Posts in Cloud

Internet of Things

Buzzword Breakdown: “Internet of Things”

August 10th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Buzzword Breakdown: “Internet of Things””

What is the “Internet of Things”?

The Internet of Things (IoT) refers to the connection of devices that send and receive data through the Internet. Any stand-alone internet-connected device that can be monitored and/or controlled from a remote location is considered an IoT device.

Cars, appliances, lighting, fitness trackers, healthcare and home security can all be connected through the IoT since they contain sensing devices that talk to other machines and trigger additional actions. As smaller, more powerful chips are developed and integrated into devices, the IoT will continue to grow.

Internet of Things
There are 7 main IoT characteristics:

  1. Connectivity – Devices and sensors need to be connected to an item, to each other, actuators, a process and to the Internet or another network to be part of the IoT.
  2. Things – A connected device is only an IoT connected device when “things” (i.e., endpoints) are uniquely addressable, using an IP address or Uniform Resource Identifier.
  3. Data – Data is the glue of the IoT; the first step towards action and intelligence.
  4. Communication – Devices get connected so they can communicate data and this data can be analyzed.
  5. Intelligence – Intelligence is the ability of IoT devices to gather data analytics.
  6. Action – This can be manual action, decision-making or automation.
  7. Ecosystem – The place of the IoT from the perspective of other technologies, communities, goals and the picture in which the IoT fits.

The Internet of Things is Not a “Thing”

The IoT consists of many devices, but also an ecosystem of related processes and other technologies. The IoT includes the hardware, software, connectivity and communication protocols, middleware and much more. The IoT also encompasses many processes and technologies, including big data, analytics, cloud, edge computing or fog computing, IoT platform software, IoT gateways, and more.

Security & Privacy

As devices become more connected within the IoT, security and privacy are a primary concern. Despite these concerns, IoT adoption continues to grow. In fact, smart speaker adoption in the U.S. grew 54% from December 2017 to February 2018, according to a 2018 comScore survey.

4 Tips to make your IoT more secure:

  1. Evaluate your security settings – Examine the settings, especially security settings, and select options that meet your needs without putting you at increased risk. If you install a new version of software or if you become aware of something that might affect your device, reevaluate your settings.
  2. Ensure your software if up-to-date – Patches are software updates that fix a particular issue or vulnerability within your device’s software. Make sure to apply relevant patches as soon as possible to protect your devices.
  3. Connect carefully – When a device is connected to the Internet, it’s also connected to millions of other computers, which could allow attackers access to the device. Consider whether continuous connectivity to the Internet is needed.
  4. Use strong passwords – Some Internet-enabled devices are configured with default passwords to simplify setup. These default passwords can be easily found online, providing limited protection. Choose strong passwords to help secure your device.

Questions?

Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.

Sources: US-CERT, Business Insider, i-SCOOP

Channel Futures MSP 501 2018 Winner

Think Ranked Among Top 501 Global MSPs

August 8th, 2018 Posted by Awards, Best Practices, Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “Think Ranked Among Top 501 Global MSPs”

Durango, Colo., August 8, 2018 – Think Network Technologies (Think) ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Future’s 11th-annual MSP 501 Worldwide Company Rankings.

The MSP 501 is the first, largest and most comprehensive ranking of managed service providers worldwide. This year, Channel Futures received a record number of submissions from companies in Europe, Asia, South America, and beyond. Channel Futures teamed with Clarity Channel Advisors to evaluate these progressive and forward-leaning companies. MSP’s revenue figures are weighted according to how well the applicant’s business strategy anticipates trends in the fast-evolving channel ecosystem.

“We are proud to be recognized amongst other outstanding MSPs throughout the world. This honor is a testament to the expertise, hard work, loyalty, and dedication of our team,” commented Melissa Glick, Think CEO.

“This year’s applicant pool was the largest and most diverse in the history of the survey, and our winners represent the health and progressivity of the managed services market,” says Kris Blackmon, Channel Futures content director and editor of the MSP 501. “They’re growing their revenue, expanding their customer influence and exploring new technology that will propel them for years to come.”

