Posts tagged "cybersecurity"

7 Tips for Training Tech-Savvy Employees

June 6th, 2019 Posted by Best Practices, collaboration, Communication, Staff 0 thoughts on “7 Tips for Training Tech-Savvy Employees”

Updating your technology on a regular basis is an important part of keeping your employees productive and efficient as well as protecting your company from cyber security threats. But keeping employees up to date on how to use all this new tech can be a challenge. Here are 7 tips to help you train more tech savvy employees and keep your business moving forward.

  • Know why –Most people resist change. It’s just human nature. But if you can explain WHY it’s worth their time and effort to learn and use this new tech, you’ll find your employees will be a lot more cooperative. And maybe even excited.
  • Recruit inside– Some employees will naturally be more apt and more interested in the new tech. Recruit them to help you train the others. This will help bridge the knowledge gap as well as getting everyone involved on the project together.
  • Get hands-on –As often as possible, have your employees learn by doing. The more engaged they are, the more likely they are to retain the information.
  • Documentation –Ever wish there was a manual for that? So do your employees. Give them written instructions (preferably with screenshots) whenever possible. This will help them learn more quickly and provide a handy reference guide for later.
  • Keep it small –Breaking your employees into smaller groups for tech training gives them more opportunities to ask questions and engage with the instructor, helping them learn more quickly.
  • Everyone is different –Some employees will pick up the new tech and run with it right away, but others will require more time and effort to get them going. Be prepared for differing rates of progress and be patient.
  • Get their thoughts –Your employees can provide you will valuable feedback on the learning process and how the new tech is impacting the company, if you ask and are open to listening. Do this during the transition and afterwards to help keep tabs on the bigger picture.

Melissa Glick Named to CRN Women of the Channel 2019 List

May 20th, 2019 Posted by Awards, Community, Press Release, Staff 0 thoughts on “Melissa Glick Named to CRN Women of the Channel 2019 List”

Durango, CO, May 20, 2019 – CRN®, a brand of The Channel Company, has named Melissa Glick, CEO of Think Network Technologies, to its prestigious 2019 Women of the Channel list. The leaders on this annual list are from all areas of the IT channel ecosystem; representing technology suppliers, distributors, solution providers, and other IT organizations. Each is recognized for her contributions to channel advocacy, channel growth and visionary leadership.

CRN editors choose the list from a multitude of channel leadership applicants and select the final honorees based on their professional accomplishments, demonstrated expertise, and ongoing dedication to the IT channel.

“CRN’s 2019 Women of the Channel list honors influential leaders who are accelerating channel growth through mutually-beneficial partnerships, incredible leadership, strategic vision, and unique contributions in their field,” said Bob Skelley, CEO of The Channel Company. “This accomplished group of leaders is driving channel success and we are proud to honor their achievements.”

“It’s an honor to be included in such an accomplished group of women,” said Glick “Technology is such an influential and important field, and it’s encouraging to see so much positive growth and change happening from year to year.”

The 2019 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/WOTC.

Think Network Technologies is an award-winning, full-service IT company based in Durango, Colo. and servicing the Four Corners, providing managed servicespremise and cloud solutionsintegrated communications, and IT consulting for businesses.

Is your business being targeted?

May 8th, 2019 Posted by Best Practices, Hackers, Security 0 thoughts on “Is your business being targeted?”

Two members of our staff and 3 of our clients were targeted by this phishing scam last month. You should know about it.

 

Have you seen the latest email phishing scam?

It looks like a quick email from your boss. They’re in a meeting and can’t talk, but could you stop and pick up some gift cards?

If you reply saying you will get the cards, the next email says to pick up $1,800 of Walmart gift cards and just take a picture of the numbers on the back of the card and email them back.

Which is where they really get you. Once you’ve sent the scammers the numbers on the back of the card, they have access to the money. And you have no way to get it back.

