cleanup tool – Some add-ons and apps can help you keep your browser running at top speed. Most of these tools handle the cleaning jobs we covered above, like tidying up cached files that you don’t need any more. It’s worth researching and testing a couple to see if you notice any speed increases. There are also desktop programs to clean up browser clutter.

Still Need Help?

If your browser is still slow after completing the above steps, there might be another issue lurking behind the scenes. Think’s engineers are highly trained and certified to assist with all of your technology needs. Contact us for additional support!

Source: Popular Science

Secure Shopping

Stay Secure When Shopping Online

November 14th, 2018 Posted by Cloud, Data, Desktop, Hackers, Hosted Services, Managed Service Provider, Security, Services 2 thoughts on “Stay Secure When Shopping Online”

9 Tips for Secure Shopping Online

As we approach the holiday season, we encourage extra mindfulness when it comes to online shopping.

There are some simple precautions that will make your online purchases more secure, including using reputable third-party pay services (like PayPal) whenever possible, always logging out of sites after you’ve completed a purchase and selecting one credit card for all online purchases to limit exposure.

Here are 9 tips for staying safe online, so you can start checking off items on that holiday shopping list:

1. Use familiar/trusted websites – Start at a trusted site rather than shopping with a search engine. Search results lead you astray, especially when you drift past the first few pages of links. If you know the site, chances are it’s less likely to be a rip off. Beware of misspellings or sites using a different top-level domain (.net instead of .com, for example).

2. Look for the padlock icon – Never buy anything from a site that doesn’t have SSL (secure sockets layer) encryption installed. You’ll know if the site has SSL because the URL for the site will start with “HTTPS” instead of just “HTTP”. An icon of a locked padlock will appear, typically in the status bar at the bottom of your web browser, or right next to the URL in the address bar, depending on your browser. Never give anyone your credit card over email.

3. Don’t provide all of your info– No online shopping store needs your social security number or your birthday to do business. However, combined with your credit card number, your social security number and other identification numbers can do a lot of damage. When possible, default to giving the least amount of information.

4. Check your bank statements – Don’t wait for your bill to come at the end of the month. Go online regularly during the holiday season to review statements for your credit card, debit card, and checking accounts. Make sure you don’t see any fraudulent charges. If you do see something wrong, pick up the phone to address the matter quickly. In the case of credit cards, pay the bill only once you know all your charges are accurate.

5. Protect your devices – You can protect against malware with regular updates to your operating system, browsers and software. Software companies add security updates along with every upgrade released. Installing updates as soon as they are released can help you better protect your devices against malware. You should also run a reputable, anti-virus product on your home PC or laptop. This will help prevent your device from becoming infected with malware.

6. Use strong passwords – It’s always important to utilize strong passwords, but it’s never more important than when banking and shopping online. Make sure your passwords are unique for each website, contain a healthy mix of letters, numbers and symbols when allowed. Passwords should not be easy to guess (like your last name or birthday). Use a password protected spreadsheet or secure app to store your passwords. When possible, set up multi-factor authentication for additional security.

7. Avoid shopping on public devices – It should go without saying that it’s a bad idea to use a public computer to make purchases. If you must, remember to log out every time you use a public computer, even if you were just checking email. Avoid entering your credit card and expiration date on websites in public, even if you’re using your own devices. By doing so you’re giving onlookers the chance to steal your information. At the very least, double check no one is looking and be as discreet as possible.

Additionally, don’t use publicly available charging cords or USB ports to charge your devices. Publicly available power outlets are generally fine, but the cords or ports could be used to deliver malware to your phone.

8. Avoid shopping via public Wi-Fi – Avoid using public Wi-Fi hotspots – like the ones at coffee shops, airports, hotels, etc., for online shopping. If you do use a public Wi-Fi hotspot, be sure to use a Virtual Private Network (VPN) so others cannot intercept your communications. As an alternative, stick to the mobile network and create a personal Wi-Fi hotspot with your phone.

9. Keep an eye out for obvious scams – Stick to the source when you buy gift cards; scammers like to auction off gift cards on sites like eBay with little or no funds on them. Some scams offer of a free product with purchase, like an iPad or even holiday job offers. Many of these “offers” will surface on social media or phishing emails. Be wary if you get a message from friend claiming he or she has been robbed, especially a friend overseas looking for money to be wire transferred, unless you absolutely can confirm it by talking to him or her personally. Skepticism in most cases can go a long way toward saving you from a stolen card number.

Trust Your Judgement

If you’re shopping online and something seems fishy, it probably is. Trust your judgement or ask for a second opinion before submitting your credit card or other personally identifying information online. No purchase, no matter how great of a deal, is worth the risk of identity theft.

While following these guidelines won’t completely eliminate the chance of becoming a victim of cybercrime, they can help you avoid risky situations and protect yourself against identity theft.

Happy Shopping!

 

Sources: PC Mag & ColoradoBiz

vCIO

What Does a vCIO Do Anyway?

