Posts tagged "devices"

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

10 Things You Should Know About Windows 10 Creators Update

April 19th, 2017 Posted by Best Practices, Data, Desktop, Devices, Internet, Newsletters, Windows 10 0 thoughts on “10 Things You Should Know About Windows 10 Creators Update”

Microsoft officially released its significant update to Windows 10 on April 11th. The company is calling it the “Creators Update”. In comparison to the monthly updates that usually only contain minor changes and security fixes, the latest update has new features that are large and small.

BUT, before you go through with ANY update, be aware of the risks that you might be taking by completing the install. You may have insufficient hardware, driver problems, and application incompatibilities to name a few.

Please consult your IT support provider to hear if Windows 10 Creators Update is right for you. We always recommend time for any major update for bugs to be worked out. You don’t want to be the guinea pig. If there is no pressing need for the update or you do not require any of the new features or improvements to perform your job, hold off.

But, if you are interested, here are the top things to know about the Windows 10 Creators Update.

1. Phased Approach

The Creators update was released on April 11th, so why hasn’t your computer updated yet? Well, Microsoft is taking what it calls a “phased approach”. Which means that not everyone will get the update right away. Newer devices will receive the update first, then updates to other devices based on feedback Microsoft receives from the first group. This process will be repeated over the next several months according to Microsoft’s Director of Windows Servicing and Delivery, John Cable.

But, you can manually update via the Software Download Site if you can’t wait. The suggested way is to take advantage of the Update Assistant. In order to do so, go to the Software Download Site and click the “Update Now” button. While it’s manually updating, the privacy settings will appear as part of the first experience with the Creators update.

 

2. Mini View

The Mini View feature creates a compact overlay on your computer. Which means certain apps can go into picture mode in the corner of your screen. You can stream videos from YouTube, make a video call, keep a timer on top or place many other apps in the corner while you multitask with the rest of your screen. The minimalist mode can potentially be very useful for the multitaskers out there.

 

 

3. Night Light

If you’re wondering why you can’t sleep at night it might be because of the blue light coming from your screen. There’s already software out there such as F.lux that filters out this blue light. The Creators update will add a new function called the “Night Light” which will filter blue light, so you can sleep with ease. To activate Night Light, open the Settings app and then go to System > Display.

 

4. Microsoft Edge

Once the Creators update goes into effect for you, you’ll notice that the Edge browser is faster with better functionality. Utilizing Google’s own benchmark tool, the updated Edge browser scored faster than Chrome for loading and rendering sites. It also blocks more malware and phishing sites than Chrome with the SmartScreen Filter (read the report from NSS Labs). You’ll be able to manage your tabs easily in the Edge with the ability to organize and preview tabs without leaving your current page. You can set aside open tabs with one click and reopen them with the “tabs you’ve set aside” section. The Edge becomes an e-reader and it has the basic functions to adjust the font and text size on e-books, set bookmarks, search for terms and other features you’d expect from an e-reader.

 

5. Game Mode

If you’re one of the 150 million Americans that plays video games then this new feature should interest you. The Creators update includes “Game Mode” which allows Windows 10 to adjust its resource allocation logic to prioritize a game when it’s running. The update will also have a service called “Beam” that lets you take screen caps or videos of any game you are playing, load them up to your channel, and share them. Own an Xbox? Lucky for you because you can buy a game once, then play it on your Xbox or your computer. Now you can take your gaming on the road easily!

 

6. Improvements to Defender

A central dashboard for monitoring the security of your machine will be added to your computer called the Windows Defender Security Center. Your new dashboard will allow you to view your antivirus protection as well as your network and firewall protections. It also includes health & performance, application and browser controls, and family options. You can read more about it here:
Introducing Windows Defender Security Center.

 

7. 3D Paint

Here’s an upgrade everyone can get excited about: the new app, Paint 3D! You don’t need artistic creativity to use Paint 3D according to PCWorld’s Mark Hachman. People that don’t have any creative skills can actually create stunning 3D scenes. When you’re done making your work-of-art you can send it off to a 3D printer!

