Posts tagged "recovery"

7 Tips for Training Tech-Savvy Employees

June 6th, 2019 Posted by Best Practices, collaboration, Communication, Staff 0 thoughts on “7 Tips for Training Tech-Savvy Employees”

Updating your technology on a regular basis is an important part of keeping your employees productive and efficient as well as protecting your company from cyber security threats. But keeping employees up to date on how to use all this new tech can be a challenge. Here are 7 tips to help you train more tech savvy employees and keep your business moving forward.

  • Know why –Most people resist change. It’s just human nature. But if you can explain WHY it’s worth their time and effort to learn and use this new tech, you’ll find your employees will be a lot more cooperative. And maybe even excited.
  • Recruit inside– Some employees will naturally be more apt and more interested in the new tech. Recruit them to help you train the others. This will help bridge the knowledge gap as well as getting everyone involved on the project together.
  • Get hands-on –As often as possible, have your employees learn by doing. The more engaged they are, the more likely they are to retain the information.
  • Documentation –Ever wish there was a manual for that? So do your employees. Give them written instructions (preferably with screenshots) whenever possible. This will help them learn more quickly and provide a handy reference guide for later.
  • Keep it small –Breaking your employees into smaller groups for tech training gives them more opportunities to ask questions and engage with the instructor, helping them learn more quickly.
  • Everyone is different –Some employees will pick up the new tech and run with it right away, but others will require more time and effort to get them going. Be prepared for differing rates of progress and be patient.
  • Get their thoughts –Your employees can provide you will valuable feedback on the learning process and how the new tech is impacting the company, if you ask and are open to listening. Do this during the transition and afterwards to help keep tabs on the bigger picture.

Melissa Glick Named to CRN Women of the Channel 2019 List

May 20th, 2019 Posted by Awards, Community, Press Release, Staff 0 thoughts on “Melissa Glick Named to CRN Women of the Channel 2019 List”

Durango, CO, May 20, 2019 – CRN®, a brand of The Channel Company, has named Melissa Glick, CEO of Think Network Technologies, to its prestigious 2019 Women of the Channel list. The leaders on this annual list are from all areas of the IT channel ecosystem; representing technology suppliers, distributors, solution providers, and other IT organizations. Each is recognized for her contributions to channel advocacy, channel growth and visionary leadership.

CRN editors choose the list from a multitude of channel leadership applicants and select the final honorees based on their professional accomplishments, demonstrated expertise, and ongoing dedication to the IT channel.

“CRN’s 2019 Women of the Channel list honors influential leaders who are accelerating channel growth through mutually-beneficial partnerships, incredible leadership, strategic vision, and unique contributions in their field,” said Bob Skelley, CEO of The Channel Company. “This accomplished group of leaders is driving channel success and we are proud to honor their achievements.”

“It’s an honor to be included in such an accomplished group of women,” said Glick “Technology is such an influential and important field, and it’s encouraging to see so much positive growth and change happening from year to year.”

The 2019 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/WOTC.

Think Network Technologies is an award-winning, full-service IT company based in Durango, Colo. and servicing the Four Corners, providing managed servicespremise and cloud solutionsintegrated communications, and IT consulting for businesses.

Is your business being targeted?

May 8th, 2019 Posted by Best Practices, Hackers, Security 0 thoughts on “Is your business being targeted?”

Two members of our staff and 3 of our clients were targeted by this phishing scam last month. You should know about it.

 

Have you seen the latest email phishing scam?

It looks like a quick email from your boss. They’re in a meeting and can’t talk, but could you stop and pick up some gift cards?

If you reply saying you will get the cards, the next email says to pick up $1,800 of Walmart gift cards and just take a picture of the numbers on the back of the card and email them back.

Which is where they really get you. Once you’ve sent the scammers the numbers on the back of the card, they have access to the money. And you have no way to get it back.

