Posts tagged "security"

7 Tips for Training Tech-Savvy Employees

June 6th, 2019 Posted by Best Practices, collaboration, Communication, Staff 0 thoughts on “7 Tips for Training Tech-Savvy Employees”

Updating your technology on a regular basis is an important part of keeping your employees productive and efficient as well as protecting your company from cyber security threats. But keeping employees up to date on how to use all this new tech can be a challenge. Here are 7 tips to help you train more tech savvy employees and keep your business moving forward.

  • Know why –Most people resist change. It’s just human nature. But if you can explain WHY it’s worth their time and effort to learn and use this new tech, you’ll find your employees will be a lot more cooperative. And maybe even excited.
  • Recruit inside– Some employees will naturally be more apt and more interested in the new tech. Recruit them to help you train the others. This will help bridge the knowledge gap as well as getting everyone involved on the project together.
  • Get hands-on –As often as possible, have your employees learn by doing. The more engaged they are, the more likely they are to retain the information.
  • Documentation –Ever wish there was a manual for that? So do your employees. Give them written instructions (preferably with screenshots) whenever possible. This will help them learn more quickly and provide a handy reference guide for later.
  • Keep it small –Breaking your employees into smaller groups for tech training gives them more opportunities to ask questions and engage with the instructor, helping them learn more quickly.
  • Everyone is different –Some employees will pick up the new tech and run with it right away, but others will require more time and effort to get them going. Be prepared for differing rates of progress and be patient.
  • Get their thoughts –Your employees can provide you will valuable feedback on the learning process and how the new tech is impacting the company, if you ask and are open to listening. Do this during the transition and afterwards to help keep tabs on the bigger picture.

Melissa Glick Named to CRN Women of the Channel 2019 List

May 20th, 2019 Posted by Awards, Community, Press Release, Staff 0 thoughts on “Melissa Glick Named to CRN Women of the Channel 2019 List”

Durango, CO, May 20, 2019 – CRN®, a brand of The Channel Company, has named Melissa Glick, CEO of Think Network Technologies, to its prestigious 2019 Women of the Channel list. The leaders on this annual list are from all areas of the IT channel ecosystem; representing technology suppliers, distributors, solution providers, and other IT organizations. Each is recognized for her contributions to channel advocacy, channel growth and visionary leadership.

CRN editors choose the list from a multitude of channel leadership applicants and select the final honorees based on their professional accomplishments, demonstrated expertise, and ongoing dedication to the IT channel.

“CRN’s 2019 Women of the Channel list honors influential leaders who are accelerating channel growth through mutually-beneficial partnerships, incredible leadership, strategic vision, and unique contributions in their field,” said Bob Skelley, CEO of The Channel Company. “This accomplished group of leaders is driving channel success and we are proud to honor their achievements.”

“It’s an honor to be included in such an accomplished group of women,” said Glick “Technology is such an influential and important field, and it’s encouraging to see so much positive growth and change happening from year to year.”

The 2019 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/WOTC.

Think Network Technologies is an award-winning, full-service IT company based in Durango, Colo. and servicing the Four Corners, providing managed servicespremise and cloud solutionsintegrated communications, and IT consulting for businesses.

Is your business being targeted?

May 8th, 2019 Posted by Best Practices, Hackers, Security 0 thoughts on “Is your business being targeted?”

Two members of our staff and 3 of our clients were targeted by this phishing scam last month. You should know about it.

 

Have you seen the latest email phishing scam?

It looks like a quick email from your boss. They’re in a meeting and can’t talk, but could you stop and pick up some gift cards?

If you reply saying you will get the cards, the next email says to pick up $1,800 of Walmart gift cards and just take a picture of the numbers on the back of the card and email them back.

Which is where they really get you. Once you’ve sent the scammers the numbers on the back of the card, they have access to the money. And you have no way to get it back.

This scam is designed to take advantage of the fast-paced and informal nature of a lot of business communication. As well as the trust we place in our superiors. Two of the employees here at Think were targeted by this phishing attempt. A combination of cybersecurity knowledge and a good email filter helped ensure that neither of them fell for the scam. But others haven’t been so fortunate.

