Posts tagged "thinkpress"

Speed Up Your Browser

Speed Up Your Browser with 5 Simple Steps

December 11th, 2018 Posted by Best Practices, Cloud, Data, Desktop, Internet, Managed Service Provider, Services 0 thoughts on “Speed Up Your Browser with 5 Simple Steps”

Is Your Browser Running Slow?

There’s nothing worse than a website that won’t load. Over time, high volumes of content can cause your Internet browser to slow down. However, with a bit of maintenance, it’s easy to ensure your browser stays speedy for longer.

The following tips apply across all major Internet browsers, including but not limited to Google Chrome, Mozilla Firefox and Internet Explorer.

5 Tips to Speed Up Your Browser

1. Remove unused extensions – Too many plug-ins and extensions can slow down your browser. They take up system resources and can even cause bugs and crashes. Extensions can add useful features to your browser, but it’s a good idea to occasionally remove the ones you no longer use or need.

For extensions you need, make sure they’re regularly updated. Your browser should automatically handle updates this, but it’s worth double-checking. Just like keeping the browser itself updated, ensuring you’re running the latest versions of your add-ons keeps them bug-free and running smoothly.

2. Clear your cache and cookies – As you surf the web, your browser keeps records of your files in its cache to speed up your experience. The next time you visit a site, the cached files are already present, so your browser only needs to download the new bits from the web. This means less time waiting, and in general, a faster browsing experience.

However, it is recommended to occasionally cear out your cache and start again. Your browser should automatically manage the cache, but it can get unwieldy and cause the occasional bug or glitch. If you want to keep your browsing speed as good as new, then wipe the slate clean every few months or so. Afterwards, you might notice a slight slowdown to begin with, as your browser rebuilds the cache, but it should quickly go back to normal.

At the same time you clear your cache, you should clear your cookies as well. Cookies are bits of data that websites record on your machine to identify who you are, where you’re from, your website preferences, etc. Usually these cookies are harmless and useful, but a regular purge will quickly get rid of any corrupt or unnecessary ones.

3. Uninstall and reinstall your browser – Removing unused extensions and clearing the cache/cookies are great tips for stopping browser slowdowns – sort of like returning your car to its original state by erasing all the issues and problems that have built up. Uninstalling and reinstalling your browser is a quick shortcut to do the same job.

Once the old version of your browser is uninstalled, you can reinstall the latest update from the Internet. As well as eliminating any corrupted data caches and unneeded extensions, this will make sure that you’re running the most up-to-date version of the software, an important factor in keeping your browser running smoothly. Staying up to date is vital in fixing bugs and blocking security threats and most modern browsers download updates automatically.

4. Manage your tabs – Managing your open tabs more efficiently will help you browse faster. The more tabs you have open, the slower your browser will run. For faster browsing, keep the number of open tabs to a minimum and resist the urge to have a dozen tabs open at once. If you need to keep track of several sites to return to later, you can bookmark the pages for later. Pro tip: Set up a “Temporary” folder within your bookmarks for this scenario.

5. Install a cleanup tool – Some add-ons and apps can help you keep your browser running at top speed. Most of these tools handle the cleaning jobs we covered above, like tidying up cached files that you don’t need any more. It’s worth researching and testing a couple to see if you notice any speed increases. There are also desktop programs to clean up browser clutter.

Still Need Help?

If your browser is still slow after completing the above steps, there might be another issue lurking behind the scenes. Think’s engineers are highly trained and certified to assist with all of your technology needs. Contact us for additional support!

Source: Popular Science

ColoradoBiz Top 250 Private Companies 2018

Think Ranked Among Top 250 Private Companies in Colorado

December 10th, 2018 Posted by Awards, Best Practices, Staff 0 thoughts on “Think Ranked Among Top 250 Private Companies in Colorado”

Think Network Technologies has been named one of the Top 250 Private Companies on ColoradoBiz magazine’s 2018 list, coming in at number 223. Think was last recognized on the Top 250 Private Companies list in 2015. We are proud to represent the Four Corners and the IT sector, and are grateful to our customers and employees for making our success possible.