This scam is designed to take advantage of the fast-paced and informal nature of a lot of business communication. As well as the trust we place in our superiors. Two of the employees here at Think were targeted by this phishing attempt. A combination of cybersecurity knowledge and a good email filter helped ensure that neither of them fell for the scam. But others haven’t been so fortunate.

You can protect your business and your employees from phishing attempts with a few simple steps:

  1. Education – talk to your staff about what phishing is and what to watch for.
  2. Awareness – make sure your staff is looking at the sender and the contents of an email closely before clicking on links or replying.
  3. Protection – a good email filter will flag emails from outside senders, helping your employees identify untrustworthy sources more easily.

Phishing is one of the leading cybersecurity vulnerabilities for a business. Take steps to protect your business and don’t get caught!

5 Reasons Your Business Needs a Backup and Recovery Plan

May 6th, 2019 Posted by Best Practices, byod, Cloud, Data, Disaster, Hackers, Security, Staff 0 thoughts on “5 Reasons Your Business Needs a Backup and Recovery Plan”

If you lost all your business data today, how long would it take for your business to recover? What steps would you take to get everything up and running again? How would it impact you financially? Knowing the answers to these questions is all part of being prepared. Just like having a back up and recovery plan. Here is some more compelling evidence that this is a necessary part of any business today:

1. Data is Easy to Lose – not just major events, a lot of it is human error. This is especially true in a BYOD culture where you may have business data being stored on personal laptops or in personal cloud accounts of your employees.

2. Cyber Attacks Keep Coming – the average cost of an attack for a company with 10 – 24 employees is over $38,000, and it just goes up from there. It doesn’t matter what type of business or the size, hackers will target anything they can profit from.

3. Downtime – loss of data can bring your entire business to a grinding halt. And if that data can’t be recovered, it takes even more time to replace (if that’s even an option).

4. Irreplaceable Data – some documents or files are truly invaluable. Everything from client lists and research to files on upcoming projects. If all that disappeared in one day, where would your business be?

5. Reputation – do you hold any sensitive or personal data on for your clients or customers? Or data that your clients will need to access in the future, like health care records or financial information. How would telling them it was all gone impact your relationship with them? Or your reputation in the business community?

A variety of back up and recovery options are available and can be customized to suit your business. Contact one of our engineers today if you would like to learn more about your options or get an expert’s perspective on developing your own backup and recovery plan.

Network Security

Layer Your Security Like a Bean Dip

October 11th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Layer Your Security Like a Bean Dip”

What is Network Security?

Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network and targets a variety of threats to stop them from entering or spreading on your network.

The Layered Approach

Like a bean dip, your security should be layered. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but hackers are blocked from carrying out threats.

The layered security approach is a simple concept: the more hoops a hacker has to jump through, the less likely they are to be successful. The trick is to create a layered bean dip with the right consistency so your chip doesn’t break off. In other words, while you want hackers to have a hard time breaking into your systems, you want to keep your security simple and seamless for users.

6 Layers of Security

1) Response Plan – The first layer, the foundation, is the response plan. In the event of a breach, having a clear response plan in place will help ensure that you address all of the necessary pieces of remediation. Without a plan, you are more likely to miss something as you hastily try to patch holes, leaving your company still vulnerable.

2) Monitoring & Alerting – The second layer is monitoring and alerting. Monitors to help ensure complete coverage of a solution and the networks on which it runs and alerts help ensure that system failures and other issues are dealt with quickly. Without monitoring and alerting, you may never know a hacker has infiltrated your system.

3) Data Encryption & User Permissions – The third layer is like the lettuce and tomato – two ingredients that combine to make one layer. Data is most likely the most important piece of your business, so data encryption and user permissions are essential layers of security.

4) Applications – Data lives within applications, so naturally this is the next layer of security. Ensuring access to applications is accurate and limited, in addition to practicing secure coding methods will help protect your application layer.

5) Operating System – Applications are usually accessed from a desktop, laptop, tablet, or mobile device – so it’s important to make sure these devices are secure. Antivirus software, security policies and patching add security to operating systems.

