Bassett-Furniture Collage

Bassett Home Furnishings

Before Bassett Furniture opened in February 2005, owners Rick and Susan Wise were approached by Bassett Furniture Industries to open a store on the Western Slope of Colorado. From 1993 until 2004, they had owned and operated a smaller store called Home Front Interiors in Montrose, Colorado. By analyzing the market potential, they realized that Grand Junction would be the perfect location for their new store. They purchased the old roller rink building at 325 W. Gunnison Avenue in 2004. Bassett furniture is different from other furniture stores because their …

pain point

Common Technology Pain Points, and Solutions!

Technology pain points. Every business has them, and they are usually small issues that people just tend to work around and not even realize it is happening. Technology is no different. There are lots of little things that can cause you and your employee’s pain (and productivity!). A lot of these issues can be solved with Managed IT Services. Managed IT Services are all the small things you don’t think about updating or doing in technology. These services are done for you by a service provider (Networks Unlimited). These can include …

5-rings-visual

Five Rings of Security: Get the Business Network You Can Trust

People are always looking for a one-size-fits-all approach to their technology security needs. While some companies might provide that, we do things a little differently. We like to have a conversation with organizations to determine what they do, how they use technology, how much data they store, what kind of data they store, and what their biggest concerns are, just to name a few. An in-depth conversation gives us a larger picture of the customer’s wants, needs, and budgetary constraints and helps us determine the best solution for that business. …

cyber-attack-ahead

Best IT Practices for Employees to Avoid Cyber Security Threats

We all have heard about cyber security concerns and hackers breaching networks and compromising data from millions of people, but you also might be thinking that it only happens to big firms. In fact, 71% of data breaches happen to companies with less than 100 employees. Data breaches happen to businesses of all sizes – but we usually only hear about the large ones. Small businesses are much easier targets for hackers, and they often keep a lot of personally identifiable information in one place. This makes it easy for …

network security lock

The Five Must Haves for Network Protection

The threat landscape is ever changing, and you need to make sure your network is keeping up with those changes. A secure system includes knowing where your data is, who can access it, and what types of devices are used. Business models have changed from what they used to be with the implementation of cloud computing, a mobile workforce, and bring-your-own-devices (BYOD). Hacking is no longer a distant concern. It is industrialized, and targets are more customized and sophisticated. These are the must-haves to keep your system secure. Protection across …

closed-business

Small Business Are Targeted Most by Ransomware

With the influx of ransomware in the news and the big businesses that have been attacked by these threats, you might be thinking that will never happen to your small to medium sized business. But guess again. Cyberthieves are increasingly targeting their attacks to smaller organizations. They target the “little guys” for a couple of reasons. SMBs Pay UP Yup, smaller businesses that don’t have any other means to retrieve their data have a higher percentage that pays when the ransom comes due. SMBs sometimes don’t have proper data backups, …

managed-services

Networks Unlimited Can Assist Your Current IT Department

In this day in age, it is critical for some businesses to hire their own IT staff to take care of their technology needs. While this is an excellent idea to have someone internally that you can count on, you might also need to supplement their skills and beef up staff for specific projects. Networks Unlimited offers the supplementary services you need when you’ve got to ramp up quickly, or you have a large project coming down the pipeline or just need a little extra help. Here are some of …

Healthcare IT Compliance Standards

Security is important in today’s world. Maybe more so than it used to be due to the amount of data collected, transferred, and stored electronically. Healthcare data adds another level of security due to the HIPPA Compliance required. HIPPA requires providers and health plans take extra steps to keep medical information secure and confidential. HIPPA does not just include doctors’ offices. It also includes all businesses that perform any legal, actuarial, accounting, consulting, data aggregation, management, administrative, accreditation, or financial services to those institutions. The four types of security standards …

Trend Micro Scam

Trend Micro Imposters!

Last week we received a call from one of our customers. They said someone claiming to be from Trend Micro contacted and stated Trend Micro was out of date.  The caller named Akeem gave our customer the phone number 817-386-4921. Some of our clients do have Trend Micro installed on their computer as their antivirus, and this was one of the customers. However, the software on their computer was already current and up-to-date. First of all, Trend Micro (or any of our vendors) would never call our customers directly. If …

phishing

Phishing: It Can Hook You and Your Employees

You’ve heard us talk about ransomware and other malware that can get into your system, but we don’t go into details on HOW it gets there. Usually, it is caused by Phishing. In fact, according to Sophos, 91% of cyber attacks begin with a spear phishing email. So, what exactly is it? Well, a phishing email lands in your inbox and lures you into clicking bad links, attachments, or websites. These emails can look like emails from your bank, package delivery alerts, invoices from vendors you do business with, or …