Posts tagged "data"

River of Technology

August 20th, 2019 Posted by Best Practices, collaboration, Communication, Community, Staff 0 thoughts on “River of Technology”

The common sense survival guide that will keep your business afloat.

Here at Think we play as hard as we work, and for some of us that means time on the river. We couldn’t help but notice that there are some important parallels to being successful in the water and successful in business technology. Here are 5 tips to help you and your business successfully navigate the river of tech.

Plan ahead – Do you have a destination in mind? An idea of how you want to get there? These questions apply equally to river travel and the technology required to support your business. Tackling whitewater rapids without scouting first could be a dangerous endeavor. In a constantly shifting environment filled with opportunities and challenges, picking a good line and sticking with it will help control costs and allow you to use technology as a business tool rather than just a necessary expense.

Be prepared – The next step is having the right gear and knowing how to use it. All the knowledge in the world won’t make a wooden pallet a raft, and the most sophisticated water craft won’t make up for a lack of skill. The same goes for technology.

Go with the flow – Both rivers and technology are always changing, moving, and evolving. There’s no denying or changing that fact, so your best bet is to go with it. Use the current to get you where you want to go, because fighting against it will deplete your resources and set you back.

If you get stuck – Sometimes you’ll get sucked into an eddy or stuck on a rock in the middle of a moving river. Something similar happens in business technology when you’re bogged down with aged equipment, slow moving processes, or even one belief system about how IT functions in your business. The best thing to do at a time like this is assess your situation and where you’re at, decide where you want to go, and put in the effort to move yourself back into the flow.

Bring a guide – If all of this sounds like a lot, you’re not alone. These are specialized skill sets and know how that come with a lot of time, study, and practice. A healthy dose of passion for the work helps too. It’s not for everyone. Luckily there are guides who are happy to share their knowledge and skills to ensure that you have a safe and enjoyable experience.

When it comes to your technology needs, a managed service provider can help you from beginning to end. They strategically plan out the types of technology, processes, and policies. They will help you get your business where you want it to go. They ensure that you have all the appropriate gear and that your staff is able to use it. They assist you in the inevitable change that comes with evolving technology in your business. They help you when you get stuck or run into a challenge.

If you’re looking for a guide to help you navigate the river of business technology, our engineers would be happy to talk with you.

Company Culture: the secret to success

August 13th, 2019 Posted by Best Practices, collaboration, Communication, Community, Staff 0 thoughts on “Company Culture: the secret to success”

Some parts of a business require a lot of work, time, and focus to create and maintain. Others will happen whether you work at them or not. The biggest (and maybe most important) example of this is company culture. Think about it. We’re social creatures, and it is natural for us to function as a cooperative group. It’s something you see happen even in temporary groups, like people waiting to get on a bus or standing in line at the store. There’s an unspoken give and take, an acceptance (and sometimes disregard) for the norms of the situation. No one is discussing it, planning it, or even consciously directing it. But it happens.

The same thing happens in a business. With a group of people brought together to support a common cause for 40 or more hours a week, how could it not?

The question isn’t “Do we have a company culture?”, because the answer to that is always “Yes.” The question is “Do we have a company culture that supports our employees, our clients, and our business goals?” The answer to that question will determine everything from employee productivity to turnover rate. In an industry with a notoriously high turnover rate, like IT, company culture can make all the difference in your business’s ability to thrive.

 

Starting at the Top

Actions speak louder than words.

We’ve all heard it a hundred times, but we rarely take the next step to understanding the implications of that simple truth.

Many businesses have instituted wellness programs to help support and encourage their employees in making healthier life choices. To the tune of $50 billion a year. This sounds like a lot of action in the right direction, so why isn’t it working? A recent study by the National Institute of Mental Health suggests that these wellness programs haven’t increased workers’ health much at all. Or improved their experience at work.

This is because a policy or program can’t actually change company culture. Until it’s modeled by the leadership, it’s just empty words.

 

Setting the Example

Take a moment to think about what you’re modeling for your employees and coworkers. Are you answering emails late at night or well before work in the mornings? Do you skip lunches, rush from one meeting to the next, and cancel plans with your family on a regular basis? Are you showing up to work when you’re sick, injured, or exhausted?

The story we’re told is that you have to work hard to succeed, and sometimes that means sacrifice and struggle. This can certainly be true, and there’s nothing wrong with hard work and sacrifice. But is what you’re gaining worth what you’re giving up?