You can protect your business and your employees from phishing attempts with a few simple steps:

  1. Education – talk to your staff about what phishing is and what to watch for.
  2. Awareness – make sure your staff is looking at the sender and the contents of an email closely before clicking on links or replying.
  3. Protection – a good email filter will flag emails from outside senders, helping your employees identify untrustworthy sources more easily.

Phishing is one of the leading cybersecurity vulnerabilities for a business. Take steps to protect your business and don’t get caught!

5 Reasons Your Business Needs a Backup and Recovery Plan

May 6th, 2019 Posted by Best Practices, byod, Cloud, Data, Disaster, Hackers, Security, Staff 0 thoughts on “5 Reasons Your Business Needs a Backup and Recovery Plan”

If you lost all your business data today, how long would it take for your business to recover? What steps would you take to get everything up and running again? How would it impact you financially? Knowing the answers to these questions is all part of being prepared. Just like having a back up and recovery plan. Here is some more compelling evidence that this is a necessary part of any business today:

1. Data is Easy to Lose – not just major events, a lot of it is human error. This is especially true in a BYOD culture where you may have business data being stored on personal laptops or in personal cloud accounts of your employees.

2. Cyber Attacks Keep Coming – the average cost of an attack for a company with 10 – 24 employees is over $38,000, and it just goes up from there. It doesn’t matter what type of business or the size, hackers will target anything they can profit from.

3. Downtime – loss of data can bring your entire business to a grinding halt. And if that data can’t be recovered, it takes even more time to replace (if that’s even an option).

4. Irreplaceable Data – some documents or files are truly invaluable. Everything from client lists and research to files on upcoming projects. If all that disappeared in one day, where would your business be?

5. Reputation – do you hold any sensitive or personal data on for your clients or customers? Or data that your clients will need to access in the future, like health care records or financial information. How would telling them it was all gone impact your relationship with them? Or your reputation in the business community?

A variety of back up and recovery options are available and can be customized to suit your business. Contact one of our engineers today if you would like to learn more about your options or get an expert’s perspective on developing your own backup and recovery plan.

The Inevitable eMail Scam

February 25th, 2019 Posted by Best Practices, Communication, Data, Desktop, Disaster, Hackers, Security, Services 0 thoughts on “The Inevitable eMail Scam”

Some things in life are guaranteed to happen, like death, taxes, and email scams. The email scams get more creative as time goes by.

One of the latest email scams going around has a particularly devious set up.

Targets of this scam receive an email from what looks like their own email address, as if you’d sent an email to yourself. This is strange enough to ring alarm bells, but it gets more alarming when you read the content of the email. The scammer claims to have installed programs on your computer that tracked all your information (including accounts, passwords, and contact lists) as well as recording you via your own webcam. Then the inevitable threat: pay $1,000 in bitcoin to the scammer within 48 hours, or everyone on your contact list will receive compromising personal information and video of you.

The language in the email is much coarser than that, but you get the idea. And it is a scam. This person didn’t send the email from your account, no matter what it looks like. And they don’t have access to your personal information or your webcam. There’s nothing to ransom; they’re just hoping to scare you badly enough to get you to pay them.

What You Can Do

Getting a good filter will help keep a lot of the junk from ever reaching your inbox.

Staying aware of the latest types of scams will help you be aware of what could come your way.

And always, always take a minute to think through and, if necessary, research anything that looks suspicious. A quick Google search can show you if others have encountered a similar situation.

If you want to do more to protect your email but aren’t sure where to start, our engineers would be happy to help. Contact us today to schedule a consultation and learn more about what you can do to protect yourself and your business.