This scam is designed to take advantage of the fast-paced and informal nature of a lot of business communication. As well as the trust we place in our superiors. Two of the employees here at Think were targeted by this phishing attempt. A combination of cybersecurity knowledge and a good email filter helped ensure that neither of them fell for the scam. But others haven’t been so fortunate.

You can protect your business and your employees from phishing attempts with a few simple steps:

  1. Education – talk to your staff about what phishing is and what to watch for.
  2. Awareness – make sure your staff is looking at the sender and the contents of an email closely before clicking on links or replying.
  3. Protection – a good email filter will flag emails from outside senders, helping your employees identify untrustworthy sources more easily.

Phishing is one of the leading cybersecurity vulnerabilities for a business. Take steps to protect your business and don’t get caught!

Think IT Town Hall Helps Locals with Tech Advice

March 17th, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, Hosted Services, Internet, Microsoft, Networks, Newsletters, Operating System, Security, Services 1 thought on “Think IT Town Hall Helps Locals with Tech Advice”

Matt Glick and Prudencio Dimas from Think have over three decades of experience in the IT world working side by side with organizations, both large and small, to understand and resolve ongoing IT challenges.  Their understanding of network infrastructure, design and implementation was offered to participants of the TechKnowledge 2017 Conference in a Town Hall forum.  Topics such as servers, backups, disaster recovery, cloud storage, Office 365, virus protection, malware, ransomware, and security best practices were all discussed.  Matt and Prudencio fielded a range of questions but it was obvious what was the most concerning topic among the group.

Ransomware and backups.

The duo talked about best practices when it comes to backups and ransomware for almost an hour with the group. It was a very productive session and their favorite question came from Diana Murray, Manager for ASAP Accounting & Payroll, Inc.  Ms. Murray asked “What are the three most important elements of IT when talking about small business?”  We thought we would summarize their answers below.

1. A layered approach to security:

Matt brought up an older Blog post Think published entitled “Is Your Security Layered Like Your Bean Dip?”  It says you should layer your security like a seven-layer bean dip.  Just one layer at the bottom, and it just not as enticing.  But when you get all those layers, working together, it’s an explosion of excellence!  And even more important, the layered security approach tells us the more hoops a hacker has to jump through, the less likely they are to be successful.

2. Backups are key:

Matt posed a few questions business owners should consider when it comes to their backups.  What kind of backup you have is just as important as what is being backed up.  Is it file level backup?  Do you have a full image?  And, what is your expectation of downtime in the event that you do deal with a server crash?  And, he reminded everyone there to be realists.  Emergencies happen.  So, anticipate that they will happen and be prepared.  Practice.  Exercise your backup recovery process; test and retest it, so you have time to work out the kinks.

3. Standardization:

Prudencio explained IT standardization is a strategy for minimizing IT costs within an organization by keeping hardware and software as consistent as possible and reducing the number of tools you have that address the same basic need. It may take the form of ensuring that every computer has the same operating system, or of purchasing hardware in bulk so that every PC in your office is the same make and model. By streamlining your IT infrastructure, you can simplify decision­ making and minimize purchasing and maintenance costs.

Thank you to the Chamber of Commerce for organizing this event for our community and for asking Think to be involved.

Tech Knowledge Conference 2017

February 22nd, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, Hosted Services, Internet, Microsoft, Networks, Newsletters, Operating System, Security, Services 0 thoughts on “Tech Knowledge Conference 2017”

The Durango Chamber of Commerce will host its 3rd Annual Tech Conference on Wednesday, March 15th at the DoubleTree Hotel featuring keynote speaker Jeff Walker.

There will be a variety of breakout sessions throughout the day which include topics about cyber security, email marketing, makerspace, web policies, digital marketing, facebook marketing, hackathon, and much more. Think Network Technologies is a sponsor for the Tech Conference, but they will also be a presenter for one of the breakout sessions.

