Lantek Blog

    blog-img

    This is the final part in our 5-part series. You are on the last leg of the journey, and just a few steps away from drastically improving your overall cybersecurity. We wanted to thank you in advance for going through these steps, and if you are finding this article for the first time, be sure to click on #Password Guide at the bottom of this page to see all of the other posts in the series.

    Read More
    blog-img

    This is part 4 of our 5-part series on getting your digital life in order! So far, we’ve discussed the importance of using strong, unique passwords for all of your online accounts, how to establish a primary email address so all of your accounts are tied to a single inbox, how to set up MFA to secure that email and your other accounts, and finally, we’re going to discuss setting up a password manager and going through the process of logging all of your accounts into that password manager.

    Read More
    blog-img

    In the last two parts, we walked you through the importance of strong, unique passwords, as well as establishing a primary email address that you will use for controlling and managing your accounts. Having everything in one secure place can make things a whole lot easier. Now we’re going to cover setting up Multi-Factor Authentication to add an extra layer of security to your primary email and your other accounts.

    Read More
    blog-img

    Previously, we covered why it’s important to protect your online accounts and why it’s critical that you use strong passwords. We also provided some good tips for creating unique, strong passwords that are easier to remember. You’ll be using that method to create a couple of strong passwords, but ultimately, you’ll be using a password manager by the time you are done with this 5-part guide.

    Read More
    blog-img

    We’re doing something a little different this time around. Normally, we try to keep the focus on business technology, but this article is geared towards the typical low-tech home user.

    Read More
    blog-img

    Who makes the decisions related to technology for your business? If you’re the one calling the shots, can you honestly say you have all the knowledge necessary to make informed decisions regarding your technology infrastructure’s future? If the answer is “no,” we’ve got just the service for you: a virtual CIO.

    Read More
    blog-img

    Imagine one of your employees receiving a phishing message in their email inbox. Would they fall for it or report it to the appropriate individuals within your business? With phishing training, you can take the guesswork out of this scenario and know—for sure—that your team knows how to respond to a potential phishing scheme.

    Read More
    blog-img

    Now that the holidays have passed and are winding down, you may need to phase out some of your old technology to make room for the new. Maybe you’re looking to the new year as an opportunity to upgrade some of the tech your business uses. In either case, it is essential to dispose of your old tools responsibly and sustainably.

    Read More
    blog-img

    Every year around this time, some particular stories are often told as part of ongoing family tradition. We like to take some time and share some holiday stories of our own, slipping in our own lessons that mainly apply to the businesses we work with and amongst.

    Read More
    blog-img

    One of the most challenging parts of running a modern business is securing it from today’s growing list of threats. If you don’t take cybersecurity seriously, there is a real risk that your business will be the next local or national headline about the dangers of cybersecurity issues. One of the easiest ways to prevent yourself from becoming another statistic is to hire a security consultant.

    Read More