Posts tagged "security"

The Inevitable eMail Scam

February 25th, 2019 Posted by Best Practices, Communication, Data, Desktop, Disaster, Hackers, Security, Services 0 thoughts on “The Inevitable eMail Scam”

Some things in life are guaranteed to happen, like death, taxes, and email scams. The email scams get more creative as time goes by.

One of the latest email scams going around has a particularly devious set up.

Targets of this scam receive an email from what looks like their own email address, as if you’d sent an email to yourself. This is strange enough to ring alarm bells, but it gets more alarming when you read the content of the email. The scammer claims to have installed programs on your computer that tracked all your information (including accounts, passwords, and contact lists) as well as recording you via your own webcam. Then the inevitable threat: pay $1,000 in bitcoin to the scammer within 48 hours, or everyone on your contact list will receive compromising personal information and video of you.

The language in the email is much coarser than that, but you get the idea. And it is a scam. This person didn’t send the email from your account, no matter what it looks like. And they don’t have access to your personal information or your webcam. There’s nothing to ransom; they’re just hoping to scare you badly enough to get you to pay them.

What You Can Do

Getting a good filter will help keep a lot of the junk from ever reaching your inbox.

Staying aware of the latest types of scams will help you be aware of what could come your way.

And always, always take a minute to think through and, if necessary, research anything that looks suspicious. A quick Google search can show you if others have encountered a similar situation.

If you want to do more to protect your email but aren’t sure where to start, our engineers would be happy to help. Contact us today to schedule a consultation and learn more about what you can do to protect yourself and your business.

Windows 7 & Windows Server 2008 r2 Are On Their Way Out

February 14th, 2019 Posted by Best Practices, collaboration, Communication, Data, Desktop, Devices, Disaster, Hackers, Managed Service Provider, Security, Services, Windows 7 0 thoughts on “Windows 7 & Windows Server 2008 r2 Are On Their Way Out”

All good things come to an end, and that includes operating systems. This time around it’s Windows 7 and Windows Server 2008 r2. As of January 14, 2020, Microsoft will no longer be providing security updates for these systems. This means that any devices running on these operating systems will become vulnerable to security threats after January 14, 2020.

What You Can Do

We encourage you to begin planning for the upgrade of these devices to a newer, more secure operating system. The sooner you start this process, the easier it will be to ensure that you can:

  1. Have time to determine the most beneficial IT solutions for your business.
  2. Work in the transition period during a more convenient time for you and your staff.
  3. Plan for the expense of the upgrade.

What You Don’t Want to Do

Put it off until the last minute. Something this vital to your business operations and security isn’t something you want to rush or push to the side.

We’re Happy to Help

Here at Think our engineers are ready to help you find the best IT solutions for your business. And with their extensive experience and knowledge, they can help make the transition as smooth and convenient as possible for your business and your staff. To schedule a consultation with a Think engineer, contact us today.

For more information from Microsoft, you can read their information page here.

Phishing

How to Avoid a Phishing Attack

July 10th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 2 thoughts on “How to Avoid a Phishing Attack”

90% of Data Breaches Involve a Phishing Attack

First things first – what is phishing? Phishing is an email technique used to fraudulently obtain sensitive information. Phishing emails are designed to look like they’re from a brand or institution you trust. They typically prompt you to download malware (malicious software), click on a link that redirects you to a malicious website or enter personal information. This can enable hackers to steal your identity, breach your employer’s systems, and more. The best way to defend yourself against phishing attacks is to identify phony emails before you click on them.

5 Tips for Identifying Phishing Emails

  1. Who’s the real sender? – Make sure the organization’s name in the “From” field matches the address between the brackets. Watch out for addresses that contain typos in the organization name (think amaz0n.com).
    Phishing - Who's the real sender?
  2. Check the salutation – If you do business with an organization, the first line of the email should contain your name. Don’t trust impersonal introductions like “Dear Customer.”
    Phishing - Check the salutation
  3. Use your mouse hover – Hover over an email link to see the full URL it will direct you to. Do not click the link – just hover. If the address isn’t where you’d expect it to go, don’t click it. Check all the links – if the URLs are all the same, it’s likely a phishing email.
    Phishing - Who's the real sender?
  4. What’s in the footer? – The footer of any legitimate email should contain, at minimum, a physical address for the brand or institution and an unsubscribe button. If either of these items are missing, it’s probably fake.
    Phishing - What's in the footer?
  5. Look for other content clues – Does the content have spelling and grammar errors, ask for personal or sensitive information, convey a high sense of urgency and/or privacy, offer incentives through threat or reward, or contain links or attachments? These are all clues pointing toward a phishing email.