You have to remember that as the boss you set the tone. Your employees will follow your example, and you have to decide if this culture is sustainable, productive, and reflective of the business you want to create.

 

What You Value

One way to look at this is that it all comes down to what you value.

Do you want your employees at their desks for 8 hours a day, pushing regardless of what their actual level of productivity is?

Or do you want your employees working at their best, producing high quality work, regardless of whether that happens in 1 hour blocks or means they take a day off when they’re sick, have a family event, or just need to manage their stress level?

You have the opportunity to create a business that is both supportive and successful. Are you ready to do it?

Think Listed in Top 100 Woman Owned Companies by ColoradoBiz Magazine

July 30th, 2019 Posted by Awards, Community, Press Release 0 thoughts on “Think Listed in Top 100 Woman Owned Companies by ColoradoBiz Magazine”

Durango, Colo., July 30, 2019 – Think Network Technologies (Think) ranked 87 on ColoradoBiz Magazine’s annual Top 100 Woman-Owned Companies list, up from last year’s ranking at 91. This is the third consecutive year that Think has made the list. Melissa Glick is CEO and Co-Owner of Think, a Southwest Colorado IT solutions provider.

 

“There is an amazing variety of businesses on this list, and I hope that inspires women in all fields to reach for their dreams,” said Glick. “I am proud to have Think included with so many great businesses contributing so much to Colorado.”

Glick credits past mentors as well as family, in providing her with solid values and strong business acumen that have contributed to Think’s business success.

The full ColoradoBiz Magazine Top 100 Woman-Owned Companies 2019 list can be viewed online here.

 

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

 

For more information about this topic, please contact us.

Two-Factor Authentication: Secure, Simple, Inexpensive

July 15th, 2019 Posted by Best Practices, Data, Disaster, Hackers, Security, Staff 0 thoughts on “Two-Factor Authentication: Secure, Simple, Inexpensive”

“I don’t believe there is any single item that is more cost effective at improving security for public facing services than two-factor authentication.  This is why most Internet banking and other sensitive websites are requiring this nowadays.” – Darrell Brooks, Director of Infrastructure at Think

Even the strongest password may not be enough to protect your sensitive data. Luckily, two-factor authentication (2FA) is here to help.

Two-factor authentication adds an extra level of security to your basic login process. Think of it like this: Having 2FA required for your account login is like having a deadbolt and a keycode for your front door. That way if you lost your key, you would still be protected by the keycode. Or if someone overheard your keycode, you would still have the deadbolt in place.

Just as you would require both the keycode and the physical key to get into your front door, you would also require two different factors to access an account secured with 2FA.

There are three categories used for two-factor authentication:

  1. A thing you know (like a password or keycode)
  2. A thing you have (like a keycard or a mobile phone)
  3. A thing you are (like a fingerprint)

Your two factors should come from two different categories. This is often a password and an auto-generated PIN number that has been sent to you through a text or an app.

Many (if not most) people are guilty of using weak passwords or duplicating passwords for different accounts. This probably includes your employees. Adding 2FA to your security is a simple, easy, and inexpensive way to tighten security for your business.

Take a look at the different two-factor authentication apps available online, or contact Think to discuss options for your business needs. In the end, the one you will use will depend on the kind of deployment that you desire and the structure of your organization.

Successful IT Transitions Need These 5 Components

July 12th, 2019 Posted by Best Practices, Cloud, Communication, Data, Security, Staff 0 thoughts on “Successful IT Transitions Need These 5 Components”

Change is easy to get excited about and easy to get started, but it’s tough to follow through and keep the momentum going. Especially when it feels like there’s no end in sight, as can happen with IT projects if you’re not careful. But it doesn’t have to be an endless slog. If you build these 5 components into your IT transition, the entire process will be much smoother and more successful from beginning to end.

1. A tracking system – a simple list of major goals and initiatives, refer to it often (especially if you’re thinking about adding anything), and check off progress as you go. This helps to keep the direction clear, make the steps and goals feel attainable, and makes progress easy to see. All of these will make it easier for your staff to maintain motivation and momentum.

2. Clear communication – When people don’t understand what they’re doing or why, they lose focus, motivation, and enthusiasm. So, make all communications regarding the transition as transparent and simple as possible. Lose the tech jargon and talk about the benefits, challenges, and goals in a way that everyone can understand.

3. Available support personnel – It’s likely that there will be a handful of people in your organization who are always in demand during any IT transition. They’re the ones who always seem to know what’s going on and how to fix it. It’s essential that these people be free to work on higher level issues, while anything else is delegated to employees with less expertise and/or less demand on their skills and time. This will help the transition move more quickly and smoothly while encouraging less experienced staff to learn and take on new responsibility.