Think Network Technologies’ commitment to customer service combined with technical expertise and product knowledge allow us to deliver the technology solutions our clients need. We invest in training and certification not only so that we can provide our clients with the best service possible, but also because we care about our employees. We have been honored with CRN’s Tech Elite 250 award for two consecutive years, a list recognizing North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to company size. Top of the line training allows us to provide top of the line service. We have proven our ability to streamline IT and telecom solutions, improving efficiency and ultimately saving money for our clients. Our 2018 receipt of the Channel Partners 360⁰ Award, an exclusive honor received by only 25 U.S. companies, is testament that we use technology solutions to create business value for our customers.

Think has received various additional awards and recognition for our commitment to excellence that can be viewed here.

Secure Shopping

Stay Secure When Shopping Online

November 14th, 2018 Posted by Cloud, Data, Desktop, Hackers, Hosted Services, Managed Service Provider, Security, Services 2 thoughts on “Stay Secure When Shopping Online”

9 Tips for Secure Shopping Online

As we approach the holiday season, we encourage extra mindfulness when it comes to online shopping.

There are some simple precautions that will make your online purchases more secure, including using reputable third-party pay services (like PayPal) whenever possible, always logging out of sites after you’ve completed a purchase and selecting one credit card for all online purchases to limit exposure.

Here are 9 tips for staying safe online, so you can start checking off items on that holiday shopping list:

1. Use familiar/trusted websites – Start at a trusted site rather than shopping with a search engine. Search results lead you astray, especially when you drift past the first few pages of links. If you know the site, chances are it’s less likely to be a rip off. Beware of misspellings or sites using a different top-level domain (.net instead of .com, for example).

2. Look for the padlock icon – Never buy anything from a site that doesn’t have SSL (secure sockets layer) encryption installed. You’ll know if the site has SSL because the URL for the site will start with “HTTPS” instead of just “HTTP”. An icon of a locked padlock will appear, typically in the status bar at the bottom of your web browser, or right next to the URL in the address bar, depending on your browser. Never give anyone your credit card over email.

3. Don’t provide all of your info– No online shopping store needs your social security number or your birthday to do business. However, combined with your credit card number, your social security number and other identification numbers can do a lot of damage. When possible, default to giving the least amount of information.

4. Check your bank statements – Don’t wait for your bill to come at the end of the month. Go online regularly during the holiday season to review statements for your credit card, debit card, and checking accounts. Make sure you don’t see any fraudulent charges. If you do see something wrong, pick up the phone to address the matter quickly. In the case of credit cards, pay the bill only once you know all your charges are accurate.

5. Protect your devices – You can protect against malware with regular updates to your operating system, browsers and software. Software companies add security updates along with every upgrade released. Installing updates as soon as they are released can help you better protect your devices against malware. You should also run a reputable, anti-virus product on your home PC or laptop. This will help prevent your device from becoming infected with malware.

6. Use strong passwords – It’s always important to utilize strong passwords, but it’s never more important than when banking and shopping online. Make sure your passwords are unique for each website, contain a healthy mix of letters, numbers and symbols when allowed. Passwords should not be easy to guess (like your last name or birthday). Use a password protected spreadsheet or secure app to store your passwords. When possible, set up multi-factor authentication for additional security.

7. Avoid shopping on public devices – It should go without saying that it’s a bad idea to use a public computer to make purchases. If you must, remember to log out every time you use a public computer, even if you were just checking email. Avoid entering your credit card and expiration date on websites in public, even if you’re using your own devices. By doing so you’re giving onlookers the chance to steal your information. At the very least, double check no one is looking and be as discreet as possible.

Additionally, don’t use publicly available charging cords or USB ports to charge your devices. Publicly available power outlets are generally fine, but the cords or ports could be used to deliver malware to your phone.

8. Avoid shopping via public Wi-Fi – Avoid using public Wi-Fi hotspots – like the ones at coffee shops, airports, hotels, etc., for online shopping. If you do use a public Wi-Fi hotspot, be sure to use a Virtual Private Network (VPN) so others cannot intercept your communications. As an alternative, stick to the mobile network and create a personal Wi-Fi hotspot with your phone.

9. Keep an eye out for obvious scams – Stick to the source when you buy gift cards; scammers like to auction off gift cards on sites like eBay with little or no funds on them. Some scams offer of a free product with purchase, like an iPad or even holiday job offers. Many of these “offers” will surface on social media or phishing emails. Be wary if you get a message from friend claiming he or she has been robbed, especially a friend overseas looking for money to be wire transferred, unless you absolutely can confirm it by talking to him or her personally. Skepticism in most cases can go a long way toward saving you from a stolen card number.