 

8. Dynamic Lock

Are you the type of person to hit Win + L to lock your computer every time you walk away? Well, here’s a handy new option for you, the Dynamic Lock. Pair your phone with your Windows 10 PC via Bluetooth and when you walk away with your phone for more than 30 seconds, your computer will lock and shut off the display. Users can setup the Dynamic Lock option within Settings > Accounts > Sign-in options.

 

9. Windows Ink

According to Microsoft, the Creators update will allow users to directly write on Word documents, web pages in Edge, maps, photos and videos.  The update will also add an ink toolbar with a tilt pencil effect and a protractor tool.

 

10. Windows Themes are Back

The Creators update will include new system colors and themes which will make your Windows 10 PC even more personal. You can head over to the Windows Store to choose from a large variety of pre-made themes.

There are many other features on the Windows 10 Creators update. Such as mixed/augmented reality, 4k monitor support, new sharing options, scheduled update installs, “My People” feature and much more!

We hope you found these tech tips handy! Remember, it’s not just about technology solutions. It’s about partnering with our clients to drive business success.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Tech Tips for the Business Professional – Keyboard Shortcuts

March 29th, 2017 Posted by Best Practices, Data, Desktop, Devices, Internet, Newsletters 0 thoughts on “Tech Tips for the Business Professional – Keyboard Shortcuts”

Time is money for most business professionals and you want to utilize every second that you have. It may not seem like a big time saver, but when you add up all the times you have to move your hand away the keyboard so you can “select”, “copy”, “paste” or any other similar functions, it starts to add up quick.

Memorize Keyboard Shortcuts

Memorizing shortcuts can be intimidating at first, but remember you don’t need to know every shortcut. You only need to learn and use the ones that are most important to you. Check out the shortcuts below to greatly improve your productivity.

Copy, Paste, and Other General Shortcuts

Press this key To do this
Ctrl + X Cut the selected item
Ctrl + C (or Ctrl + Insert) Copy the selected item
Ctrl + V (or Shift + Insert) Paste the selected item
Ctrl + Z Undo an action
Alt + Tab Switch between open apps
Alt + F4 Close the active item, or exit the active app
Ctrl + F Search for a word within a web page
F2 Rename the selected item
F3 Search for a file or folder in File Explorer
F4 Display the address bar list in File Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the Menu bar in the active app
Alt + F8 Show your password on the sign-in screen
Alt + Esc Cycle through items in the order in which they were opened
Ctrl + Y Redo an action
Ctrl + A Select all items in a document or window
Ctrl + D (or Delete) Delete the selected item and move it to the Recycle Bin
Ctrl + R (or F5) Refresh the active window
Ctrl + Shift + Esc Open Task Manager

The Shortcuts Don’t End There

There’s plenty more shortcuts then what we showed you above. If you want to check them out then you should follow these links:

Keyboard Shortcuts in Windows

Mac Keyboard Shortcuts

22 Best Shortcuts You’re Not Using

We hope you found these tech tips handy! Remember, it’s not just about technology solutions. It’s about partnering with our clients to drive business success.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Think IT Town Hall Helps Locals with Tech Advice

March 17th, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, Hosted Services, Internet, Microsoft, Networks, Newsletters, Operating System, Security, Services 1 thought on “Think IT Town Hall Helps Locals with Tech Advice”

Matt Glick and Prudencio Dimas from Think have over three decades of experience in the IT world working side by side with organizations, both large and small, to understand and resolve ongoing IT challenges.  Their understanding of network infrastructure, design and implementation was offered to participants of the TechKnowledge 2017 Conference in a Town Hall forum.  Topics such as servers, backups, disaster recovery, cloud storage, Office 365, virus protection, malware, ransomware, and security best practices were all discussed.  Matt and Prudencio fielded a range of questions but it was obvious what was the most concerning topic among the group.

Ransomware and backups.