Windows 7 & Windows Server 2008 r2 Are On Their Way Out

February 14th, 2019 Posted by Best Practices, collaboration, Communication, Data, Desktop, Devices, Disaster, Hackers, Managed Service Provider, Security, Services, Windows 7 0 thoughts on “Windows 7 & Windows Server 2008 r2 Are On Their Way Out”

All good things come to an end, and that includes operating systems. This time around it’s Windows 7 and Windows Server 2008 r2. As of January 14, 2020, Microsoft will no longer be providing security updates for these systems. This means that any devices running on these operating systems will become vulnerable to security threats after January 14, 2020.

What You Can Do

We encourage you to begin planning for the upgrade of these devices to a newer, more secure operating system. The sooner you start this process, the easier it will be to ensure that you can:

  1. Have time to determine the most beneficial IT solutions for your business.
  2. Work in the transition period during a more convenient time for you and your staff.
  3. Plan for the expense of the upgrade.

What You Don’t Want to Do

Put it off until the last minute. Something this vital to your business operations and security isn’t something you want to rush or push to the side.

We’re Happy to Help

Here at Think our engineers are ready to help you find the best IT solutions for your business. And with their extensive experience and knowledge, they can help make the transition as smooth and convenient as possible for your business and your staff. To schedule a consultation with a Think engineer, contact us today.

For more information from Microsoft, you can read their information page here.

Phishing

How to Avoid a Phishing Attack

July 10th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 2 thoughts on “How to Avoid a Phishing Attack”

90% of Data Breaches Involve a Phishing Attack

First things first – what is phishing? Phishing is an email technique used to fraudulently obtain sensitive information. Phishing emails are designed to look like they’re from a brand or institution you trust. They typically prompt you to download malware (malicious software), click on a link that redirects you to a malicious website or enter personal information. This can enable hackers to steal your identity, breach your employer’s systems, and more. The best way to defend yourself against phishing attacks is to identify phony emails before you click on them.

5 Tips for Identifying Phishing Emails

  1. Who’s the real sender? – Make sure the organization’s name in the “From” field matches the address between the brackets. Watch out for addresses that contain typos in the organization name (think amaz0n.com).
    Phishing - Who's the real sender?
  2. Check the salutation – If you do business with an organization, the first line of the email should contain your name. Don’t trust impersonal introductions like “Dear Customer.”
    Phishing - Check the salutation
  3. Use your mouse hover – Hover over an email link to see the full URL it will direct you to. Do not click the link – just hover. If the address isn’t where you’d expect it to go, don’t click it. Check all the links – if the URLs are all the same, it’s likely a phishing email.
    Phishing - Who's the real sender?
  4. What’s in the footer? – The footer of any legitimate email should contain, at minimum, a physical address for the brand or institution and an unsubscribe button. If either of these items are missing, it’s probably fake.
    Phishing - What's in the footer?
  5. Look for other content clues – Does the content have spelling and grammar errors, ask for personal or sensitive information, convey a high sense of urgency and/or privacy, offer incentives through threat or reward, or contain links or attachments? These are all clues pointing toward a phishing email.

When in Doubt, Delete

If something seems off, delete the email. If it’s not fake, the sender will contact you another way or send the message again.

We Can Help…

Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.

Source: Webroot Inc.

Server

Rising Temperatures, Rising Server Threats

June 13th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 0 thoughts on “Rising Temperatures, Rising Server Threats”

Why is it important to monitor server room temperatures?

With temperatures on the rise, server threats also increase. When servers overheat they can shut down. Whether you’re running a huge data center or a server room with just a few servers it is important to monitor room temperature to prevent downtime, loss of productivity and ultimately loss of revenue for your business.

Monitoring your servers’ temperature information is a starting point. However, monitoring the room temperature is a more proactive approach and will add another layer of security to ensure your server never reaches high temperatures. Monitoring the room temperature will provide an early indication if something is wrong, so you have enough time to react early and avoid serious problems.