When in Doubt, Delete

If something seems off, delete the email. If it’s not fake, the sender will contact you another way or send the message again.

We Can Help…

Think Network Technologies offers IT Consulting services to can help your organization keep systems and information secure. For more information about this topic and how we can support your business, contact us.

Source: Webroot Inc.

Server

Rising Temperatures, Rising Server Threats

June 13th, 2018 Posted by Best Practices, Cloud, Communication, Devices, Internet, Security 0 thoughts on “Rising Temperatures, Rising Server Threats”

Why is it important to monitor server room temperatures?

With temperatures on the rise, server threats also increase. When servers overheat they can shut down. Whether you’re running a huge data center or a server room with just a few servers it is important to monitor room temperature to prevent downtime, loss of productivity and ultimately loss of revenue for your business.

Monitoring your servers’ temperature information is a starting point. However, monitoring the room temperature is a more proactive approach and will add another layer of security to ensure your server never reaches high temperatures. Monitoring the room temperature will provide an early indication if something is wrong, so you have enough time to react early and avoid serious problems.

5 benefits of monitoring server room temperature

  1. Prevent downtime – Temperature monitoring sensors and software will allow you to configure alerts that notify key personnel via email or text message if and when temperatures reach predefined thresholds so that someone can take action. Excessive temperature is one of the leading causes for having to replace hardware, and in most cases, it is easily prevented.
  2. Ensure efficient airflow inlet and exhaust – Placing temperature sensors on the front and back of your server racks will allow you to measure the temperature of the air going in and coming out of your servers. This is important to know to make sure cold airflow is not being mixed with hot air circulating in the room, as well as to ensure hot air exhaust from your servers is within the proper ranges. Airflow sensors can monitor the presence of airflow into your server room and will alert you if it stops.
  3. Reduce power consumption and increase energy efficiency – If you are actively monitoring the temperature in your server room, you should be able to identify trends and baselines. This data should indicate if your AC unit is able to keep up with the load and if there are cost savings to be had. Many times, room temperature will be set lower than necessary to compensate for not knowing exactly how effectively your servers are being cooled.
  4. Server room planning and scaling – Using the data collected from your temperature monitoring sensors, you will have insight into the cooling loads and airflow distribution of your current layout. You can use these insights to plan for the additional heat load of adding new equipment and how to maintain a proper layout for best airflow.
  5. Extend the life of your equipment – Last but not least, maintaining the proper server room temperature range will help extend the lifespan of your equipment by preventing excessive temperatures going unnoticed and causing unnecessary wear on your equipment. Short spikes of excessive temperatures can reduce reliability and can lead to hardware failure months later.

How do you monitor your server room temperature?

There are many vendors that offer physical sensors for measuring not only temperature, but also humidity, power, flooding and more. Think Network Technologies can help your business implement a server temperature monitoring solution. Contact us today to learn more.

Sources: enviromon.net, Paessler Blog

compliance security

Security and Compliance Solutions

January 24th, 2018 Posted by Best Practices, Cloud, Phone 0 thoughts on “Security and Compliance Solutions”

Solutions for Law Firms and Legal Service Providers

Think’s cloud services (T-Cloud) deliver essential IT services that maximize cost-efficiency and productivity for your team while offering the highest levels of privacy and security to protect your firm’s clients.

law firm IT services Audited security controls including SOC 2 Type II Mobile device management to protect data Admin tools to streamline IT management and security Reliability and support with a 99.999% uptime guarantee

Legal services firms are under intense pressure to offer services that are innovative and agile in the face of tough competition. Clients expect superlative responsiveness, efficiency, and cost-effectiveness. Our Compliance and Security plan includes high security email, file sharing, and web application security tools that increase productivity, project a high degree of technical competence, and conform to the security or regulatory requirements of clients.