Matt Glick(CTO) and Prudencio Dimas(Solutions Architect) will be holding an “IT Town Hall” on March 15th from 2:30 – 3:20p in the Silverton/Purgatory room at the DoubleTree Hotel. You’ll be able to ask Think’s senior engineers all your business tech questions about servers, backups, disaster recovery, cloud storage, Office 365, virus protection, malware, ransomware, security best practices, and IT policies.

As CTO of Think Network Technologies, Matt manages network operations, business development and provides guidance to the technical team.  He brings more than 18 years of experience delivering technology solutions to regional private and public sector accounts. Matt has a Bachelor’s of Science in Sociology and Environmental Science from Fort Lewis College.  He started his career in Seattle, where he worked for a corporate consulting company and got his start in systems administration.  He pursued further education at Colorado Mountain College for Microsoft Server OS, Directory Services and Architecture; completing MCSE, MCSA and MCP certifications.  He also completed the Cisco CCNA, CCDA and CCNP certification coursework while being employed as a network administrator for a school district in Roaring Fork Valley, CO.  In 2002, Matt returned to Durango to start his own venture, thus the inception of Think Network Technologies.  His understanding of network infrastructure, design and implementation has benefited Think’s customers in finding solutions to fit the business requirements in both smaller and larger environments.

As a Solutions Architect at Think, Prudencio plays a role in nearly all phases of the IT service delivery life cycle, from the initial consultation and needs assessment, to implementation and ongoing solution support. Prudencio got his start as an intern while earning an Associate’s Degree in Information Technology. Prudencio is well rounded with experience ranging from small computer repair shops to networks of five thousand plus endpoints.  His primary focus is on windows systems administration and he carries certifications in Microsoft and Cisco technologies. In 2012, Prudencio left the IT world behind for 6 months of world travel. When he returned, an opportunity with Think brought him to Durango where he works side by side with businesses large and small to understand and resolve ongoing IT challenges.

Please contact Think’s IT specialists at sales@thinknettech.com if you have any questions or concerns.

WordPress Sites Hacked Due to Exposed Vulnerability

February 8th, 2017 Posted by Best Practices, Hackers, Internet, rest api, Security, wordpress 0 thoughts on “WordPress Sites Hacked Due to Exposed Vulnerability”

WordPress 4.7.2 was released last Thursday, January 26th. If you have not already updated, please do so immediately.

A WordPress bug called REST API Endpoint allowed more than 100,000 websites to be hacked over the past two weeks. According to security firm Sucuri, websites have been hacked solely because the admins did not make an update to their WordPress as advised by the company. The exploit allows hackers to update content published on a WordPress website running with the 4.7.0 or 4.7.1 versions.

The security flaw, a zero-day vulnerability which affects the WordPress REST API, allows attackers to modify the content of posts or pages within a website backed by the WordPress content management system (CMS).

The reason the vulnerability wasn’t made public at the time of WordPress 4.7.2’s release was the real worry that malicious hackers might race to exploit the flaw, attacking millions of blogs and company websites. We have here, but not before a few headlines on Data Center Knowledge were altered to read “Hacked by (insert group name here)”. Sucuri also warned that version 4.7.2 may not automatically update even if that feature is turned on in WordPress.

MuhmadEmad, a Kurdish anti-ISIS hacktivist working for the Kurdlinux team, has hacked thousands of websites, leaving a message praising the Kurdish Peshmerga forces. This is not the first time the Kurdish hacker targeted websites leaving a message saying ‘Long Live the Peshmerga’. On Monday, the National Treasury Management Agency (NTMA) said that its official website was hacked by MuhmadEmad. “The perpetrator also posted a picture of the Kurdish flag, and wrote ‘long live Peshmerga’.”

To avoid your websites from being hacked with this exploit, Cyber Security professionals have requested to update to the latest WordPress version 4.7.2.

Please contact our sales team at sales@thinknettech.com if you have any questions or concerns.

10 trends to watch for in 2017

10 trends to watch for in 2017

January 5th, 2017 Posted by Best Practices, Data, Desktop, Devices, Newsletters, Operating System, Security, Services 0 thoughts on “10 trends to watch for in 2017”

Smart machines are getting smarter, and a new IT reality has dawned.