The 2018 MSP 501 list is based on data collected by Channel Futures and its sister site, Channel Partners. Data was collected online from Feb. 28 through May 31, 2018. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, growth and other factors. The complete 2018 MSP 501 list can be viewed online here.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

For more information about this topic, please email us.

Newest Team Members

A Look Behind the Scenes

July 19th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “A Look Behind the Scenes”

Meet the Team Members Who Run the Show!

At Think, we seek employees with a passion for IT and can deliver exceptional customer service. Our team members share our core values – one of which is teamwork. We approach our work as a team, we celebrate success as a team and we learn from failures as a team. Our company is structured thoughtfully – we maximize employees’ individual skill sets to promote synergy and benefit operations for our business and for our clients.

Our close-knit culture works in harmony with our innovative business solutions to fuel success. In order to take care of our business we must first take care of our employees and we believe that fostering a positive culture in the workplace will extend to positive interactions with our clients. We work hard and we play hard – we like to have fun!

We truly value our employees and it goes without saying that we also value our employees’ families – they are the force and support behind our talented team. That said, we want to introduce the Think team members that really run the show – our employees’ pets! If you stop by our office, you might even see some of them taking care of “business”…

Think Org Chart
ColoradoBiz Top 100 Woman-Owned Companies 2018

Think Recognized on Top 100 Woman-Owned Companies 2018 List

July 11th, 2018 Posted by Awards, Best Practices, Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “Think Recognized on Top 100 Woman-Owned Companies 2018 List”

Durango, Colo., July 2, 2018 – Think Network Technologies (Think) ranked 91 on ColoradoBiz Magazine’s annual Top 100 Woman-Owned Companies list for the second consecutive year. Melissa Glick is CEO and Co-Owner of Think, a Southwest Colorado IT solutions provider.

“I hope the female leaders recognized on this list will inspire more women to be courageous and to pursue their professional goals,” said Glick. “I am proud that Think was listed amongst other female-led companies that bring innovative products and services to the market, create jobs and contribute to their communities.”

Glick credits past mentors as well as family, in providing her with solid values and strong business acumen that have contributed to Think’s business success.

“Women in Colorado are making an impact in every industry, enterprise and workplace role imaginable. They are CEOs, startup founders, strategists and irreplaceable employees who not only are instrumental in their own organization’s success; through their daily actions and achievements they set a precedent of possibilities for the next generation of women in business to build upon,” said ColoradoBiz Magazine.

The full ColoradoBiz Magazine Top 100 Woman-Owned Companies 2018 list can be viewed online here.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

For more information about this topic, please email us.

Phishing

How to Avoid a Phishing Attack

July 10th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 2 thoughts on “How to Avoid a Phishing Attack”

90% of Data Breaches Involve a Phishing Attack

First things first – what is phishing? Phishing is an email technique used to fraudulently obtain sensitive information. Phishing emails are designed to look like they’re from a brand or institution you trust. They typically prompt you to download malware (malicious software), click on a link that redirects you to a malicious website or enter personal information. This can enable hackers to steal your identity, breach your employer’s systems, and more. The best way to defend yourself against phishing attacks is to identify phony emails before you click on them.

5 Tips for Identifying Phishing Emails

  1. Who’s the real sender? – Make sure the organization’s name in the “From” field matches the address between the brackets. Watch out for addresses that contain typos in the organization name (think amaz0n.com).
    Phishing - Who's the real sender?
  2. Check the salutation – If you do business with an organization, the first line of the email should contain your name. Don’t trust impersonal introductions like “Dear Customer.”
    Phishing - Check the salutation
  3. Use your mouse hover – Hover over an email link to see the full URL it will direct you to. Do not click the link – just hover. If the address isn’t where you’d expect it to go, don’t click it. Check all the links – if the URLs are all the same, it’s likely a phishing email.
    Phishing - Who's the real sender?
  4. What’s in the footer? – The footer of any legitimate email should contain, at minimum, a physical address for the brand or institution and an unsubscribe button. If either of these items are missing, it’s probably fake.
    Phishing - What's in the footer?
  5. Look for other content clues – Does the content have spelling and grammar errors, ask for personal or sensitive information, convey a high sense of urgency and/or privacy, offer incentives through threat or reward, or contain links or attachments? These are all clues pointing toward a phishing email.