6) Network – The last layer is the network. Setting up firewalls, intrusion detection systems and user authentication technologies are a few ways to protect your network from potential hackers.

The Bottom Line

Layers of security make your network safer. The better you layer your approach, the safer your network will be.

We Can Help

You need to work with someone who is keeping their eye on the shifting technology landscape – it’s worth working with a trusted adviser to navigate the options, especially when money is a consideration.

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can optimize network security and support your business, contact us.

Why Outsource?

Why You Should Outsource Your IT Support

September 13th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Why You Should Outsource Your IT Support”

Why Outsource?

Virtually everything is connected to data. How your business manages data continues to gain importance – as technologies evolve and become more sophisticated it is imperative for your business to have a strong grasp on its IT strategy. However, for many small to medium sized businesses (SMBs) it is not practical to manage IT efforts in house. There are several key benefits to outsourcing IT support.

7 Reasons to Outsource IT Support

  1. Reduce IT Costs – Qualified, full-time, in-house IT professionals are expensive. The number one reason to outsource your company’s IT support is to lower costs. By outsourcing, you can spend less money on full-time resources and focus your budget on specific IT needs and projects.
  2. Free Up Internal Resources – By outsourcing IT support to a third-party provider, you can free up internal resources allowing them to focus on the growth of the business while your outsourced team focuses on technology.
  3. Compete with Larger Businesses – Resource and budget limitations often prevent SMBs from having an effective, in-house IT team, making it nearly impossible to compete with large businesses that have the budget to maintain their own IT services and systems. By outsourcing your company’s IT to qualified IT professionals, you can create a more even playing field.
  4. Reduce Your Risk – When you shift your IT to a third-party provider, you offload some the infrastructural risk that comes with it. When you share the risk, your company can become more agile, dynamic, and flexible, which will help you deliver a better product/service in the long-run.
  5. Offload Compliance & Security – Outsourced IT support will handle compliance and security tasks, so you won’t have to worry about things like keeping your firewall up to date or whether or not your workstations have been audited for compliance and security. A qualified Managed Service Provider (MSP) will minimize the risks associated with maintaining sensitive data for your business.
  6. Access Top-Level Experts – Most SMBs don’t have the budget to hire a panel of IT experts to guide you through the changing world of big data. When you outsource your IT support, you gain access to highly qualified and certified engineers that will help your company stay competitive.
  7. Get 24/7 Support – Outsourced IT support can provide after-hours, weekend and holiday emergency technical support, taking the stress and responsibility off of your team if something goes wrong. Technology should function effectively 24/7 – working with an outsourced team can provide peace of mind.

Immediate & Long-Term Benefits

By partnering with an IT team, your business can reap immediate and long-term benefits. It’s important to weigh the pros and cons of outsourcing your company’s IT needs. Think of both short term and long-term goals, needs and considerations. However, there are more reasons now than ever to outsource your company’s IT needs.

We Can Help

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can support your business, contact us.

IT Budget

It’s Budget Planning Season

September 13th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “It’s Budget Planning Season”

Q4 is Just Around the Corner

With Q4 just around the corner, it’s time to implement this year’s remaining IT projects and start planning your IT budget for next year.

Now is a good time to communicate and gain consensus for next year’s IT budget and strategy. IT projects are more easily justified at budgeting time when everyone knows their purpose, impact and objectives than if budget season is the first time anyone hears of it.

If you don’t already have an IT strategy, use the budgeting period as an opportunity to develop a strategy that’s presented immediately before your budget. If you have a cohesive and well-conceived plan, the money to execute that plan is less likely to be questioned. Anticipate capabilities that will be affected if you are required to make significant reductions to your IT budget.