The machines are rising. Artificial intelligence (AI) has proven it’ll be no fun at a party, having taken down the world’s best player at the difficult strategy game Go. If that makes you anxious, good news: virtual reality (VR) is being used by doctors to help patients with anxiety. We live in interesting times, so what’s going to be especially interesting to watch this year?

so what’s going to be especially interesting to watch this year

So what’s going to be especially interesting to watch this year

 

1. Security concerns increase

The only novelty in this prediction is where the danger is coming from: increased reliance on IoT means more breaches of security and privacy.

2. AI and consumer experience

Even big players are only scratching the surface when it comes to using machine-learning to improve customer service. Look for:

  • Much more personalized customer interaction
  • More social presence
  • Immediate answers to consumer queries

3. Better cross-browser compatibility

Less sexy than AI but fundamental, W3C (world wide web consortium) specification, and (maybe) better JavaScript libraries could see cross-browser compatibility issues become a thing of the past. Good news if your business does business online.

4. Increased VR activity

Who doesn’t want to be in VR when it’s new and shiny and has applications as far-ranging as therapy and gaming? Microsoft, Facebook, and Google have put a waterfall of money into VR, but it’s the startups you want to watch. Will VR be the cornerstone of the next Microsoft or Apple?

5. Mobile grows

By 2020, 70% of the world’s population will have a smartphone. If you’re still asking mobile browsers to pinch and squeeze, it’s time to act.

By 2020, 70% of the world’s population will have a smartphone

By 2020, 70% of the world’s population will have a smartphone

6. No more money for IT

You can watch the rise of AI and VR, but this might not be the year you get to invest in them. Spiceworks, a network of IT professionals, -has surveyed the IT world and confirmed that IT budgets will be flat (or down) in 2017, and they’re not expecting to take on new employees, either.

7. Laptops eating desktops’ narrow lead

Consumers have long bought more laptops than desktops. Now, companies are budgeting more for laptops, bringing the budgets for both to par according to Spiceworks’ network data and surveys.

8. Windows 10 business adoption to exceed 70%

Over 10 weeks in 2015, 11% of organizations said yes to Microsoft’s offer of a free Windows 10 upgrade. By halfway through last year, 40% were onboard. The trend line suggests 73% of organizations will be using Windows 10 by July.

9. “Cloud first” strategies will drive adoption of Windows Server 2016

Windows Server 2016 offers improved virtualization features, better security, more advanced software-defined storage functionality, and better integration with popular cloud services. That will drive adoption, although it won’t be until Windows Server 2008 reaches end-of-life in 2020 that its successor will dominate.

10. Don’t hold your breath for OS upgrades

Flat budgets will mean delays in upgrading operating systems. More than half of businesses are running at least one copy of Windows XP somewhere, despite it reaching end-of-life in 2014.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Start the year on a secure note

Start the Year on a Secure Note

January 5th, 2017 Posted by Best Practices, Data, Desktop, Devices, Newsletters, Operating System, Security, Services 0 thoughts on “Start the Year on a Secure Note”

9 hardware and software vulnerabilities you should address now.

Research from Spiceworks, a network of IT professionals, highlighted more than 70% of respondents rated security as their top concern for 2017. Here are nine things that should be keeping you up at night…

70% of respondents rated security as their top concern

70% of respondents rated security as their top concern

 

Aging hardware

Sure, software is the greater risk, but many hardware vulnerabilities are software-based. Older equipment is often without built-in security features like:

  • Unified Extensible Firmware Interface (UEFI) with Secure Boot
  • Self-healing basic input/output system (BIOS)
  • Pre-boot authentication (PBA)
  • Self-encrypting drives

That’s why you should be auditing and planning to remove:

  • Computers with conventional BIOS, because they can’t run Secure Boot, which helps to prevent malware loading during the boot process.
  • Computers without pre-boot authentication or a trusted platform module (TPM), which stop the operating system from loading until the user enters authentication information, such as a password.
  • Old routers, which can have serious vulnerabilities.
  • Drives that don’t self-encrypt. Self-encrypting drives (SEDs) need a password (in addition to the OS login password), and the technology automatically encrypts and decrypts data on the drive.