The duo talked about best practices when it comes to backups and ransomware for almost an hour with the group. It was a very productive session and their favorite question came from Diana Murray, Manager for ASAP Accounting & Payroll, Inc.  Ms. Murray asked “What are the three most important elements of IT when talking about small business?”  We thought we would summarize their answers below.

1. A layered approach to security:

Matt brought up an older Blog post Think published entitled “Is Your Security Layered Like Your Bean Dip?”  It says you should layer your security like a seven-layer bean dip.  Just one layer at the bottom, and it just not as enticing.  But when you get all those layers, working together, it’s an explosion of excellence!  And even more important, the layered security approach tells us the more hoops a hacker has to jump through, the less likely they are to be successful.

2. Backups are key:

Matt posed a few questions business owners should consider when it comes to their backups.  What kind of backup you have is just as important as what is being backed up.  Is it file level backup?  Do you have a full image?  And, what is your expectation of downtime in the event that you do deal with a server crash?  And, he reminded everyone there to be realists.  Emergencies happen.  So, anticipate that they will happen and be prepared.  Practice.  Exercise your backup recovery process; test and retest it, so you have time to work out the kinks.

3. Standardization:

Prudencio explained IT standardization is a strategy for minimizing IT costs within an organization by keeping hardware and software as consistent as possible and reducing the number of tools you have that address the same basic need. It may take the form of ensuring that every computer has the same operating system, or of purchasing hardware in bulk so that every PC in your office is the same make and model. By streamlining your IT infrastructure, you can simplify decision­ making and minimize purchasing and maintenance costs.

Thank you to the Chamber of Commerce for organizing this event for our community and for asking Think to be involved.

Tech Knowledge Conference 2017

February 22nd, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, Hosted Services, Internet, Microsoft, Networks, Newsletters, Operating System, Security, Services 0 thoughts on “Tech Knowledge Conference 2017”

The Durango Chamber of Commerce will host its 3rd Annual Tech Conference on Wednesday, March 15th at the DoubleTree Hotel featuring keynote speaker Jeff Walker.

There will be a variety of breakout sessions throughout the day which include topics about cyber security, email marketing, makerspace, web policies, digital marketing, facebook marketing, hackathon, and much more. Think Network Technologies is a sponsor for the Tech Conference, but they will also be a presenter for one of the breakout sessions.

Matt Glick(CTO) and Prudencio Dimas(Solutions Architect) will be holding an “IT Town Hall” on March 15th from 2:30 – 3:20p in the Silverton/Purgatory room at the DoubleTree Hotel. You’ll be able to ask Think’s senior engineers all your business tech questions about servers, backups, disaster recovery, cloud storage, Office 365, virus protection, malware, ransomware, security best practices, and IT policies.

As CTO of Think Network Technologies, Matt manages network operations, business development and provides guidance to the technical team.  He brings more than 18 years of experience delivering technology solutions to regional private and public sector accounts. Matt has a Bachelor’s of Science in Sociology and Environmental Science from Fort Lewis College.  He started his career in Seattle, where he worked for a corporate consulting company and got his start in systems administration.  He pursued further education at Colorado Mountain College for Microsoft Server OS, Directory Services and Architecture; completing MCSE, MCSA and MCP certifications.  He also completed the Cisco CCNA, CCDA and CCNP certification coursework while being employed as a network administrator for a school district in Roaring Fork Valley, CO.  In 2002, Matt returned to Durango to start his own venture, thus the inception of Think Network Technologies.  His understanding of network infrastructure, design and implementation has benefited Think’s customers in finding solutions to fit the business requirements in both smaller and larger environments.

As a Solutions Architect at Think, Prudencio plays a role in nearly all phases of the IT service delivery life cycle, from the initial consultation and needs assessment, to implementation and ongoing solution support. Prudencio got his start as an intern while earning an Associate’s Degree in Information Technology. Prudencio is well rounded with experience ranging from small computer repair shops to networks of five thousand plus endpoints.  His primary focus is on windows systems administration and he carries certifications in Microsoft and Cisco technologies. In 2012, Prudencio left the IT world behind for 6 months of world travel. When he returned, an opportunity with Think brought him to Durango where he works side by side with businesses large and small to understand and resolve ongoing IT challenges.