Where to Focus Your IT Budget

As you plan for next year, here are 10 budget must-haves for many IT departments:

  1. Extra licensing fees – When new employees come through the doors, it’s important to be ready with the tools for them to get the job done, including extra licensing fees. This should cover productivity software, antivirus/malware (if you run a Windows platform), Exchange licenses (again, if you run a Windows platform), and any other piece of software necessary for business operations.
  2. Emergency hardware replacement – No matter how careful you are, no matter how well you’ve evaluated, deployed and administered your company’s hardware, it will eventually need to be replaced. Hardware replacement can be expensive and it’s important to have an emergency fund wrapped into your budget.
  3. Mobile technology – Mobile technology continues to become increasingly important. You should allocate a portion of your budget to cover mobile, if you haven’t already done so. This might be in the form of covering the cost of devices or data plans.
  4. Upgrades – Software and hardware need to be frequently upgraded. If you’re running outdated versions of your productivity software or outdated hardware, it’s a good idea to consider upgrading. Make sure your IT budget is prepared to upgrade software and hardware when necessary.
  5. Staffing needs – If your business expects to grow so much that you have to expand your IT staff, you will want to be prepared. Think can help with outsourced IT needs to help save money for your business.
  6. Cloud solutions – Cloud solutions can be in the form of a third-party solution or an onsite cloud solution. Either way, you will need room in your budget not only to deploy new cloud solutions, but also to expand existing cloud solutions.
  7. Software – Beyond purchasing updates for existing software, at some point you’re going to need to purchase new software or SaaS (software-as-a-service). New software will ultimately help your staff become more productive.
  8. Training – Technology is constantly evolving and tech standards from five or 10 years ago may no longer be relevant. Proper technology training could be imperative to keeping your company’s data secure.
  9. Data pipe – Who pays for your connection to the internet? Who pays for the failover connection? Who is responsible for the cost when your connection needs an upgrade? The answer to those questions is most likely “Your budget.” If your business depends upon an internet connection, you need a backup, even if it’s significantly slower.
  10. Data protection solution – Your business needs to have a solid, reliable backup solution deployed so that, should disaster strike, you can recover. Even if you happen to roll your own backup, you will still need to ensure that the backup hardware you use is always in working order and that there is a secure location to house the rotating drives.

Use IT or Lose IT

Now is the time to use your IT budget for remaining projects. If you’re not sure where to use your funds, take another look at the list above.

Or get in touch and our expertly trained engineers can discuss the best IT strategy for your business. We’re passionate about helping your business succeed!

ColoradoBiz Top Company Finalist

Think Selected as 1 of 3 Technology Top Company Finalists in Colorado

August 30th, 2018 Posted by Awards, Best Practices, Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “Think Selected as 1 of 3 Technology Top Company Finalists in Colorado”

Durango, Colo., August 30, 2018 – Think Network Technologies (Think) was recognized as one of three technology finalists on ColoradoBiz magazine’s 2018 Top Company list. The full Top Company finalist list consists of 42 Colorado-based businesses across 14 industries. Think was the only Durango-based finalist in 2018.

ColoradoBiz magazine’s annual Top Company Awards represent statewide businesses that have earned their way to the peak of performance. It’s not about perfection – progress is the name of the game for these companies.

A selection panel of 11 business leaders and community stakeholders convened in mid-June to bring the list of hundreds of applicants down to 42 finalists. Candidates were judged on financial performance, community involvement, outstanding achievement and other intangibles.

One finalist from each of the 14 categories was selected as a winner at the 2018 Top Company Awards, which took place Wednesday, Aug. 29. The 2018 technology category winner was Mobile Solutions.

“It’s a huge honor and achievement for Think to be in the pool with the other finalists. Congratulations to the other two Colorado technology companies that made the list this year – DISH Network and Mobile Solutions. In addition to operational success, our dedication to our employees and the community sets Think apart,” commented Melissa Glick, CEO at Think.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

For more information about this topic, please email us.

Internet of Things

Buzzword Breakdown: “Internet of Things”

August 10th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Buzzword Breakdown: “Internet of Things””

What is the “Internet of Things”?

The Internet of Things (IoT) refers to the connection of devices that send and receive data through the Internet. Any stand-alone internet-connected device that can be monitored and/or controlled from a remote location is considered an IoT device.