Trust Your Judgement

If you’re shopping online and something seems fishy, it probably is. Trust your judgement or ask for a second opinion before submitting your credit card or other personally identifying information online. No purchase, no matter how great of a deal, is worth the risk of identity theft.

While following these guidelines won’t completely eliminate the chance of becoming a victim of cybercrime, they can help you avoid risky situations and protect yourself against identity theft.

Happy Shopping!

 

Sources: PC Mag & ColoradoBiz

vCIO

What Does a vCIO Do Anyway?

November 14th, 2018 Posted by Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “What Does a vCIO Do Anyway?”

vCIO, Explained

Despite the title, a vCIO, or Virtual Chief Information Officer, is not virtual at all.

For many Managed Service Providers (MSPs), like Think Network Technologies, a vCIO is somewhat of a figurehead. A vCIO serves as an outsourced Chief Information Officer for organizations that don’t have a full-time CIO on staff. The vCIO is an off-site business position.

But What Does a vCIO Do?

This service offers key insight into the development of business strategies as they pertain to technology. That means they spend a lot of time in the field, digging around customers’ wiring crouching under desks and testing their clients’ technology infrastructures.

A vCIO should perform the same functions as a conventional CIO – collaborating with and advising clients’ IT departments. This includes formulating strategic IT goals, planning the IT budget, analyzing and reworking business processes and facilitating technology changes.

Working inside a company’s infrastructure begins with a network assessment of an organization’s current technology and limitations, ultimately building a roadmap to a more productive future. Software analysis tools and old-fashioned legwork are utilized to perform the network assessment.

Some tools a vCIO uses are optional, but having the expertise and knowledge to address your technology needs is not.

Does My Company Need a vCIO?

What role does technology play in your business? – Do you know what applications your employees and/or customers depend on? Do you know what your security requirements are? Do you know what data access needs you have?

What are your company’s growth plans? – Does your company have a growth plan to help anticipate your future technology needs?

What are your business objectives? ­– Do you know your company’s long and short-term business goals, including what technology you will need to reach those goals?

If you don’t know or are unclear about any of the answers to the questions above, you probably need a vCIO. Generally speaking, any organization thinking about the big picture of the company needs a vCIO.

Get in Touch

Think’s vCIO service aligns your organization’s IT strategy with overall objectives and provides the best technology solutions to maximize efficiency. Contact us to learn more.

Credit: Gordon Flesch Company, Inc.

IT Audit

How to Run a Simple IT Audit

November 14th, 2018 Posted by Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “How to Run a Simple IT Audit”

Conduct an IT Audit in 6 Easy Steps

You can’t manage an IT system effectively if you don’t know what it’s made of. It’s easy to lose sight of what makes up your IT ecosystem, especially if IT is not your only responsibility at work. Keeping track of IT systems is increasingly more difficult with emerging technologies.

In order to develop an IT strategy for the future, it’s important to take an occasional pulse on your existing IT systems. Here are six easy steps to perform a simple IT audit:

1. Start with the hardware

Bring your own device policies have made it easier to lose track of the hardware being used in the business. Some policies don’t just allow employees to bring in personal devices; they allow those with access to departmental budgets to purchase hardware without running it through IT.

Your accounts department should be able to give you the official list of what hardware has been purchased. But other purchases might not have been given an “IT” code when run through accounts.

Now is a good time to survey department heads to see what’s actually in use. You’re likely in for some surprises. You’ll likely find some employees working on devices they own and others working on devices the company bought.

2. Good records make for good decisions

You can track the findings in a basic spreadsheet, but it’s better to use a dedicated desktop management app.

Knowing what’s actually happening will help you determine if there are better ways to pay for the technology your company needs.

3. Check use-by dates

Keep an eye out for PCs, servers, printers, and other office hardware that’s close to end-of-life or end-of-lease. Work with your account department and suppliers to put together a plan for phasing out old equipment and phasing in new equipment.

4. Software audit

Find out what software is running on your machines – and which machines it’s running on. Ask what budget was used to buy it. Again, this information will help you make better decisions in the future.

Remember, software can also have a use-by date if the vendor isn’t going to support it. And software as a service (SaaS) subscriptions can also expire.

Find out if employees are subscribing to their own cloud solutions using corporate funds. Even when those services are paid for on corporate credit cards, they can slip through accounting because they aren’t assigned to the right budget.