4. Clear transitions and expectations – make sure that your employees know when and how to transition from doing things the “old way” to adopting your new solutions and processes. Whether this is an entirely new role or just a new approach, you can cut down on confusion, frustration, and unnecessary delays by ensuring that everyone knows what to do and when to do it.

5. Data-based targets – It’s important to both morale and progress that you and your team can identify what “done” is for any given stage or goal in the transition. This gives you a framework to discuss their progress and direction, and it gives them a definite path to follow.

7 Tips for Training Tech-Savvy Employees

June 6th, 2019 Posted by Best Practices, collaboration, Communication, Staff 0 thoughts on “7 Tips for Training Tech-Savvy Employees”

Updating your technology on a regular basis is an important part of keeping your employees productive and efficient as well as protecting your company from cyber security threats. But keeping employees up to date on how to use all this new tech can be a challenge. Here are 7 tips to help you train more tech savvy employees and keep your business moving forward.

  • Know why –Most people resist change. It’s just human nature. But if you can explain WHY it’s worth their time and effort to learn and use this new tech, you’ll find your employees will be a lot more cooperative. And maybe even excited.
  • Recruit inside– Some employees will naturally be more apt and more interested in the new tech. Recruit them to help you train the others. This will help bridge the knowledge gap as well as getting everyone involved on the project together.
  • Get hands-on –As often as possible, have your employees learn by doing. The more engaged they are, the more likely they are to retain the information.
  • Documentation –Ever wish there was a manual for that? So do your employees. Give them written instructions (preferably with screenshots) whenever possible. This will help them learn more quickly and provide a handy reference guide for later.
  • Keep it small –Breaking your employees into smaller groups for tech training gives them more opportunities to ask questions and engage with the instructor, helping them learn more quickly.
  • Everyone is different –Some employees will pick up the new tech and run with it right away, but others will require more time and effort to get them going. Be prepared for differing rates of progress and be patient.
  • Get their thoughts –Your employees can provide you will valuable feedback on the learning process and how the new tech is impacting the company, if you ask and are open to listening. Do this during the transition and afterwards to help keep tabs on the bigger picture.

Melissa Glick Named to CRN Women of the Channel 2019 List

May 20th, 2019 Posted by Awards, Community, Press Release, Staff 0 thoughts on “Melissa Glick Named to CRN Women of the Channel 2019 List”

Durango, CO, May 20, 2019 – CRN®, a brand of The Channel Company, has named Melissa Glick, CEO of Think Network Technologies, to its prestigious 2019 Women of the Channel list. The leaders on this annual list are from all areas of the IT channel ecosystem; representing technology suppliers, distributors, solution providers, and other IT organizations. Each is recognized for her contributions to channel advocacy, channel growth and visionary leadership.

CRN editors choose the list from a multitude of channel leadership applicants and select the final honorees based on their professional accomplishments, demonstrated expertise, and ongoing dedication to the IT channel.

“CRN’s 2019 Women of the Channel list honors influential leaders who are accelerating channel growth through mutually-beneficial partnerships, incredible leadership, strategic vision, and unique contributions in their field,” said Bob Skelley, CEO of The Channel Company. “This accomplished group of leaders is driving channel success and we are proud to honor their achievements.”

“It’s an honor to be included in such an accomplished group of women,” said Glick “Technology is such an influential and important field, and it’s encouraging to see so much positive growth and change happening from year to year.”

The 2019 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/WOTC.

Think Network Technologies is an award-winning, full-service IT company based in Durango, Colo. and servicing the Four Corners, providing managed servicespremise and cloud solutionsintegrated communications, and IT consulting for businesses.

Is your business being targeted?

May 8th, 2019 Posted by Best Practices, Hackers, Security 0 thoughts on “Is your business being targeted?”

Two members of our staff and 3 of our clients were targeted by this phishing scam last month. You should know about it.

 

Have you seen the latest email phishing scam?

It looks like a quick email from your boss. They’re in a meeting and can’t talk, but could you stop and pick up some gift cards?

If you reply saying you will get the cards, the next email says to pick up $1,800 of Walmart gift cards and just take a picture of the numbers on the back of the card and email them back.

Which is where they really get you. Once you’ve sent the scammers the numbers on the back of the card, they have access to the money. And you have no way to get it back.