When in Doubt, Delete

If something seems off, delete the email. If it’s not fake, the sender will contact you another way or send the message again.

We Can Help…

Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.

Source: Webroot Inc.

Server

Rising Temperatures, Rising Server Threats

June 13th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 0 thoughts on “Rising Temperatures, Rising Server Threats”

Why is it important to monitor server room temperatures?

With temperatures on the rise, server threats also increase. When servers overheat they can shut down. Whether you’re running a huge data center or a server room with just a few servers it is important to monitor room temperature to prevent downtime, loss of productivity and ultimately loss of revenue for your business.

Monitoring your servers’ temperature information is a starting point. However, monitoring the room temperature is a more proactive approach and will add another layer of security to ensure your server never reaches high temperatures. Monitoring the room temperature will provide an early indication if something is wrong, so you have enough time to react early and avoid serious problems.

5 benefits of monitoring server room temperature

  1. Prevent downtime – Temperature monitoring sensors and software will allow you to configure alerts that notify key personnel via email or text message if and when temperatures reach predefined thresholds so that someone can take action. Excessive temperature is one of the leading causes for having to replace hardware, and in most cases, it is easily prevented.
  2. Ensure efficient airflow inlet and exhaust – Placing temperature sensors on the front and back of your server racks will allow you to measure the temperature of the air going in and coming out of your servers. This is important to know to make sure cold airflow is not being mixed with hot air circulating in the room, as well as to ensure hot air exhaust from your servers is within the proper ranges. Airflow sensors can monitor the presence of airflow into your server room and will alert you if it stops.
  3. Reduce power consumption and increase energy efficiency – If you are actively monitoring the temperature in your server room, you should be able to identify trends and baselines. This data should indicate if your AC unit is able to keep up with the load and if there are cost savings to be had. Many times, room temperature will be set lower than necessary to compensate for not knowing exactly how effectively your servers are being cooled.
  4. Server room planning and scaling – Using the data collected from your temperature monitoring sensors, you will have insight into the cooling loads and airflow distribution of your current layout. You can use these insights to plan for the additional heat load of adding new equipment and how to maintain a proper layout for best airflow.
  5. Extend the life of your equipment – Last but not least, maintaining the proper server room temperature range will help extend the lifespan of your equipment by preventing excessive temperatures going unnoticed and causing unnecessary wear on your equipment. Short spikes of excessive temperatures can reduce reliability and can lead to hardware failure months later.

How do you monitor your server room temperature?

There are many vendors that offer physical sensors for measuring not only temperature, but also humidity, power, flooding and more. Think Network Technologies can help your business implement a server temperature monitoring solution. Contact us today to learn more.

Sources: enviromon.net, Paessler Blog

Disaster Readiness

Disaster Readiness: Are You Prepared?

May 16th, 2018 Posted by Best Practices, Cloud, Data, Desktop, Disaster, Hosted Services, Services 0 thoughts on “Disaster Readiness: Are You Prepared?”

Fire is a Real Threat

On Sunday, May 21, 2017 a fire engulfed 1111 Camino del Rio in Durango, CO.  This location was the former home of Think Network Technologies.

Disasters are real and business owners should have a disaster readiness plan in place to continue business operations during and after a disaster. There is no time like the present to review and/or implement data backup, disaster recovery and business continuity plans. So what can you do to ensure you’re prepared before disaster strikes?

First, it’s important to understand the definition of data backup, disaster recovery and business continuity and how they relate to business processes. Data backup, disaster recovery and business continuity are used interchangeably are different, but equally important and interconnected facets to protecting your business. Second, it’s important to employ an IT partner to develop a comprehensive strategy and plans that fit your business.

What is “Data Backup”?

Data backup is the process of creating copies of your important data and storing in another location that would not be affected by the same factors that could affect your primary copy of data.

Some things to keep in mind:

  1. Your backups should include all important business data.
  2. At least one up-to-date copy should be stored off-site.
  3. Backups should be monitored regularly to make sure they are working properly.
  4. Restoration tests should be conducted regularly to make sure data can be recovered from the backups when needed.
  5. Periodic reviews should be made to ensure that all critical data is being backed up. A set-it-and-forget-it approach can lead to future important data not being backed up.