5. Security focus

Security software, like antivirus apps, virtual private network solutions, and encryption, needs special attention. Check to make sure your license or subscription has not expired – you don’t want to find your license or subscription has lapsed when it’s key to your defenses.

6. Finish with a walk

Just by walking the floors, you’ll be amazed at what hardware and software use you spot that wasn’t picked up in any other process. Take inventory of your findings.

Put Your Audit into Action

So you’ve completed an IT audit. Now what? Use your findings to determine which technologies need to be replaced, renewed or recycled.

Make sure purchases for new hardware and/or software are prioritized and worked into your company’s IT budget. Schedule time to conduct a simple IT audit at least once a year to continue to plan for the future.

Think Can Help

An in-depth, professional analysis of your company’s IT systems can assist in driving future technology goals for your business. Think Network Technologies offers a variety of IT solutions and services, including professional IT audits.

For more information about how we can support your business, contact us.

Butterfly Code Mural

Think Spearheads Mural to Beautify North Main

October 31st, 2018 Posted by Cloud, Community, Managed Service Provider, Press Release 0 thoughts on “Think Spearheads Mural to Beautify North Main”

Think partnered with artist Mariah Kaminsky and Mountain Middle School students to complete a mural, titled “Butterfly Code”, on the alley wall behind Think at 3067 Main Avenue in Durango in an effort to beautify the North Main neighborhood. Think was awarded the City of Durango’s Durango Creates! grant in September, which provided funding for the mural.

The mural, which spans the entire alley-facing wall of Think’s headquarters, measuring roughly 20’x25’, features two butterflies in a blue sky with clouds. The butterflies represent change. The wings of one butterfly depict circuit board patterns and the wings of the other butterfly display binary code, long strings of zeros and ones. The clouds symbolize “cloud technology” and the movement toward cloud technology in the future.

Butterfly Code Mural

“The imagery shows the harmony between technology and nature – a nod to our business as a technology company and our commitment to the environment and community. While the two can seem to be at odds with one another, Think promotes getting outdoors and a healthy work-life balance,” said Melissa Glick, Think CEO.

The “Butterfly Code” mural was completed October 26th and an informal unveiling celebration took place October 30th with the City of Durango Public Art Commission, Mariah Kaminsky, Mountain Middle School, and other businesses and community members in the North Main neighborhood.

Butterfly Code Mural

“The alley sees significant pedestrian traffic, including many students from Mountain Middle School who will enjoy the artwork. We hope the mural will bring more visitors to North Main and boost the economy as a result. We are thrilled to participate in cleaning up the neighborhood,” Glick said.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

Photo credit: Mariah Kaminsky & Mountain Middle School

Network Security

Layer Your Security Like a Bean Dip

October 11th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Layer Your Security Like a Bean Dip”

What is Network Security?

Network security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network and targets a variety of threats to stop them from entering or spreading on your network.

The Layered Approach

Like a bean dip, your security should be layered. Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but hackers are blocked from carrying out threats.

The layered security approach is a simple concept: the more hoops a hacker has to jump through, the less likely they are to be successful. The trick is to create a layered bean dip with the right consistency so your chip doesn’t break off. In other words, while you want hackers to have a hard time breaking into your systems, you want to keep your security simple and seamless for users.

6 Layers of Security

1) Response Plan – The first layer, the foundation, is the response plan. In the event of a breach, having a clear response plan in place will help ensure that you address all of the necessary pieces of remediation. Without a plan, you are more likely to miss something as you hastily try to patch holes, leaving your company still vulnerable.

2) Monitoring & Alerting – The second layer is monitoring and alerting. Monitors to help ensure complete coverage of a solution and the networks on which it runs and alerts help ensure that system failures and other issues are dealt with quickly. Without monitoring and alerting, you may never know a hacker has infiltrated your system.

3) Data Encryption & User Permissions – The third layer is like the lettuce and tomato – two ingredients that combine to make one layer. Data is most likely the most important piece of your business, so data encryption and user permissions are essential layers of security.

4) Applications – Data lives within applications, so naturally this is the next layer of security. Ensuring access to applications is accurate and limited, in addition to practicing secure coding methods will help protect your application layer.

5) Operating System – Applications are usually accessed from a desktop, laptop, tablet, or mobile device – so it’s important to make sure these devices are secure. Antivirus software, security policies and patching add security to operating systems.