Start with our Compliance and Security Plan

Our Compliance and Security plan services include security and privacy controls to protect attorney-client confidentiality and help to support client industry regulations, including finance and healthcare.

hosted exchangeHosted Exchange
Get business-grade, fully mobile email, calendar, and contacts for your attorneys and staff.

hosted emailEmail Protection
Tools that help you eliminate spam and viruses before they reach your users’ inboxes. Includes advanced spam and virus protection, company-wide white and black lists, and 24/7 threat monitoring.

ConnectID® single sign-on and identity management
Provide secure, easy-to-manage access to your web–based calendaring and docketing, conflict checking, document management, and legal research applications. Secure your cloud apps with 2FA, the strongest industry-standard authentication protocol.

pc backup servicePC Backup
Make sure your staff can recover quickly from hard drive failures and lost or stolen laptops.

email encryptionEmail Encryption
Protect against data leaks by automatically encrypting email containing privileged client information. Enforce compliance based on policies and rules that you define.

email archiving serviceEmail Archiving
Archive your email correspondence automatically and securely with encryption. Get tamper-proof, searchable records for auditing, compliance, and internal governance purposes.

share sync cloud serviceShareSync® file sync and share
Access and collaborate securely on discovery, client, and project files from anywhere, on any device, with at-rest and in-transit encryption. Manage research and discovery files and folders for staff and clients with strict access controls, even in a virtual office environment.

Add These Services to Enhance Your Solution

business phone serviceHosted PBX
Experience enterprise-grade phone service with conference calling and automatic call forwarding. Use the softphone mobile app to dial from a mobile device as if you were sitting at your desk.

business cloud serviceShareSync® 10GB Capacity
With upgraded storage, you will not need to worry about running out of room, whether you’re gathering large documents for discovery, or maintaining a library of research or case files.

Skype® for Business Enterprise
Instantly convert a chat into a conversation or video for richer, more productive project discussions. Share screens to collaborate quickly on proposals.

Security and Reliability that go Above and Beyond the Competition

IT security servicePrivacy and security to support confidential attorney-client communications.
• Annual SOC 2 Type II audits.
• A dedicated, full-time technical staff certified in information security.
• Full coverage of all aspects of security, including log and event monitoring, incident response, managing intrusion protection systems (both host and network), perimeter defense, service and architecture testing, and source code reviews.

uptime guaranteeReliability and support you can count on.
• With the T-Cloud 99.999% uptime guarantee, you can access your cloud services when needed, staying connected and productive.
• Receive 24/7 phone and chat support any time you need expert help.

IT admin toolsAdmin tools to streamline IT management and security.
• Centralized control over users and services, with granular configurability.
• Administrators can quickly provision,
de-provision and configure security controls, and delegate
setup and management to non-specialized staff.
• Single sign-on technology that comes with all Think’s applications safeguards sensitive financial and customer data and web-based applications.

business mobile device managementMobile device management and security.
• Purposefully built to protect data wherever it is accessed.
• Our email system includes mobile security controls and policy enforcement for the administrator, including remote wipe for employees with mobile devices.

Get started protecting your firm and your clients with strong compliance and security solutions. Contact Think to begin the conversation.

business email phone encryption

Encryption for Email and Phone Security

January 4th, 2018 Posted by Best Practices, Cloud, Communication, VoIP 0 thoughts on “Encryption for Email and Phone Security”

To Encrypt or Not to Encrypt:

What is email encryption? Why would you use it? What about security for your business phones? Are you protecting sensitive data?

Today I want to jump into a topic that most of Think’s competitors seem to be missing. I walk into businesses every day that are not taking the necessary steps to protect patient, client, customer, and employee information. Email encryption is a simple a la cart service that Think Network Technologies provides.

HIPAA, PCI Compliance, and Email Encryption

Why does it take the urgency of regulatory requirements (HIPAA Compliance, PCI Compliance, or other laws) to get a company to purchase a product that is a socially and ethically responsible business practice? Encrypted communication should be a standard piece of every company’s infrastructure in 2018.

This topic came to light for me recently when I had a lawyer I was working with on a project send me an email. It was addressed from johnsmith@gmail.com. (Names have been changed to conserve the privacy of individuals in this story.) I was in disbelief and appalled that an attorney was utilizing a Gmail account, so I decided to look into whether or not it was even legal.