What is “Disaster Recovery”?

Disaster recovery is the concept and strategy for recovering key IT systems and processes in a timely manner in the event of some form of disruption to these systems.  It’s critical to have a plan for how to use data backups in the event of a server failure or physical destruction of property, e.g. fire or flood.

What is “Business Continuity”?

Business continuity is the plan and processes that a business has in place to to continue business while key IT systems are unavailable or are being recovered. While disaster recovery is focused on how to recover key IT systems and business processes, business continuity is the plan for how to continue business operations while IT systems and data are being recovered. A business continuity plan should answer the following key questions:

  1. What people, equipment, resources, and information need to be available so that business can continue without key IT systems?
  2. What steps can be taken to manually complete normal, day-to-day business processes with impaired IT systems or completely unavailable IT systems?

We Can Help…

As you can see from the above, data backup, disaster recovery and business continuity are equally important. Having one of these processes without the others, is like having a car with seat belts but no brakes. Having strategies for backups, disaster recovery and a business continuity in place can help protect your business during and after a disaster.

Think Network Technologies can help you develop strategies tailored to your business, systems, and processes.  We can also help execute these strategies if and when disaster strikes.

For more information about this topic and how we can support your business, contact us.

Technology News - April 2018

Technology News – April 2018

April 9th, 2018 Posted by Cloud, Internet, Newsletters, Security 0 thoughts on “Technology News – April 2018”

Your Guide to the Most Relevant Technology News

Here’s what we’re reading this month:

Dell’s Director of Virtual and Augmented reality talks about the future of virtual reality, and how VR headsets will change the way we approach training and education. Read more here.

Big retailers are increasing their adoption of robots. Retail giants Walmart, Amazon and Target are testing robots in stores to reduce labor costs and improve efficiency. Read more here.

How to protect your data on social media. The New York Times’ tips on how protect yourself from data-harvesting apps and programs on Facebook can also be used as security measures on other social media platforms. Read more here.

SpaceX is officially approved to provide internet service. SpaceX internet service is officially approved – bringing new competition to the internet provider industry and coverage to areas where internet was not previously available. Read more here and here.

CRN MSP 500 2018

Think Named to 2018 CRN MSP 500 List

February 20th, 2018 Posted by Awards, Best Practices, Cloud, Managed Service Provider, Phone 0 thoughts on “Think Named to 2018 CRN MSP 500 List”

Think Network Technologies Named to 2018 CRN MSP 500 List

Durango, Colo., February 20, 2018 – CRN, a brand of The Channel Company, announced today that Think Network Technologies is named to its 2018 Managed Service Provider (MSP) 500 list in the MSP Pioneer 250 category, recognizing companies with business models weighted toward managed services and largely focused on the SMB market. CRN’s annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services.

In today’s fast-paced business environments, MSPs play an important role in helping companies leverage new technologies without straining their budgets or losing focus on their core business. CRN’s MSP 500 list shines a light on the most forward-thinking and innovative of these key organizations.

“Managed service providers have become integral to the success of businesses everywhere, both large and small,” said Bob Skelley, CEO of The Channel Company. “Capable MSPs enable companies to take their cloud computing to the next level, streamline spending, effectively allocate limited resources and navigate the vast field of available technologies. The companies on CRN’s 2018 MSP 500 list stand out for their innovative services, excellence in adapting to customers’ changing needs and demonstrated ability to help businesses get the most out of their IT investments.”

“Think Network Technologies is proud to be on CRN’s MSP 500 list for the second year in a row. It is an honor to be recognized amongst the top companies in the industry,” commented Melissa Glick, CEO at Think Network Technologies.

Think Network Technologies is a full-service IT company headquartered in Durango, Colo. providing outsourced IT services including managed services, premise and cloud solutions, infrastructure support and integrated communications for businesses in Colorado, New Mexico, Arizona, and Utah. The MSP 500: Pioneer 250 list can be viewed online here.