6) Network – The last layer is the network. Setting up firewalls, intrusion detection systems and user authentication technologies are a few ways to protect your network from potential hackers.

The Bottom Line

Layers of security make your network safer. The better you layer your approach, the safer your network will be.

We Can Help

You need to work with someone who is keeping their eye on the shifting technology landscape – it’s worth working with a trusted adviser to navigate the options, especially when money is a consideration.

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can optimize network security and support your business, contact us.

Why Outsource?

Why You Should Outsource Your IT Support

September 13th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “Why You Should Outsource Your IT Support”

Why Outsource?

Virtually everything is connected to data. How your business manages data continues to gain importance – as technologies evolve and become more sophisticated it is imperative for your business to have a strong grasp on its IT strategy. However, for many small to medium sized businesses (SMBs) it is not practical to manage IT efforts in house. There are several key benefits to outsourcing IT support.

7 Reasons to Outsource IT Support

  1. Reduce IT Costs – Qualified, full-time, in-house IT professionals are expensive. The number one reason to outsource your company’s IT support is to lower costs. By outsourcing, you can spend less money on full-time resources and focus your budget on specific IT needs and projects.
  2. Free Up Internal Resources – By outsourcing IT support to a third-party provider, you can free up internal resources allowing them to focus on the growth of the business while your outsourced team focuses on technology.
  3. Compete with Larger Businesses – Resource and budget limitations often prevent SMBs from having an effective, in-house IT team, making it nearly impossible to compete with large businesses that have the budget to maintain their own IT services and systems. By outsourcing your company’s IT to qualified IT professionals, you can create a more even playing field.
  4. Reduce Your Risk – When you shift your IT to a third-party provider, you offload some the infrastructural risk that comes with it. When you share the risk, your company can become more agile, dynamic, and flexible, which will help you deliver a better product/service in the long-run.
  5. Offload Compliance & Security – Outsourced IT support will handle compliance and security tasks, so you won’t have to worry about things like keeping your firewall up to date or whether or not your workstations have been audited for compliance and security. A qualified Managed Service Provider (MSP) will minimize the risks associated with maintaining sensitive data for your business.
  6. Access Top-Level Experts – Most SMBs don’t have the budget to hire a panel of IT experts to guide you through the changing world of big data. When you outsource your IT support, you gain access to highly qualified and certified engineers that will help your company stay competitive.
  7. Get 24/7 Support – Outsourced IT support can provide after-hours, weekend and holiday emergency technical support, taking the stress and responsibility off of your team if something goes wrong. Technology should function effectively 24/7 – working with an outsourced team can provide peace of mind.

Immediate & Long-Term Benefits

By partnering with an IT team, your business can reap immediate and long-term benefits. It’s important to weigh the pros and cons of outsourcing your company’s IT needs. Think of both short term and long-term goals, needs and considerations. However, there are more reasons now than ever to outsource your company’s IT needs.

We Can Help

Think Network Technologies offers a variety of IT solutions and services. For more information about how we can support your business, contact us.

IT Budget

It’s Budget Planning Season

September 13th, 2018 Posted by Cloud, Community, Data, Desktop, Hosted Services, Managed Service Provider, Services, Staff 0 thoughts on “It’s Budget Planning Season”

Q4 is Just Around the Corner

With Q4 just around the corner, it’s time to implement this year’s remaining IT projects and start planning your IT budget for next year.

Now is a good time to communicate and gain consensus for next year’s IT budget and strategy. IT projects are more easily justified at budgeting time when everyone knows their purpose, impact and objectives than if budget season is the first time anyone hears of it.

If you don’t already have an IT strategy, use the budgeting period as an opportunity to develop a strategy that’s presented immediately before your budget. If you have a cohesive and well-conceived plan, the money to execute that plan is less likely to be questioned. Anticipate capabilities that will be affected if you are required to make significant reductions to your IT budget.