What I found was that it does not comply with the new American Bar Association guidelines, and in some cases can actually be a breach of attorney-client confidentiality. Take a moment to consider your own methods. How do you handle potentially sensitive information? Are you sending personal health information over an insecure connection? Are your client phone calls secure?

encryption email phoneVOIP and Phone Encryption

The key to ensuring secure voice communication is to use VOIP (Voice Over Internet Protocol). Even using VOIP it is very important to understand the difference between transport encryption, and end to end encryption. Popular services like Skype and Google Voice can’t guarantee compliance and privacy. They may be cheap and easy to use, but you need to consider the consequences of having those communications intercepted. Would the cost of a privacy breach be worth the “convenience” of using a free service?

The Electronic Frontier Foundation has created a simple and short guide detailing secure communications. You can read the details here. No time for that? It’s okay, because we have you covered.

Secure Communications Solutions

Think Network Technologies has a full suite of cost-effective solutions for health care providers, legal firms, manufacturing, financial organizations, and many other companies who are mandated to utilize encrypted communications. We also have options for our clients who want to be responsible when sending client, employee, and confidential information via email. Let Think Network Technologies secure your communications today with our Secure Communications Suite of products.

Get in Touch!

Are you not sure whether you are in compliance? Are you interested in an audit of your business practices? Call or email today for a consultation.

How Secure Is Your BYOD Policy?

August 8th, 2017 Posted by Best Practices, byod, Data, Devices, Networks, Newsletters, Phone, Security, Staff 0 thoughts on “How Secure Is Your BYOD Policy?”

It only takes one unsecured device that’s plugged into your network to lead to a network breach. That’s why it’s so important to have a bring your own device (BYOD) policy.

BYOD has its pros and cons, and organizations that already have a policy in place or are contemplating implementing one need to tick some boxes to make sure it runs as smoothly and securely as possible.

 

The Upside

BYOD has obvious advantages for staff who like the convenience and familiarity of working on their own devices. It could also lead to productivity gains, as users have an affinity for their own personal devices and how they use them.

Personal laptops, tablets and smartphones are usually more cutting edge, given that companies often don’t update their desktops for years on end. BYOD also allows staff to carry only one or two devices around with them, rather than different ones for work and personal use.

BYOD policies can save organizations money, as they don’t have to spend as much on their IT hardware while allowing workers increased mobility.

 

The Downside

Having said that, BYOD practices are not free from security concerns. More and more mobile devices provide greater scope for ways to breach a company’s IT infrastructure.

Some employees may not be as stringent as they should be about the information they bring home that could be highly sensitive or confidential. Once they take it out of the office, there’s nothing stopping them from sharing it across devices, networks, emails or even showing it to their family and friends.

Disgruntled employees about to walk out the door pose an even bigger threat. If they are leaving to work for a competitor, BYOD makes it easier for them to take intellectual property with them. Alternatively, if an employee uses a smartphone to access the company network then loses it or it’s stolen, an unauthorized person could retrieve unsecured data on the device. Staff can also sell their devices or give them away and forget to wipe company data beforehand.

 

And the Essentials

A good BYOD policy should contain two critical components: an application or software program for managing the devices connected to your organization’s networks, and a written agreement that clearly states the responsibilities of employers and staff.

For example, IT departments wishing to monitor the use of personal devices must ensure that they only monitor activities that access company information.

Software developers and device manufacturers are constantly releasing security patches and updates for threats such as viruses and malware. BYOD policies should have the necessary processes in place to automatically apply those patches across all the agreed BYOD devices.

Additionally, organizations can simplify the whole process by limiting the number or make of devices allowed in their BYOD programs and the systems they have to support. Supporting a broad range of devices could become an administrative nightmare.

The IT department should also have permission to remotely wipe the device if it’s lost, the employee leaves or if it detects a data breach, virus or any other threat to its infrastructure.

BYOD should satisfy employees and management alike, as long as there’s a clear understanding of everyone’s responsibilities. Before settling on the best BYOD policy for your organization, it’s worth getting input from HR, IT, finance, legal and anyone else who has a stake in the matter.

 

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Technology Disposition

January 17th, 2017 Posted by Best Practices, Community, Data, Desktop, Devices, E-Waste, Newsletters, Operating System, Security, Services 0 thoughts on “Technology Disposition”

Donate or Recycle Your Electronics, But Don’t Throw it Away!