November 14th, 2018 Posted by Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “What Does a vCIO Do Anyway?”

vCIO, Explained

Despite the title, a vCIO, or Virtual Chief Information Officer, is not virtual at all.

For many Managed Service Providers (MSPs), like Think Network Technologies, a vCIO is somewhat of a figurehead. A vCIO serves as an outsourced Chief Information Officer for organizations that don’t have a full-time CIO on staff. The vCIO is an off-site business position.

But What Does a vCIO Do?

This service offers key insight into the development of business strategies as they pertain to technology. That means they spend a lot of time in the field, digging around customers’ wiring crouching under desks and testing their clients’ technology infrastructures.

A vCIO should perform the same functions as a conventional CIO – collaborating with and advising clients’ IT departments. This includes formulating strategic IT goals, planning the IT budget, analyzing and reworking business processes and facilitating technology changes.

Working inside a company’s infrastructure begins with a network assessment of an organization’s current technology and limitations, ultimately building a roadmap to a more productive future. Software analysis tools and old-fashioned legwork are utilized to perform the network assessment.

Some tools a vCIO uses are optional, but having the expertise and knowledge to address your technology needs is not.

Does My Company Need a vCIO?

What role does technology play in your business? – Do you know what applications your employees and/or customers depend on? Do you know what your security requirements are? Do you know what data access needs you have?

What are your company’s growth plans? – Does your company have a growth plan to help anticipate your future technology needs?

What are your business objectives? ­– Do you know your company’s long and short-term business goals, including what technology you will need to reach those goals?

If you don’t know or are unclear about any of the answers to the questions above, you probably need a vCIO. Generally speaking, any organization thinking about the big picture of the company needs a vCIO.

Get in Touch

Think’s vCIO service aligns your organization’s IT strategy with overall objectives and provides the best technology solutions to maximize efficiency. Contact us to learn more.

Credit: Gordon Flesch Company, Inc.

IT Audit

How to Run a Simple IT Audit

November 14th, 2018 Posted by Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “How to Run a Simple IT Audit”

Conduct an IT Audit in 6 Easy Steps

You can’t manage an IT system effectively if you don’t know what it’s made of. It’s easy to lose sight of what makes up your IT ecosystem, especially if IT is not your only responsibility at work. Keeping track of IT systems is increasingly more difficult with emerging technologies.

In order to develop an IT strategy for the future, it’s important to take an occasional pulse on your existing IT systems. Here are six easy steps to perform a simple IT audit:

1. Start with the hardware

Bring your own device policies have made it easier to lose track of the hardware being used in the business. Some policies don’t just allow employees to bring in personal devices; they allow those with access to departmental budgets to purchase hardware without running it through IT.

Your accounts department should be able to give you the official list of what hardware has been purchased. But other purchases might not have been given an “IT” code when run through accounts.

Now is a good time to survey department heads to see what’s actually in use. You’re likely in for some surprises. You’ll likely find some employees working on devices they own and others working on devices the company bought.

2. Good records make for good decisions

You can track the findings in a basic spreadsheet, but it’s better to use a dedicated desktop management app.

Knowing what’s actually happening will help you determine if there are better ways to pay for the technology your company needs.

3. Check use-by dates

Keep an eye out for PCs, servers, printers, and other office hardware that’s close to end-of-life or end-of-lease. Work with your account department and suppliers to put together a plan for phasing out old equipment and phasing in new equipment.

4. Software audit

Find out what software is running on your machines – and which machines it’s running on. Ask what budget was used to buy it. Again, this information will help you make better decisions in the future.

Remember, software can also have a use-by date if the vendor isn’t going to support it. And software as a service (SaaS) subscriptions can also expire.

Find out if employees are subscribing to their own cloud solutions using corporate funds. Even when those services are paid for on corporate credit cards, they can slip through accounting because they aren’t assigned to the right budget.

5. Security focus

Security software, like antivirus apps, virtual private network solutions, and encryption, needs special attention. Check to make sure your license or subscription has not expired – you don’t want to find your license or subscription has lapsed when it’s key to your defenses.

6. Finish with a walk

Just by walking the floors, you’ll be amazed at what hardware and software use you spot that wasn’t picked up in any other process. Take inventory of your findings.

Put Your Audit into Action

So you’ve completed an IT audit. Now what? Use your findings to determine which technologies need to be replaced, renewed or recycled.

Make sure purchases for new hardware and/or software are prioritized and worked into your company’s IT budget. Schedule time to conduct a simple IT audit at least once a year to continue to plan for the future.

Think Can Help

An in-depth, professional analysis of your company’s IT systems can assist in driving future technology goals for your business. Think Network Technologies offers a variety of IT solutions and services, including professional IT audits.

For more information about how we can support your business, contact us.

Butterfly Code Mural

Think Spearheads Mural to Beautify North Main

October 31st, 2018 Posted by Cloud, Community, Managed Service Provider, Press Release 0 thoughts on “Think Spearheads Mural to Beautify North Main”

Think partnered with artist Mariah Kaminsky and Mountain Middle School students to complete a mural, titled “Butterfly Code”, on the alley wall behind Think at 3067 Main Avenue in Durango in an effort to beautify the North Main neighborhood. Think was awarded the City of Durango’s Durango Creates! grant in September, which provided funding for the mural.

