Wannacry-screenshot

Countermeasures for Ransomware – like WannaCry

You may have seen the news this weekend. Criminal hackers have released a new strain of ransomware that spreads itself automatically across all workstations in a network, causing a global epidemic. If you or a co-worker are not paying attention and accidentally open one of these phishing email attachments, you might infect not only your workstation but immediately everyone else’s computer too. As more information comes in regarding this strain of ransomware (also called WannaCry, WannaCrypt0r, WannaCrypt, or WanaDecrypt0r), we know that it is infecting computers based on someone in …

mothers-day

Smart Gadget Gift ideas for Mother’s Day

Mother’s Day is coming right up (seriously, it is the 14th…that is Sunday!) and we’ve put together some great tech ideas for mom. The prices ranges and uses vary, so you hopefully know your mother well enough to figure out which one she will appreciate the most. Amazon Tap The Amazon Tap is an “Alexa” enabled portable Bluetooth speaker. You can get music from Pandora, Spotify, Amazon Music and more. It also works as an assistant, where you can ask it questions, and it will have an answer for you. …

employees-compromise-security

Ways Your Employees Compromise Data Security

Last week’s blog included tips on how to be proactive in your network security. One of those ways was to train your personnel. This week we will discuss why it is so important to have a trained staff. Here are five ways employees can compromise your data security. Inside Job Thinking this is an inside job is the worst one to bring up, but we will just go ahead and get it right out of the way. Yes, sometimes your employees can be so mad about something that they will …

network security

Proactive Network Security

Why wait around for your network to become compromised? There are some simple methods you can start putting in place now to be proactive in this hacker day-of-age. 1. Get Support The buy in and measurements required to support a network-wide security measure is imperative. You need to get your manager’s/boss’s full support, so they understand the scale of what you want to do and the threat that is making you want to take those measures. The best way to garner support from those key executives is to show them …

cerber-ransomware

Cerber Malware – The Latest and Greatest…Just Not for You

Cyber criminals are at it again, and their latest and greatest favorite malware strain is called Cerber. Just like it’s Greek mythology namesake, Cerberus (Hound of Hades), it packs a punch and keeps your head spinning. Last week, four of our customers were held ransom by Cerber. We immediately started double checking and shutting down any remaining RDP (remote desktop protocol) ports that were still open, and are working diligently to beef up security measures to protect against this strain of ransomware. You might wonder why the sudden outbreak in …

CP360 Winner Logo

Networks Unlimited 1 of 25 CP360 Winners in US

Channel Partners, a resource for indirect sales channels offering IT and telecom systems and services, is pleased to announce that Networks Unlimited has been selected as a winner of the 2017 Channel Partners 360⁰ Business Value Awards. Twenty-five winners were honored during an awards reception on April 12 at the Spring 2017 Channel Partners Conference & Expo in Las Vegas. “Our 2017 Channel Partners 360° Business Value Awards winners offer a master class on thriving through disruption,” said Lorna Garey, editor in chief of Channel Partners. “The past few years …

colorado companies to watch header

Networks Unlimited Announced as 2017 Colorado Companies to Watch Finalist

(CCTW) announced the 2017 Finalists of the 9th Annual Colorado Companies to Watch Awards, a unique program that honors 50 high-performing 2nd stage companies from across the state for their performance in the marketplace, innovative products, unique processes, and humanitarian actions. “The 2017 Colorado Companies to Watch Finalists represent the state’s most creative and impactful businesses,” said Rick Ninneman, CCTW Chairman of the Board. “We are proud to recognize the contributions of 2nd stage companies in Colorado, which often work behind the scenes creating the bulk of economic growth in …

tech elite 250 cover

Networks Unlimited, Inc. Named One of 2017 Tech Elite Solution Providers by CRN

CRN®, a brand of The Channel Company, has named Networks Unlimited to its 2017 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology vendors, scaled to their company size. To compile the annual list, The Channel Company’s research group and CRN editors work together to identify the most customer-beneficial technical certifications in the North American IT channel. Solution providers that have obtained these elite designations—which enable them to deliver …

computer spring cleaning

Spring Cleaning for Your Computer

I’m not sure if anyone still goes through the “spring cleaning” process at homes, but we’ve got some tips for office spring cleaning to maintain your technology to keep it at top speeds and ensure it is the most reliable. Defrag Make sure all those little Tetris blocks are in the correct spot so your computer can find things faster and run more smoothly. Find the steps to defrag your computer here. Firewall Love Make sure it is turned on. Why? It’s a barrier between your computer network and the …

social media secrets image

Social Media Secrets

Social Media is the thing that every marketer tells you that you NEED to focus on, but there are a few things that they always fail to mention when touting how great it all is. It Isn’t Completely Free The actual platforms are completely free, that is true. However, the amount of time you put into building your profiles and updating the content as much as you should is not free. Also, social media apps tend not to spread your message quite as far and wide as you think, unless …