Donating and recycling your electronics is the best way to help the environment by conserving resources and natural materials. It is critical to make sure you are donating and/or recycling electronics safely and correctly.

Computers, printers and other electronics contain a variety of unsafe and toxic substances, that when discarded improperly can pose risks to our health and the environment. These products are also made from valuable resources and materials, including metals, plastics, and glass, all of which require energy to mine and manufacture. Donating or recycling consumer electronics conserves our natural resources and avoids air and water pollution, as well as greenhouse gas emissions.

Contribute your old computers and phones to groups that will fix and clean them and put them back into circulation. Even the oldest computer—something you consider the most obsolete of digital dinosaurs—can probably be used by someone.

 

While it’s great to recycle parts, your old and unwanted gadgets can be incredibly useful to someone else. These non-profits and programs work to refurbish and deliver cellphones and other electronics to those in need.

Call2Recycle: Call2Recycle program is a free and easy way for earth-conscious folks like yourself to get rid of your old batteries and cellphones.

National Coalition Against Domestic Violence: You can donate your unwanted cellphones to the NCADV, which partners with Cellular Recycler for the collection of used electronics and uses proceeds from refurbished gadgets to help stop domestic violence.

Many local non-profits would be happy to take your old computers, devices, printers and other electronics. The La Plata County Humane Society Thrift Store is one of those non-profits that would gladly take your electronics off your hands.

Another concern is the destruction of all data on any hardware you are disposing. Obviously you do not want any of your data or your customer’s data getting in the wrong hands. Think can wipe sensitive data from your hardware before you choose to donate or recycle it.

Where to Recycle Your Old Electronics?

Can you bring your electronics to any recycling facility? Before you do, you should check to see if your recycling facility has a E-Steward Certified as well as IS14001 Certified because that means they comply with e-waste recycling standards as well as being environmentally responsible. The Durango Recycling Center holds both of those certificates and that’s where Think Network Technologies recycles all of their computers, monitors, devices and other electronics. They only accept e-waste on Saturdays or if you’re a business you have to call to schedule a drop-off.

If you are a client of Think and located within city limits we will pick up your recyclables. We’ll make all the arrangements for you. Please call us at (970)247-1885 if you would like to hear our prices.

Here are some more articles and websites about recycling e-waste.

EPA (Environmental Protection Agency)

Mashable – 4 Ways to Recycle Your Old Gadgets

PC Mag – How to Recycle Your Technology

E-Stewards for Recyclers

Durango Recycling Center

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

10 trends to watch for in 2017

10 trends to watch for in 2017

January 5th, 2017 Posted by Best Practices, Data, Desktop, Devices, Newsletters, Operating System, Security, Services 0 thoughts on “10 trends to watch for in 2017”

Smart machines are getting smarter, and a new IT reality has dawned.

The machines are rising. Artificial intelligence (AI) has proven it’ll be no fun at a party, having taken down the world’s best player at the difficult strategy game Go. If that makes you anxious, good news: virtual reality (VR) is being used by doctors to help patients with anxiety. We live in interesting times, so what’s going to be especially interesting to watch this year?

so what’s going to be especially interesting to watch this year

So what’s going to be especially interesting to watch this year

 

1. Security concerns increase

The only novelty in this prediction is where the danger is coming from: increased reliance on IoT means more breaches of security and privacy.

2. AI and consumer experience

Even big players are only scratching the surface when it comes to using machine-learning to improve customer service. Look for:

  • Much more personalized customer interaction
  • More social presence
  • Immediate answers to consumer queries

3. Better cross-browser compatibility

Less sexy than AI but fundamental, W3C (world wide web consortium) specification, and (maybe) better JavaScript libraries could see cross-browser compatibility issues become a thing of the past. Good news if your business does business online.

4. Increased VR activity

Who doesn’t want to be in VR when it’s new and shiny and has applications as far-ranging as therapy and gaming? Microsoft, Facebook, and Google have put a waterfall of money into VR, but it’s the startups you want to watch. Will VR be the cornerstone of the next Microsoft or Apple?

5. Mobile grows

By 2020, 70% of the world’s population will have a smartphone. If you’re still asking mobile browsers to pinch and squeeze, it’s time to act.