Please contact Think’s IT specialists at sales@thinknettech.com if you have any questions or concerns.

The Surprising Secret of Happy Workers

February 22nd, 2017 Posted by Best Practices, Data, Desktop, Devices, Internet, Newsletters 0 thoughts on “The Surprising Secret of Happy Workers”

When the gurus talk about their recipes for happy workers, they seldom mention technology. Information technology is normally only discussed in terms of productivity. But it turns out employers looking for a happy (and productive) workforce ignore technology at their cost.

“Lifestyle IT” Reaches the Office

Technology is marketed as aspirational. Phones are not sold to consumers as something they can use to make calls. New computers are not marketed in terms of being able to open Microsoft Word faster than their predecessors. Consumers are persuaded to buy technology because it will enhance their lifestyle.

That idea of technology offering something more than plain functionality infiltrated the office a few years ago. Just over 40 percent of employees say having the latest and greatest technology is “very important” to them.

Use It or Lose Them

One out of four employees say the quality of the technology in the workplace would influence their decision to stay with one employer or move to another. This is even truer at the management level. Management expects the best technology. If they do not get it, they are more likely to leave.

What To Do?

IT decision makers had plenty to juggle before being told their decisions affect employee happiness and retention. There are some quick fixes.

First, Hear Them

Employees report being disgruntled when not included in IT decisions. Less than half of employees feel decision makers take their views into account when selecting technology.

A simple first step to improve employee engagement is to talk to them about the technology they need to do their jobs. You don’t know until you try whether consulting employees will cost you more. They might want something different, not something more expensive. Even if it cannot be done, you have provided a forum to explain why.

Second, Enable Them

More than half of employees are using their own devices for work or expect to do so in the future. Letting them do so could relieve some of the pressure on you. It is one reason 54 percent of companies globally are allowing BYOD.

The key is to allow it in a structured way. If you forbid it, there is a chance employees will do it anyway. That opens holes in security. Even of companies that formally allow BYOD, only 27 percent are securing the personal devices. Policies, permissions, and structure are important.

The idea of engaging employees in dialogue about a subject as involved as business technology might not seem appealing. The financial rewards, however, can be attractive. In some organizations, even the slightest uptick in retention rates can be significant.

The same is true when it comes to employee happiness and productivity. And with consumers being better educated about technology than ever, you might just learn something too.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

WordPress Sites Hacked Due to Exposed Vulnerability

February 8th, 2017 Posted by Best Practices, Hackers, Internet, rest api, Security, wordpress 0 thoughts on “WordPress Sites Hacked Due to Exposed Vulnerability”

WordPress 4.7.2 was released last Thursday, January 26th. If you have not already updated, please do so immediately.

A WordPress bug called REST API Endpoint allowed more than 100,000 websites to be hacked over the past two weeks. According to security firm Sucuri, websites have been hacked solely because the admins did not make an update to their WordPress as advised by the company. The exploit allows hackers to update content published on a WordPress website running with the 4.7.0 or 4.7.1 versions.

The security flaw, a zero-day vulnerability which affects the WordPress REST API, allows attackers to modify the content of posts or pages within a website backed by the WordPress content management system (CMS).

The reason the vulnerability wasn’t made public at the time of WordPress 4.7.2’s release was the real worry that malicious hackers might race to exploit the flaw, attacking millions of blogs and company websites. We have here, but not before a few headlines on Data Center Knowledge were altered to read “Hacked by (insert group name here)”. Sucuri also warned that version 4.7.2 may not automatically update even if that feature is turned on in WordPress.