5 benefits of monitoring server room temperature

  1. Prevent downtime – Temperature monitoring sensors and software will allow you to configure alerts that notify key personnel via email or text message if and when temperatures reach predefined thresholds so that someone can take action. Excessive temperature is one of the leading causes for having to replace hardware, and in most cases, it is easily prevented.
  2. Ensure efficient airflow inlet and exhaust – Placing temperature sensors on the front and back of your server racks will allow you to measure the temperature of the air going in and coming out of your servers. This is important to know to make sure cold airflow is not being mixed with hot air circulating in the room, as well as to ensure hot air exhaust from your servers is within the proper ranges. Airflow sensors can monitor the presence of airflow into your server room and will alert you if it stops.
  3. Reduce power consumption and increase energy efficiency – If you are actively monitoring the temperature in your server room, you should be able to identify trends and baselines. This data should indicate if your AC unit is able to keep up with the load and if there are cost savings to be had. Many times, room temperature will be set lower than necessary to compensate for not knowing exactly how effectively your servers are being cooled.
  4. Server room planning and scaling – Using the data collected from your temperature monitoring sensors, you will have insight into the cooling loads and airflow distribution of your current layout. You can use these insights to plan for the additional heat load of adding new equipment and how to maintain a proper layout for best airflow.
  5. Extend the life of your equipment – Last but not least, maintaining the proper server room temperature range will help extend the lifespan of your equipment by preventing excessive temperatures going unnoticed and causing unnecessary wear on your equipment. Short spikes of excessive temperatures can reduce reliability and can lead to hardware failure months later.

How do you monitor your server room temperature?

There are many vendors that offer physical sensors for measuring not only temperature, but also humidity, power, flooding and more. Think Network Technologies can help your business implement a server temperature monitoring solution. Contact us today to learn more.

Sources: enviromon.net, Paessler Blog

compliance security

Security and Compliance Solutions

January 24th, 2018 Posted by Best Practices, Cloud, Phone 0 thoughts on “Security and Compliance Solutions”

Solutions for Law Firms and Legal Service Providers

Think’s cloud services (T-Cloud) deliver essential IT services that maximize cost-efficiency and productivity for your team while offering the highest levels of privacy and security to protect your firm’s clients.

law firm IT services Audited security controls including SOC 2 Type II Mobile device management to protect data Admin tools to streamline IT management and security Reliability and support with a 99.999% uptime guarantee

Legal services firms are under intense pressure to offer services that are innovative and agile in the face of tough competition. Clients expect superlative responsiveness, efficiency, and cost-effectiveness. Our Compliance and Security plan includes high security email, file sharing, and web application security tools that increase productivity, project a high degree of technical competence, and conform to the security or regulatory requirements of clients.

Start with our Compliance and Security Plan

Our Compliance and Security plan services include security and privacy controls to protect attorney-client confidentiality and help to support client industry regulations, including finance and healthcare.

hosted exchangeHosted Exchange
Get business-grade, fully mobile email, calendar, and contacts for your attorneys and staff.

hosted emailEmail Protection
Tools that help you eliminate spam and viruses before they reach your users’ inboxes. Includes advanced spam and virus protection, company-wide white and black lists, and 24/7 threat monitoring.

ConnectID® single sign-on and identity management
Provide secure, easy-to-manage access to your web–based calendaring and docketing, conflict checking, document management, and legal research applications. Secure your cloud apps with 2FA, the strongest industry-standard authentication protocol.

pc backup servicePC Backup
Make sure your staff can recover quickly from hard drive failures and lost or stolen laptops.

email encryptionEmail Encryption
Protect against data leaks by automatically encrypting email containing privileged client information. Enforce compliance based on policies and rules that you define.

email archiving serviceEmail Archiving
Archive your email correspondence automatically and securely with encryption. Get tamper-proof, searchable records for auditing, compliance, and internal governance purposes.

share sync cloud serviceShareSync® file sync and share
Access and collaborate securely on discovery, client, and project files from anywhere, on any device, with at-rest and in-transit encryption. Manage research and discovery files and folders for staff and clients with strict access controls, even in a virtual office environment.

Add These Services to Enhance Your Solution

business phone serviceHosted PBX
Experience enterprise-grade phone service with conference calling and automatic call forwarding. Use the softphone mobile app to dial from a mobile device as if you were sitting at your desk.

business cloud serviceShareSync® 10GB Capacity
With upgraded storage, you will not need to worry about running out of room, whether you’re gathering large documents for discovery, or maintaining a library of research or case files.

