3 Steps to Design an IT Vision and IT Roadmap
If you’ve read Simon Sinek’s book, Start With Why, you’re familiar with the methodology that your organization’s “why” needs to sync with your vision, determining both how and what you do. (Check out...
View ArticleHow to Select a Managed Security Service Provider
We've been building our next generation security practice at Lewan for over a year now and I’ve learned more than I ever knew about the space before we started. Our new team of Security Analysts run...
View ArticleHow to Save Presets in Xerox Printer Drivers
Some of the most helpful and most underused features of your Xerox printer are the printer settings you can manage from your computer, also referred to as the Xerox printer driver. Within these...
View ArticleThe Cost of and How to Prevent a Data Security Breach
Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.
View Article3 Reasons to Bring Outsourced Printing In-House with a Digital Press
Business cards, letterhead, brochures, catalogs, labels, banners, postcards...these are all common collaterals that companies need to print to support their employees and market to their customers....
View ArticleHow to Choose an Identity Management Provider
Guest post by Todd Moore, a Technical Architect at Lewan Technology.We are living in a world where we are facing digital technology disruption in every organization and every industry.Forbes reports...
View ArticleFix: Running Cisco Spark on Citrix XenDesktop w/ Windows Server 2016
Spark is an awesome cloud-based solution from Cisco for meetings, messaging and calling. We use it for internal meetings, presentations and have been setting up for clients. Shiny and new unfortunately...
View ArticleWhat is WannaMine Crypocurrency Mining Malware?
Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security...
View ArticleHave you patched the ASA vulnerability in your Cisco networking software?
Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.The...
View ArticleLewan Named to 2018 CRN MSP500 List as Top IT Managed Services Provider
CRN has named Lewan Technology to its 2018 Managed Services Provider (MSP) 500 list in the MSP Elite 150 category. The CRN’s MSP 500 list recognizes Lewan as one of the preeminent IT managed services...
View Article5 Key Reasons to Upgrade Now to VMware vSphere 6.5
How time flies! Old reliable – Vmware vSphere 5.5 – is set for retirement in September of this year, meaning it will no longer be supported as of September 19, 2018.See the Entire VMware Lifecycle...
View ArticleHow to Build a Secure Network of Internet of Things (IoT) Devices
The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call...
View Article6 Steps to Keep Your Computer Running Like New
No matter what industry you work in, there is probably a good chance you spend a lot of your day on a computer or laptop. The last thing you need is to have an issue with it right before an important...
View ArticleCRN Names Lewan as top IT Service Provider on 2018 Tech Elite 250 List
CRN has named Lewan Technology to its 2018 Tech Elite 250 list. The list recognizes Lewan an part of an exclusive group of North American IT solution providers that have earned the highest number of...
View Article5 Reasons You Need a Security Operations Center (SOC)
And 4 reasons you don’t want to do it yourself...Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering...
View ArticleFinding Information in Multiple Repositories…the Struggle is Real
This is a sponsored guest post by M-Files, a Lewan technology partner.Information is a key asset to any organization. Even more important is how high the return on that information is. That return is...
View ArticleLewan Recognized as Top IT Solutions Provider on CRN's 2018 SP500 List
For a 5th time, we're excited to announce that Lewan Technology has been recognized on CRN's 2018 Solution Provider 500 list as one of the top largest technology integrators, IT solution providers and...
View ArticleWhat is SOC 2 certification and should your Managed Security Provider have it?
We’re proud to announce that Lewan has completed a third party audit attesting to our achievement of the data security requirements of the Service Organization Controls (SOC 2) Type II and HIPAA...
View ArticleColorado Enacts World’s Strictest Data Breach Law - Is Your Business Ready?
Next month will be historical for Colorado in the world of cyber security. Earlier this summer Governor John Hickenlooper signed a bill (HB 1128) into law that will require the most restrictive data...
View ArticleHappy 80th Anniversary Xerography: The Invention of the Xerox Copier
When you walk up to your printer today to make a copy, wish it a happy anniversary. Today celebrates 80 years since the invention the original “xerox” process—xerography.On October 22, 1938 this...
View Article