Quantcast
Channel: Lewan Technology Blog
Browsing all 107 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

3 Steps to Design an IT Vision and IT Roadmap

If you’ve read Simon Sinek’s book, Start With Why, you’re familiar with the methodology that your organization’s “why” needs to sync with your vision, determining both how and what you do. (Check out...

View Article


Image may be NSFW.
Clik here to view.

How to Select a Managed Security Service Provider

We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run...

View Article


Image may be NSFW.
Clik here to view.

How to Save Presets in Xerox Printer Drivers

Some of the most helpful and most underused features of your Xerox printer are the printer settings you can manage from your computer, also referred to as the Xerox printer driver. Within these...

View Article

Image may be NSFW.
Clik here to view.

The Cost of and How to Prevent a Data Security Breach

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

View Article

Image may be NSFW.
Clik here to view.

3 Reasons to Bring Outsourced Printing In-House with a Digital Press

Business cards, letterhead, brochures, catalogs, labels, banners, postcards...these are all common collaterals that companies need to print to support their employees and market to their customers....

View Article


Image may be NSFW.
Clik here to view.

How to Choose an Identity Management Provider

Guest post by Todd Moore, a Technical Architect at Lewan Technology.We are living in a world where we are facing digital technology disruption in every organization and every industry.Forbes reports...

View Article

Image may be NSFW.
Clik here to view.

Fix: Running Cisco Spark on Citrix XenDesktop w/ Windows Server 2016

Spark is an awesome cloud-based solution from Cisco for meetings, messaging and calling. We use it for internal meetings, presentations and have been setting up for clients. Shiny and new unfortunately...

View Article

Image may be NSFW.
Clik here to view.

What is WannaMine Crypocurrency Mining Malware?

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security...

View Article


Image may be NSFW.
Clik here to view.

Have you patched the ASA vulnerability in your Cisco networking software?

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.The...

View Article


Image may be NSFW.
Clik here to view.

Lewan Named to 2018 CRN MSP500 List as Top IT Managed Services Provider

CRN has named Lewan Technology to its 2018 Managed Services Provider (MSP) 500 list in the MSP Elite 150 category. The CRN’s MSP 500 list recognizes Lewan as one of the preeminent IT managed services...

View Article

Image may be NSFW.
Clik here to view.

5 Key Reasons to Upgrade Now to VMware vSphere 6.5

How time flies! Old reliable – Vmware vSphere 5.5 – is set for retirement in September of this year, meaning it will no longer be supported as of September 19, 2018.See the Entire VMware Lifecycle...

View Article

Image may be NSFW.
Clik here to view.

How to Build a Secure Network of Internet of Things (IoT) Devices

The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call...

View Article

Image may be NSFW.
Clik here to view.

6 Steps to Keep Your Computer Running Like New

No matter what industry you work in, there is probably a good chance you spend a lot of your day on a computer or laptop. The last thing you need is to have an issue with it right before an important...

View Article


Image may be NSFW.
Clik here to view.

CRN Names Lewan as top IT Service Provider on 2018 Tech Elite 250 List

CRN has named Lewan Technology to its 2018 Tech Elite 250 list. The list recognizes Lewan an part of an exclusive group of North American IT solution providers that have earned the highest number of...

View Article

Image may be NSFW.
Clik here to view.

5 Reasons You Need a Security Operations Center (SOC)

And 4 reasons you don’t want to do it yourself...Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering...

View Article


Image may be NSFW.
Clik here to view.

Finding Information in Multiple Repositories…the Struggle is Real

This is a sponsored guest post by M-Files, a Lewan technology partner.Information is a key asset to any organization. Even more important is how high the return on that information is. That return is...

View Article

Image may be NSFW.
Clik here to view.

Lewan Recognized as Top IT Solutions Provider on CRN's 2018 SP500 List

For a 5th time, we're excited to announce that Lewan Technology has been recognized on CRN's 2018 Solution Provider 500 list as one of the top largest technology integrators, IT solution providers and...

View Article


Image may be NSFW.
Clik here to view.

What is SOC 2 certification and should your Managed Security Provider have it?

We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA...

View Article

Image may be NSFW.
Clik here to view.

Colorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?

Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data...

View Article

Image may be NSFW.
Clik here to view.

Happy 80th Anniversary Xerography: The Invention of the Xerox Copier

When you walk up to your printer today to make a copy, wish it a happy anniversary. Today celebrates 80 years since the invention the original “xerox” process—xerography.On October 22, 1938 this...

View Article
Browsing all 107 articles
Browse latest View live