Where to Focus Your IT Budget

As you plan for next year, here are 10 budget must-haves for many IT departments:

  1. Extra licensing fees – When new employees come through the doors, it’s important to be ready with the tools for them to get the job done, including extra licensing fees. This should cover productivity software, antivirus/malware (if you run a Windows platform), Exchange licenses (again, if you run a Windows platform), and any other piece of software necessary for business operations.
  2. Emergency hardware replacement – No matter how careful you are, no matter how well you’ve evaluated, deployed and administered your company’s hardware, it will eventually need to be replaced. Hardware replacement can be expensive and it’s important to have an emergency fund wrapped into your budget.
  3. Mobile technology – Mobile technology continues to become increasingly important. You should allocate a portion of your budget to cover mobile, if you haven’t already done so. This might be in the form of covering the cost of devices or data plans.
  4. Upgrades – Software and hardware need to be frequently upgraded. If you’re running outdated versions of your productivity software or outdated hardware, it’s a good idea to consider upgrading. Make sure your IT budget is prepared to upgrade software and hardware when necessary.
  5. Staffing needs – If your business expects to grow so much that you have to expand your IT staff, you will want to be prepared. Think can help with outsourced IT needs to help save money for your business.
  6. Cloud solutions – Cloud solutions can be in the form of a third-party solution or an onsite cloud solution. Either way, you will need room in your budget not only to deploy new cloud solutions, but also to expand existing cloud solutions.
  7. Software – Beyond purchasing updates for existing software, at some point you’re going to need to purchase new software or SaaS (software-as-a-service). New software will ultimately help your staff become more productive.
  8. Training – Technology is constantly evolving and tech standards from five or 10 years ago may no longer be relevant. Proper technology training could be imperative to keeping your company’s data secure.
  9. Data pipe – Who pays for your connection to the internet? Who pays for the failover connection? Who is responsible for the cost when your connection needs an upgrade? The answer to those questions is most likely “Your budget.” If your business depends upon an internet connection, you need a backup, even if it’s significantly slower.
  10. Data protection solution – Your business needs to have a solid, reliable backup solution deployed so that, should disaster strike, you can recover. Even if you happen to roll your own backup, you will still need to ensure that the backup hardware you use is always in working order and that there is a secure location to house the rotating drives.

Use IT or Lose IT

Now is the time to use your IT budget for remaining projects. If you’re not sure where to use your funds, take another look at the list above.

Or get in touch and our expertly trained engineers can discuss the best IT strategy for your business. We’re passionate about helping your business succeed!

ColoradoBiz Top Company Finalist

Think Selected as 1 of 3 Technology Top Company Finalists in Colorado

August 30th, 2018 Posted by Awards, Best Practices, Cloud, Data, Desktop, Hosted Services, Managed Service Provider, Services 0 thoughts on “Think Selected as 1 of 3 Technology Top Company Finalists in Colorado”

Durango, Colo., August 30, 2018 – Think Network Technologies (Think) was recognized as one of three technology finalists on ColoradoBiz magazine’s 2018 Top Company list. The full Top Company finalist list consists of 42 Colorado-based businesses across 14 industries. Think was the only Durango-based finalist in 2018.

ColoradoBiz magazine’s annual Top Company Awards represent statewide businesses that have earned their way to the peak of performance. It’s not about perfection – progress is the name of the game for these companies.

A selection panel of 11 business leaders and community stakeholders convened in mid-June to bring the list of hundreds of applicants down to 42 finalists. Candidates were judged on financial performance, community involvement, outstanding achievement and other intangibles.

One finalist from each of the 14 categories was selected as a winner at the 2018 Top Company Awards, which took place Wednesday, Aug. 29. The 2018 technology category winner was Mobile Solutions.

“It’s a huge honor and achievement for Think to be in the pool with the other finalists. Congratulations to the other two Colorado technology companies that made the list this year – DISH Network and Mobile Solutions. In addition to operational success, our dedication to our employees and the community sets Think apart,” commented Melissa Glick, CEO at Think.

Think Network Technologies is an award-winning IT solutions provider based in Durango, CO and servicing the Four Corners, specializing in managed services, enterprise solutions, cloud solutions, and IT consulting. Since 2003, our local, family-owned business has become the outsourced IT department and trusted adviser for over 100 businesses. With offices throughout the Southwest, Think is strategically positioned to serve the Four Corners region.

For more information about this topic, please email us.

CONTACT US

888.98.THINK
970.247.1885
3067 Main Ave. Durango, CO
101 W. Main St. Farmington, NM
7483 E. Visao Dr. Scottsdale, AZ
5700 Washington St. Denver, CO

JOIN OUR TEAM

Join our team of hard-working, fun-loving, technology experts.

View Careers

CONNECT

FacebookTwitterInstagramLinkedIn

© 2018 Think Network Technologies, LLC. All rights reserved.