MuhmadEmad, a Kurdish anti-ISIS hacktivist working for the Kurdlinux team, has hacked thousands of websites, leaving a message praising the Kurdish Peshmerga forces. This is not the first time the Kurdish hacker targeted websites leaving a message saying ‘Long Live the Peshmerga’. On Monday, the National Treasury Management Agency (NTMA) said that its official website was hacked by MuhmadEmad. “The perpetrator also posted a picture of the Kurdish flag, and wrote ‘long live Peshmerga’.”

To avoid your websites from being hacked with this exploit, Cyber Security professionals have requested to update to the latest WordPress version 4.7.2.

Please contact our sales team at sales@thinknettech.com if you have any questions or concerns.

Page Versus Screen – Is There a Balance?

February 8th, 2017 Posted by Best Practices, Data, Desktop, Devices, Internet, Newsletters 0 thoughts on “Page Versus Screen – Is There a Balance?”

For years, the debate has raged, but research hasn’t been able to prove one way or another if we retain information better when we’ve read it from a physical page – in a book, magazine or newspaper– than when we’ve read it online, with a tablet, mobile device or other screen.

And hopefully it never will, with ‘screen time’ such a big part of our lives. Computers and mobile devices are versatile and make information more accessible, so striking a balance between children’s appetite for information and their ability to digest it is crucial for primary, secondary, and even tertiary educators.

So, is the page mightier than the screen? Should we choose one over the other, or can we still find balance?

Page or Screen?

Leading researchers believe that there is a tangible relationship between text written on a physical page and the way the brain responds to and retains what is written on that page. Studies in the early 2000s indicated that students performed better in exams when they had studied the information for tests from textbooks and other printed sources. However, a 2013 survey by the UK National Literacy Trust found that over 52% of students aged 8–16 preferred reading on electronic devices, and only 32% preferred print. In fact, research indicates the next generation of students are reading well on digital devices.

In reality, banishing the screen is a near-impossible task. With students issued laptops at all ages, and doing more of their research and homework online, the screens are here to stay whether they’re helping or not.

So, the question becomes: How can educators deploy screen time for best effect?

Technology in the Classroom

Implementing simple strategies like giving students extra time to familiarize themselves with the devices they’ll be using before reading texts mean they won’t be distracted by functionality while trying to concentrate.

Screens and e-readers should be used in the same way as printed text – one device per student, not one shared among a group. This way, students will be more easily immersed in learning – without the distraction of tussling with a neighbor over ownership.

Although it can be both a blessing and a curse, connecting devices to the internet allows for more collaboration, enabling students to compare how their fellow pupils are engaging with a text. For example, sharing information online (for example, by allowing students to see which passages in a text their peers have highlighted, or by making students’ digital annotations visible to their classmates) can help the whole class to improve their understanding of a text.

This should be balanced with an emphasis on the importance of each student developing their own understanding, so teachers need to keep track of their progress by continuing to ask questions of individual students.

The future success of ‘digital natives’ using devices more frequently in their learning will rest in the same place it always has done – in the quality of the materials, in the ways educators implement them and in the way students are nurtured to use them effectively.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Traditional Typing Skills in the Digital Age

February 8th, 2017 Posted by Best Practices, Desktop, Devices, Newsletters, typing 0 thoughts on “Traditional Typing Skills in the Digital Age”

Handwriting is in decline as students increasingly use digital forms of writing throughout their lives – from their personal communications through to their essays. Does this mean learning to touch-type is now a vital skill? Perhaps not – there’s researching suggestion that knowing how to touch-type doesn’t necessarily make you a faster or more accurate typist.

Although many students will be happy and effective muddling along with their own ‘hunt and peck’ strategy, there are benefits to be gained from a typing course beyond just speed and accuracy.

A high words-per-minute rate may no longer be a requirement for finding a job, but being able to type quickly and accurately may help students make sure their hands keep up with their thoughts, letting them express themselves more confidently and study more effectively.

Early typing skills

With children becoming computer-literate at younger and younger ages, keyboard skills are increasingly important even in early primary school to prevent bad habits from setting in.