Skype® for Business Enterprise
Instantly convert a chat into a conversation or video for richer, more productive project discussions. Share screens to collaborate quickly on proposals.

Security and Reliability that go Above and Beyond the Competition

IT security servicePrivacy and security to support confidential attorney-client communications.
• Annual SOC 2 Type II audits.
• A dedicated, full-time technical staff certified in information security.
• Full coverage of all aspects of security, including log and event monitoring, incident response, managing intrusion protection systems (both host and network), perimeter defense, service and architecture testing, and source code reviews.

uptime guaranteeReliability and support you can count on.
• With the T-Cloud 99.999% uptime guarantee, you can access your cloud services when needed, staying connected and productive.
• Receive 24/7 phone and chat support any time you need expert help.

IT admin toolsAdmin tools to streamline IT management and security.
• Centralized control over users and services, with granular configurability.
• Administrators can quickly provision,
de-provision and configure security controls, and delegate
setup and management to non-specialized staff.
• Single sign-on technology that comes with all Think’s applications safeguards sensitive financial and customer data and web-based applications.

business mobile device managementMobile device management and security.
• Purposefully built to protect data wherever it is accessed.
• Our email system includes mobile security controls and policy enforcement for the administrator, including remote wipe for employees with mobile devices.

Get started protecting your firm and your clients with strong compliance and security solutions. Contact Think to begin the conversation.

business email phone encryption

Encryption for Email and Phone Security

January 4th, 2018 Posted by Best Practices, Cloud, Communication, VoIP 0 thoughts on “Encryption for Email and Phone Security”

To Encrypt or Not to Encrypt:

What is email encryption? Why would you use it? What about security for your business phones? Are you protecting sensitive data?

Today I want to jump into a topic that most of Think’s competitors seem to be missing. I walk into businesses every day that are not taking the necessary steps to protect patient, client, customer, and employee information. Email encryption is a simple a la cart service that Think Network Technologies provides.

HIPAA, PCI Compliance, and Email Encryption

Why does it take the urgency of regulatory requirements (HIPAA Compliance, PCI Compliance, or other laws) to get a company to purchase a product that is a socially and ethically responsible business practice? Encrypted communication should be a standard piece of every company’s infrastructure in 2018.

This topic came to light for me recently when I had a lawyer I was working with on a project send me an email. It was addressed from johnsmith@gmail.com. (Names have been changed to conserve the privacy of individuals in this story.) I was in disbelief and appalled that an attorney was utilizing a Gmail account, so I decided to look into whether or not it was even legal.

What I found was that it does not comply with the new American Bar Association guidelines, and in some cases can actually be a breach of attorney-client confidentiality. Take a moment to consider your own methods. How do you handle potentially sensitive information? Are you sending personal health information over an insecure connection? Are your client phone calls secure?

encryption email phoneVOIP and Phone Encryption

The key to ensuring secure voice communication is to use VOIP (Voice Over Internet Protocol). Even using VOIP it is very important to understand the difference between transport encryption, and end to end encryption. Popular services like Skype and Google Voice can’t guarantee compliance and privacy. They may be cheap and easy to use, but you need to consider the consequences of having those communications intercepted. Would the cost of a privacy breach be worth the “convenience” of using a free service?

The Electronic Frontier Foundation has created a simple and short guide detailing secure communications. You can read the details here. No time for that? It’s okay, because we have you covered.

Secure Communications Solutions

Think Network Technologies has a full suite of cost-effective solutions for health care providers, legal firms, manufacturing, financial organizations, and many other companies who are mandated to utilize encrypted communications. We also have options for our clients who want to be responsible when sending client, employee, and confidential information via email. Let Think Network Technologies secure your communications today with our Secure Communications Suite of products.

Get in Touch!

Are you not sure whether you are in compliance? Are you interested in an audit of your business practices? Call or email today for a consultation.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.