On a side note, old drives leave you vulnerable in another way: you could lose data when they fail, which they will.

you could lose data when they fail, which they will

You could lose data when they fail, which they will

Tired software

Getting your hardware straight will almost always involve spending money, but fixing up software could be as simple as running those free updates you never got around to. Here’s what to look at:

  • Unpatched or out-of-date operating systems: Windows XP has been beyond its support period for nearly three years but is still running all over the world despite there being no updates, no technical assistance, and limited efficacy with anti-virus. And old operating systems always have fewer security features than new ones.
  • Unpatched or out-of-date productivity software: It’s highly risky to run unpatched versions of Microsoft Office, especially older versions like Office 2002, Office 2003, and Office 2007. They can give a hacker access to the rest of a system, with particularly catastrophic consequences if the user has administrative privileges.
  • Legacy custom applications: If running an old version of Office is a risk, imagine the danger of running legacy custom software, particularly if you’re no longer doing business with the vendor (or the vendor is no longer in business). When your legacy software was being coded, the vendor probably wasn’t thinking of the sort of security attacks that are common today.
  • Unpatched web browsers: No browser is entirely free of security vulnerabilities. Common vulnerabilities include URL spoofing, cross-site scripting, injection attacks, exploitable viruses, buffer overflow, ActiveX exploits, and many more. Always, always run the most recent version.
  • Out-of-date plug-ins: Everybody loves a plug-in, but they have a high potential for disaster, especially if you’re not running the latest versions.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

The Largest Learning Event in History

December 16th, 2016 Posted by Community, Data, Devices, Hour of Code, Internet, Newsletters 0 thoughts on “The Largest Learning Event in History”
The vision for Hour of Code is that every student in every school should have the opportunity to learn computer science, just like biology, chemistry or algebra. Code.org organizes the annual Hour of Code campaign which has engaged 10% of all students in the world, and provides the leading curriculum for K-12 computer science in the largest school districts in the United States.

Think Network Technologies, the Durango School District 9-R and the Durango Education Foundation teamed up to bring the Hour of Code during Computer Science Education Week to local schools in Durango. Park Elementary & Sunnyside Elementary students were awarded with a certificate once they completed their Hour of Code. Seven students from Miller Middle School, Escalante Middle School and Durango Shared School were awarded with a scholarship from Think Network Technologies to continue their education in Computer Science.

(more…)

No more passwords in 2017?

December 8th, 2016 Posted by Best Practices, Data, Devices, Hosted Services, Internet, Newsletters, Security, Services 0 thoughts on “No more passwords in 2017?”
Yahoo!’s disclosure that hackers might have vacuumed up the passwords of as many as half a billion users lit the floodlights on two gaping issues in IT:

  1. Passwords run out of steam well before they cross the goal line of today’s security needs
  2. Sometimes you don’t even know they’re gone, which means you’re vulnerable without realizing it

Wakefield Research recently surveyed IT decision makers and found out that 69% will probably do away with passwords completely in the next five years.

The finding of the report wasn’t surprising, nor were the insights that IT professionals are despairing of evergreen problems:

  • Users “securing” their accounts with passwords a child could guess, let alone a script kiddie driving any of a dozen tools available for free download
  • Users recycling the same password for different accounts so that one crack exposes many systems. And it’s especially galling for IT when the breach of its system is the result of a breakdown of a system beyond its control, such as all the systems now at risk because Yahoo! customers used the same password for Yahoo! as for their work access.

Time and place a user is requesting access and deciding if it’s in keeping with that person’s usual behavior

(more…)

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.