For more information about this topic, please email us.

compliance security

Security and Compliance Solutions

January 24th, 2018 Posted by Best Practices, Cloud, Phone 0 thoughts on “Security and Compliance Solutions”

Solutions for Law Firms and Legal Service Providers

Think’s cloud services (T-Cloud) deliver essential IT services that maximize cost-efficiency and productivity for your team while offering the highest levels of privacy and security to protect your firm’s clients.

law firm IT services Audited security controls including SOC 2 Type II Mobile device management to protect data Admin tools to streamline IT management and security Reliability and support with a 99.999% uptime guarantee

Legal services firms are under intense pressure to offer services that are innovative and agile in the face of tough competition. Clients expect superlative responsiveness, efficiency, and cost-effectiveness. Our Compliance and Security plan includes high security email, file sharing, and web application security tools that increase productivity, project a high degree of technical competence, and conform to the security or regulatory requirements of clients.

Start with our Compliance and Security Plan

Our Compliance and Security plan services include security and privacy controls to protect attorney-client confidentiality and help to support client industry regulations, including finance and healthcare.

hosted exchangeHosted Exchange
Get business-grade, fully mobile email, calendar, and contacts for your attorneys and staff.

hosted emailEmail Protection
Tools that help you eliminate spam and viruses before they reach your users’ inboxes. Includes advanced spam and virus protection, company-wide white and black lists, and 24/7 threat monitoring.

ConnectID® single sign-on and identity management
Provide secure, easy-to-manage access to your web–based calendaring and docketing, conflict checking, document management, and legal research applications. Secure your cloud apps with 2FA, the strongest industry-standard authentication protocol.

pc backup servicePC Backup
Make sure your staff can recover quickly from hard drive failures and lost or stolen laptops.

email encryptionEmail Encryption
Protect against data leaks by automatically encrypting email containing privileged client information. Enforce compliance based on policies and rules that you define.

email archiving serviceEmail Archiving
Archive your email correspondence automatically and securely with encryption. Get tamper-proof, searchable records for auditing, compliance, and internal governance purposes.

share sync cloud serviceShareSync® file sync and share
Access and collaborate securely on discovery, client, and project files from anywhere, on any device, with at-rest and in-transit encryption. Manage research and discovery files and folders for staff and clients with strict access controls, even in a virtual office environment.

Add These Services to Enhance Your Solution

business phone serviceHosted PBX
Experience enterprise-grade phone service with conference calling and automatic call forwarding. Use the softphone mobile app to dial from a mobile device as if you were sitting at your desk.

business cloud serviceShareSync® 10GB Capacity
With upgraded storage, you will not need to worry about running out of room, whether you’re gathering large documents for discovery, or maintaining a library of research or case files.

Skype® for Business Enterprise
Instantly convert a chat into a conversation or video for richer, more productive project discussions. Share screens to collaborate quickly on proposals.

Security and Reliability that go Above and Beyond the Competition

IT security servicePrivacy and security to support confidential attorney-client communications.
• Annual SOC 2 Type II audits.
• A dedicated, full-time technical staff certified in information security.
• Full coverage of all aspects of security, including log and event monitoring, incident response, managing intrusion protection systems (both host and network), perimeter defense, service and architecture testing, and source code reviews.

uptime guaranteeReliability and support you can count on.
• With the T-Cloud 99.999% uptime guarantee, you can access your cloud services when needed, staying connected and productive.
• Receive 24/7 phone and chat support any time you need expert help.

IT admin toolsAdmin tools to streamline IT management and security.
• Centralized control over users and services, with granular configurability.
• Administrators can quickly provision,
de-provision and configure security controls, and delegate
setup and management to non-specialized staff.
• Single sign-on technology that comes with all Think’s applications safeguards sensitive financial and customer data and web-based applications.

business mobile device managementMobile device management and security.
• Purposefully built to protect data wherever it is accessed.
• Our email system includes mobile security controls and policy enforcement for the administrator, including remote wipe for employees with mobile devices.

Get started protecting your firm and your clients with strong compliance and security solutions. Contact Think to begin the conversation.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

CONNECT

FacebookTwitterInstagramLinkedIn

Copyright 2017 Think Network Technologies, LLC. All rights reserved.