The mural, which spans the entire alley-facing wall of Think’s headquarters, measuring roughly 20’x25’, features two butterflies in a blue sky with clouds. The butterflies represent change. The wings of one butterfly depict circuit board patterns and the wings of the other butterfly display binary code, long strings of zeros and ones. The clouds symbolize “cloud technology” and the movement toward cloud technology in the future.

Butterfly Code Mural

“The imagery shows the harmony between technology and nature – a nod to our business as a technology company and our commitment to the environment and community. While the two can seem to be at odds with one another, Think promotes getting outdoors and a healthy work-life balance,” said Melissa Glick, Think CEO.

The “Butterfly Code” mural was completed October 26th and an informal unveiling celebration took place October 30th with the City of Durango Public Art Commission, Mariah Kaminsky, Mountain Middle School, and other businesses and community members in the North Main neighborhood.

Butterfly Code Mural

“The alley sees significant pedestrian traffic, including many students from Mountain Middle School who will enjoy the artwork. We hope the mural will bring more visitors to North Main and boost the economy as a result. We are thrilled to participate in cleaning up the neighborhood,” Glick said.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

Photo credit: Mariah Kaminsky & Mountain Middle School

Network Security

Layer Your Security Like a Bean Dip

October 11th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Layer Your Security Like a Bean Dip”

What is Network Security?

Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network and targets a variety of threats to stop them from entering or spreading on your network.

The Layered Approach

Like a bean dip, your security should be layered. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but hackers are blocked from carrying out threats.

The layered security approach is a simple concept: the more hoops a hacker has to jump through, the less likely they are to be successful. The trick is to create a layered bean dip with the right consistency so your chip doesn’t break off. In other words, while you want hackers to have a hard time breaking into your systems, you want to keep your security simple and seamless for users.

6 Layers of Security

1) Response Plan – The first layer, the foundation, is the response plan. In the event of a breach, having a clear response plan in place will help ensure that you address all of the necessary pieces of remediation. Without a plan, you are more likely to miss something as you hastily try to patch holes, leaving your company still vulnerable.

2) Monitoring & Alerting – The second layer is monitoring and alerting. Monitors to help ensure complete coverage of a solution and the networks on which it runs and alerts help ensure that system failures and other issues are dealt with quickly. Without monitoring and alerting, you may never know a hacker has infiltrated your system.

3) Data Encryption & User Permissions – The third layer is like the lettuce and tomato – two ingredients that combine to make one layer. Data is most likely the most important piece of your business, so data encryption and user permissions are essential layers of security.

4) Applications – Data lives within applications, so naturally this is the next layer of security. Ensuring access to applications is accurate and limited, in addition to practicing secure coding methods will help protect your application layer.

5) Operating System – Applications are usually accessed from a desktop, laptop, tablet, or mobile device – so it’s important to make sure these devices are secure. Antivirus software, security policies and patching add security to operating systems.

6) Network – The last layer is the network. Setting up firewalls, intrusion detection systems and user authentication technologies are a few ways to protect your network from potential hackers.

The Bottom Line

Layers of security make your network safer. The better you layer your approach, the safer your network will be.

We Can Help

You need to work with someone who is keeping their eye on the shifting technology landscape – it’s worth working with a trusted adviser to navigate the options, especially when money is a consideration.

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can optimize network security and support your business, contact us.

Technology News - September 2018

Technology News – September 2018

September 19th, 2018 Posted by Cloud, Internet, Newsletters, Security 0 thoughts on “Technology News – September 2018”

Your Guide to the Most Relevant Technology News

Here’s what we’re reading this month:

The right to be forgotten allows individuals to have their data erased from certain sources, including search engines like Google, Bing and Yahoo. The GDPR enforces this law for EU citizens, but the right to be forgotten could be enforced worldwide in the future. Google and its supporters argue that “European data regulators should not be allowed to decide what internet users around the world find when they use a search engine.” Read more here.

Apple iOS 12 was released, adding new features to existing phones and gearing up for the release of the new iPhone Xs and Xr phones. The new operating system includes new features and improvements, Group Facetime, allowing Facetime for up to 32 people, among the most notable and anticipated. Read more here.

The Samsung Galaxy Note 9 is here. Changes from the Note 8 include Samsung’s biggest screen ever, better color accuracy, S Pen upgrades, and improved storage and battery life. Read more here.

A recent Forbes article examines the “missing link in developing a cyber security strategy”. The author, CTO at a technology company, says that communication between the IT team and executives is often overlooked in strategy design, resulting in oversight of potential risks and lack of understanding for solutions to avert them. Read more here.

Facebook announced its initiative to build its first Asian data center. The facility, located in Singapore, is expected to open in 2022 and will support hundreds of new jobs. As mobile growth, e-commerce and cloud computing demand rise, the investment is crucial. Read more here.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.