Encourage students in the early years to use two hands instead of one to type, and to use the hand that sits closest to the letter they are typing – letters to the left of the keyboard with the left hand and vice-versa. Color coding the keyboard with stickers can help them quickly and easily identify which half of the keys to hit with a right or left hand finger.

Encourage students to use their thumbs for the space bar so they don’t get in the habit of moving their hands too much, but it doesn’t matter at this early stage if they’re not using all ten fingers. The key is to get them familiar with the keys, and thinking about how to reach them as quickly as possible.

Intermediate typists

Students in the middle and upper levels of primary school – whose hands can more easily reach across a keyboard – could start learning more structured techniques, and to incorporate more of their fingers.

A fun challenge to test progress could be to practice writing texts without looking at the keyboard. Students often become used to looking at both text and keyboard at once by typing on touchscreens, and so may not realize that they’re relying on seeing the keys all the time.

Adding touch-typing to lessons

With curriculum testing moving online, now is the perfect time to reintroduce touch-typing courses. The vast array of inexpensive, fun and educational typing software, games and online resources makes it easy for educators to start teaching this valuable skill today.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Technology Disposition

January 17th, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, E-Waste, Newsletters, Operating System, Security, Services 0 thoughts on “Technology Disposition”

Donate or Recycle Your Electronics, But Don’t Throw it Away!

Donating and recycling your electronics is the best way to help the environment by conserving resources and natural materials. It is critical to make sure you are donating and/or recycling electronics safely and correctly.

Computers, printers and other electronics contain a variety of unsafe and toxic substances, that when discarded improperly can pose risks to our health and the environment. These products are also made from valuable resources and materials, including metals, plastics, and glass, all of which require energy to mine and manufacture. Donating or recycling consumer electronics conserves our natural resources and avoids air and water pollution, as well as greenhouse gas emissions.

Contribute your old computers and phones to groups that will fix and clean them and put them back into circulation. Even the oldest computer—something you consider the most obsolete of digital dinosaurs—can probably be used by someone.

 

While it’s great to recycle parts, your old and unwanted gadgets can be incredibly useful to someone else. These non-profits and programs work to refurbish and deliver cellphones and other electronics to those in need.

Call2Recycle: Call2Recycle program is a free and easy way for earth-conscious folks like yourself to get rid of your old batteries and cellphones.

National Coalition Against Domestic Violence: You can donate your unwanted cellphones to the NCADV, which partners with Cellular Recycler for the collection of used electronics and uses proceeds from refurbished gadgets to help stop domestic violence.

Many local non-profits would be happy to take your old computers, devices, printers and other electronics. The La Plata County Humane Society Thrift Store is one of those non-profits that would gladly take your electronics off your hands.

Another concern is the destruction of all data on any hardware you are disposing. Obviously you do not want any of your data or your customer’s data getting in the wrong hands. Think can wipe sensitive data from your hardware before you choose to donate or recycle it.

Where to Recycle Your Old Electronics?

Can you bring your electronics to any recycling facility? Before you do, you should check to see if your recycling facility has a E-Steward Certified as well as IS14001 Certified because that means they comply with e-waste recycling standards as well as being environmentally responsible. The Durango Recycling Center holds both of those certificates and that’s where Think Network Technologies recycles all of their computers, monitors, devices and other electronics. They only accept e-waste on Saturdays or if you’re a business you have to call to schedule a drop-off.

If you are a client of Think and located within city limits we will pick up your recyclables. We’ll make all the arrangements for you. Please call us at (970)247-1885 if you would like to hear our prices.

Here are some more articles and websites about recycling e-waste.

EPA (Environmental Protection Agency)

Mashable – 4 Ways to Recycle Your Old Gadgets

PC Mag – How to Recycle Your Technology

E-Stewards for Recyclers

Durango Recycling Center

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

CONNECT

FacebookTwitterInstagramLinkedIn

© 2018 Think Network Technologies, LLC. All rights reserved.