By 2020, 70% of the world’s population will have a smartphone

By 2020, 70% of the world’s population will have a smartphone

6. No more money for IT

You can watch the rise of AI and VR, but this might not be the year you get to invest in them. Spiceworks, a network of IT professionals, -has surveyed the IT world and confirmed that IT budgets will be flat (or down) in 2017, and they’re not expecting to take on new employees, either.

7. Laptops eating desktops’ narrow lead

Consumers have long bought more laptops than desktops. Now, companies are budgeting more for laptops, bringing the budgets for both to par according to Spiceworks’ network data and surveys.

8. Windows 10 business adoption to exceed 70%

Over 10 weeks in 2015, 11% of organizations said yes to Microsoft’s offer of a free Windows 10 upgrade. By halfway through last year, 40% were onboard. The trend line suggests 73% of organizations will be using Windows 10 by July.

9. “Cloud first” strategies will drive adoption of Windows Server 2016

Windows Server 2016 offers improved virtualization features, better security, more advanced software-defined storage functionality, and better integration with popular cloud services. That will drive adoption, although it won’t be until Windows Server 2008 reaches end-of-life in 2020 that its successor will dominate.

10. Don’t hold your breath for OS upgrades

Flat budgets will mean delays in upgrading operating systems. More than half of businesses are running at least one copy of Windows XP somewhere, despite it reaching end-of-life in 2014.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

Start the year on a secure note

Start the Year on a Secure Note

January 5th, 2017 Posted by Best Practices, Data, Desktop, Devices, Newsletters, Operating System, Security, Services 0 thoughts on “Start the Year on a Secure Note”

9 hardware and software vulnerabilities you should address now.

Research from Spiceworks, a network of IT professionals, highlighted more than 70% of respondents rated security as their top concern for 2017. Here are nine things that should be keeping you up at night…

70% of respondents rated security as their top concern

70% of respondents rated security as their top concern

 

Aging hardware

Sure, software is the greater risk, but many hardware vulnerabilities are software-based. Older equipment is often without built-in security features like:

  • Unified Extensible Firmware Interface (UEFI) with Secure Boot
  • Self-healing basic input/output system (BIOS)
  • Pre-boot authentication (PBA)
  • Self-encrypting drives

That’s why you should be auditing and planning to remove:

  • Computers with conventional BIOS, because they can’t run Secure Boot, which helps to prevent malware loading during the boot process.
  • Computers without pre-boot authentication or a trusted platform module (TPM), which stop the operating system from loading until the user enters authentication information, such as a password.
  • Old routers, which can have serious vulnerabilities.
  • Drives that don’t self-encrypt. Self-encrypting drives (SEDs) need a password (in addition to the OS login password), and the technology automatically encrypts and decrypts data on the drive.

On a side note, old drives leave you vulnerable in another way: you could lose data when they fail, which they will.

you could lose data when they fail, which they will

You could lose data when they fail, which they will

Tired software

Getting your hardware straight will almost always involve spending money, but fixing up software could be as simple as running those free updates you never got around to. Here’s what to look at:

  • Unpatched or out-of-date operating systems: Windows XP has been beyond its support period for nearly three years but is still running all over the world despite there being no updates, no technical assistance, and limited efficacy with anti-virus. And old operating systems always have fewer security features than new ones.
  • Unpatched or out-of-date productivity software: It’s highly risky to run unpatched versions of Microsoft Office, especially older versions like Office 2002, Office 2003, and Office 2007. They can give a hacker access to the rest of a system, with particularly catastrophic consequences if the user has administrative privileges.
  • Legacy custom applications: If running an old version of Office is a risk, imagine the danger of running legacy custom software, particularly if you’re no longer doing business with the vendor (or the vendor is no longer in business). When your legacy software was being coded, the vendor probably wasn’t thinking of the sort of security attacks that are common today.
  • Unpatched web browsers: No browser is entirely free of security vulnerabilities. Common vulnerabilities include URL spoofing, cross-site scripting, injection attacks, exploitable viruses, buffer overflow, ActiveX exploits, and many more. Always, always run the most recent version.
  • Out-of-date plug-ins: Everybody loves a plug-in, but they have a high potential for disaster, especially if you’re not running the latest versions.

Let the Think specialists help you and your company! Please contact our sales team at sales@thinknettech.com if you would like our recommendations or a quote.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

© 2018 Think Network Technologies, LLC. All rights reserved.