Cars, appliances, lighting, fitness trackers, healthcare and home security can all be connected through the IoT since they contain sensing devices that talk to other machines and trigger additional actions. As smaller, more powerful chips are developed and integrated into devices, the IoT will continue to grow.

Internet of Things
There are 7 main IoT characteristics:

  1. Connectivity – Devices and sensors need to be connected to an item, to each other, actuators, a process and to the Internet or another network to be part of the IoT.
  2. Things – A connected device is only an IoT connected device when “things” (i.e., endpoints) are uniquely addressable, using an IP address or Uniform Resource Identifier.
  3. Data – Data is the glue of the IoT; the first step towards action and intelligence.
  4. Communication – Devices get connected so they can communicate data and this data can be analyzed.
  5. Intelligence – Intelligence is the ability of IoT devices to gather data analytics.
  6. Action – This can be manual action, decision-making or automation.
  7. Ecosystem – The place of the IoT from the perspective of other technologies, communities, goals and the picture in which the IoT fits.

The Internet of Things is Not a “Thing”

The IoT consists of many devices, but also an ecosystem of related processes and other technologies. The IoT includes the hardware, software, connectivity and communication protocols, middleware and much more. The IoT also encompasses many processes and technologies, including big data, analytics, cloud, edge computing or fog computing, IoT platform software, IoT gateways, and more.

Security & Privacy

As devices become more connected within the IoT, security and privacy are a primary concern. Despite these concerns, IoT adoption continues to grow. In fact, smart speaker adoption in the U.S. grew 54% from December 2017 to February 2018, according to a 2018 comScore survey.

4 Tips to make your IoT more secure:

  1. Evaluate your security settings – Examine the settings, especially security settings, and select options that meet your needs without putting you at increased risk. If you install a new version of software or if you become aware of something that might affect your device, reevaluate your settings.
  2. Ensure your software if up-to-date – Patches are software updates that fix a particular issue or vulnerability within your device’s software. Make sure to apply relevant patches as soon as possible to protect your devices.
  3. Connect carefully – When a device is connected to the Internet, it’s also connected to millions of other computers, which could allow attackers access to the device. Consider whether continuous connectivity to the Internet is needed.
  4. Use strong passwords – Some Internet-enabled devices are configured with default passwords to simplify setup. These default passwords can be easily found online, providing limited protection. Choose strong passwords to help secure your device.

Questions?

Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.

Sources: US-CERT, Business Insider, i-SCOOP

Channel Futures MSP 501 2018 Winner

Think Ranked Among Top 501 Global MSPs

August 8th, 2018 Posted by Awards, Best Practices, Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “Think Ranked Among Top 501 Global MSPs”

Durango, Colo., August 8, 2018 – Think Network Technologies (Think) ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Future’s 11th-annual MSP 501 Worldwide Company Rankings.

The MSP 501 is the first, largest and most comprehensive ranking of managed service providers worldwide. This year, Channel Futures received a record number of submissions from companies in Europe, Asia, South America, and beyond. Channel Futures teamed with Clarity Channel Advisors to evaluate these progressive and forward-leaning companies. MSP’s revenue figures are weighted according to how well the applicant’s business strategy anticipates trends in the fast-evolving channel ecosystem.

“We are proud to be recognized amongst other outstanding MSPs throughout the world. This honor is a testament to the expertise, hard work, loyalty, and dedication of our team,” commented Melissa Glick, Think CEO.

“This year’s applicant pool was the largest and most diverse in the history of the survey, and our winners represent the health and progressivity of the managed services market,” says Kris Blackmon, Channel Futures content director and editor of the MSP 501. “They’re growing their revenue, expanding their customer influence and exploring new technology that will propel them for years to come.”

The 2018 MSP 501 list is based on data collected by Channel Futures and its sister site, Channel Partners. Data was collected online from Feb. 28 through May 31, 2018. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, growth and other factors. The complete 2018 MSP 501 list can be viewed online here.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

For more information about this topic, please email us.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.