This scam is designed to take advantage of the fast-paced and informal nature of a lot of business communication. As well as the trust we place in our superiors. Two of the employees here at Think were targeted by this phishing attempt. A combination of cybersecurity knowledge and a good email filter helped ensure that neither of them fell for the scam. But others haven’t been so fortunate.

You can protect your business and your employees from phishing attempts with a few simple steps:

  1. Education – talk to your staff about what phishing is and what to watch for.
  2. Awareness – make sure your staff is looking at the sender and the contents of an email closely before clicking on links or replying.
  3. Protection – a good email filter will flag emails from outside senders, helping your employees identify untrustworthy sources more easily.

Phishing is one of the leading cybersecurity vulnerabilities for a business. Take steps to protect your business and don’t get caught!

5 Reasons Your Business Needs a Backup and Recovery Plan

May 6th, 2019 Posted by Best Practices, byod, Cloud, Data, Disaster, Hackers, Security, Staff 0 thoughts on “5 Reasons Your Business Needs a Backup and Recovery Plan”

If you lost all your business data today, how long would it take for your business to recover? What steps would you take to get everything up and running again? How would it impact you financially? Knowing the answers to these questions is all part of being prepared. Just like having a back up and recovery plan. Here is some more compelling evidence that this is a necessary part of any business today:

1. Data is Easy to Lose – not just major events, a lot of it is human error. This is especially true in a BYOD culture where you may have business data being stored on personal laptops or in personal cloud accounts of your employees.

2. Cyber Attacks Keep Coming – the average cost of an attack for a company with 10 – 24 employees is over $38,000, and it just goes up from there. It doesn’t matter what type of business or the size, hackers will target anything they can profit from.

3. Downtime – loss of data can bring your entire business to a grinding halt. And if that data can’t be recovered, it takes even more time to replace (if that’s even an option).

4. Irreplaceable Data – some documents or files are truly invaluable. Everything from client lists and research to files on upcoming projects. If all that disappeared in one day, where would your business be?

5. Reputation – do you hold any sensitive or personal data on for your clients or customers? Or data that your clients will need to access in the future, like health care records or financial information. How would telling them it was all gone impact your relationship with them? Or your reputation in the business community?

A variety of back up and recovery options are available and can be customized to suit your business. Contact one of our engineers today if you would like to learn more about your options or get an expert’s perspective on developing your own backup and recovery plan.

Network Security

Layer Your Security Like a Bean Dip

October 11th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Layer Your Security Like a Bean Dip”

What is Network Security?

Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network and targets a variety of threats to stop them from entering or spreading on your network.

The Layered Approach

Like a bean dip, your security should be layered. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but hackers are blocked from carrying out threats.

The layered security approach is a simple concept: the more hoops a hacker has to jump through, the less likely they are to be successful. The trick is to create a layered bean dip with the right consistency so your chip doesn’t break off. In other words, while you want hackers to have a hard time breaking into your systems, you want to keep your security simple and seamless for users.

6 Layers of Security

1) Response Plan – The first layer, the foundation, is the response plan. In the event of a breach, having a clear response plan in place will help ensure that you address all of the necessary pieces of remediation. Without a plan, you are more likely to miss something as you hastily try to patch holes, leaving your company still vulnerable.

2) Monitoring & Alerting – The second layer is monitoring and alerting. Monitors to help ensure complete coverage of a solution and the networks on which it runs and alerts help ensure that system failures and other issues are dealt with quickly. Without monitoring and alerting, you may never know a hacker has infiltrated your system.

3) Data Encryption & User Permissions – The third layer is like the lettuce and tomato – two ingredients that combine to make one layer. Data is most likely the most important piece of your business, so data encryption and user permissions are essential layers of security.

4) Applications – Data lives within applications, so naturally this is the next layer of security. Ensuring access to applications is accurate and limited, in addition to practicing secure coding methods will help protect your application layer.

5) Operating System – Applications are usually accessed from a desktop, laptop, tablet, or mobile device – so it’s important to make sure these devices are secure. Antivirus software, security policies and patching add security to operating systems.

6) Network – The last layer is the network. Setting up firewalls, intrusion detection systems and user authentication technologies are a few ways to protect your network from potential hackers.

The Bottom Line

Layers of security make your network safer. The better you layer your approach, the safer your network will be.

We Can Help

You need to work with someone who is keeping their eye on the shifting technology landscape – it’s worth working with a trusted adviser to navigate the options, especially when money is a consideration.

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can optimize network security and support your business, contact us.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.