All Posts

Who’s watching your network – Part 4 Unified Collaboration

While you were enjoying summer break, who was watching your network? Just because you were on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business.

Over time, businesses have slowly added more and more communication tools to their arsenal. What started as in-person talks, turned to phone conversations, email, and now many other options including video chat and communicating within the same cloud-based document. In order to keep it organized, you need unified collaboration. This is especially important during the summer months, as employees take vacation or work remotely.

Managed unified collaboration services help find the right solution for your business, including massively scalable Over The Top (OTT) and cloud-based unified communication tools. You can enjoy around-the-clock infrastructure monitoring including voice/IP telephony, voicemail, Interactive Voice Response (IVR), instant messaging, multi-media conferencing, telepresence, and contact center, as well as support for connectivity and business analytics. Thanks to the cloud, communication doesn’t have to stop when someone leaves the office.

Maybe your business needs an innovative video call center to seamlessly connect employees, customers, company representatives, support staff, and more. This can streamline communication and keep the team together, even while operating in different parts of the world.

Managing your communication options can become overwhelming. You need a reliable team to maintain and organize your unified collaboration, so your employees are educated on the latest technology and processes.

With unified collaboration, you aren’t restricted if an employee needs to work remotely, or someone else takes a vacation. An organized system helps your business operate as usual, wherever and whenever the team needs to work. The cloud allows these services to work in synchrony, with an effortless suite of communication tools to help grow your business.

Updated communication tools allow you to empower everyone in your business, no matter where they are located, anywhere in the world—by giving them all the same powerful communications assets. Support remote, mobile, and traveling workers by providing them all with powerful streamlined tool sets and avoid the risk of losing a sale due to communication errors with a customer. Custom solutions allow you to connect every time, using the customer’s preferred communication methods.

As a business owner, you don’t want to worry that everything will fall apart if you take time off. Managed unified collaboration services offer network diversity, routing fail-over, 24/7 network monitoring, proactive notifications, dual provisioning and load balancing so you can enjoy peace of mind. Should an error occur, your team will know who to contact to get things up and running again.

Technology is constantly changing, and it can be a challenge to stay up to date on the latest innovations. Your business can stay on the cutting edge when you rely on the experts to update your communication tools as necessary. Plus, you can enjoy a system that grows with you, as your needs change. A team of experts can easily adapt your conferencing network for high-quality, reliable communication applications.

With unified collaboration, you can stay in communication with your team and your customers all season long. No longer are you restricted to traditional methods, which can be difficult to use if employees are traveling or out of the office. Everyone can work seamlessly toward the business’ goals with the latest collaboration services. Enjoy your summer while growing your business by updating your communication system.

Posted in Newsletter Articles, Robert's Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Who’s watching your network – Part 4 Unified Collaboration

LammTech Announces Alex Arredondo As New Service Manager

LammTech is pleased to announce that Alex Arredondo has joined the Sedalia, MO firm as our new Service Manager. Alex will manage the technical team and their workflow to ensure clients are receiving the service levels they expect.

Alex comes to LammTech after 6 years in the United State Air Force where he served around the United States and overseas. He received a Bachelor of Science in Behavioral Sciences from the United States Air Force Academy in Colorado Springs, CO. As Service Manager, Alex will be tasked with supporting LammTech’s Service Team by coordinating daily activities and leading ongoing continuous improvement efforts. He will also be responsible for communicating with clients regarding service inquiries and scheduling.

“Alex presents comprehensive skills in organization, project management, and communication which are paramount to be successful in the Service Manager position.” Said Robert Lamm, CEO. “Alex is eager to learn and immerse himself in this position. He is a great fit for our culture here at LammTech, and we can’t wait to see everything he brings to the organization.”

Posted in News Alerts, Press Release | Tagged , , , , , | Comments Off on LammTech Announces Alex Arredondo As New Service Manager

Who’s watching your network – Part 3 Data Backup & Business Continuity

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business.

Does your business have proper data backup policies in place? Infrequent tape backup and other traditional methods are becoming outdated and are no longer secure enough to keep your system protected. Secure copies of your important business data act as your last line of defense against attacks and massive data loss. Even if you have some type of backup system in place, it likely is not robust enough to support your business in the event of an emergency. In addition to data backups, it’s recommended that all enterprises have a business continuity solution.

Managed business continuity and disaster recovery services can alleviate the pressure business owners face in identifying the best cloud strategy for their needs as well as making sure they are following all required regulations. A dedicated team helps by conducting research to identify the best hardware and software solutions, as well as executing all of the technical components needed for continuity. These managed services allow businesses to focus on their own goals and not worry about IT.

Businesses need a dedicated team and system to keep data constantly backed up and stored properly. This can take a lot of time, both in updating the backups and finding the right storage solution. No in-house team can work 24/7, which is why managed backup and continuity services are a necessity.

Even if you are diligent with backups, accidents happen, and data loss is unfortunately a common occurrence for businesses of all sizes. These errors occur due to a variety of circumstances, including human error, server failure, and network outages. Maintaining the right system to prepare for these incidents can mean the difference between keeping your business in operation, and costly downtime.

Data loss is not the only thing businesses need to be worried about. These disasters can put more than just data at risk, especially if there is no business continuity solution in place. A security incident can cause a chain reaction with your data, impacting productivity, profitability, and your ability to serve customers.

If you’re relying on tape backups, you may want to find another solution. Unfortunately, over 50% of tape backups fail, leaving over 50% of businesses who count on these backups left with nothing when the worst occurs. Tape backups are particularly vulnerable because they are stored in a single location. If something happens to that storage site, nothing can be done for the data.

Posted in Newsletter Articles | Tagged , , , | Comments Off on Who’s watching your network – Part 3 Data Backup & Business Continuity

Warren Olson Joins LammTech To Spur Growth

LammTech is pleased to announce that Warren Olson has joined the Sedalia, MO firm.  Warren is charged with supporting new business development and inside sales efforts for the firm and its surrounding region.

Warren Olson holds a Bachelor of Science in Management from Central Methodist University and comes to LammTech after 4 years at Schilby’s Auto Service in Sedalia. Warren brings extensive skills in customer service, account management, and sales to the LammTech team. As the Inside Sales Representative, Warren will be tasked with articulating LammTech’s products and services and is responsible for generating quotes and proposals for current and prospective customers.

“Warren is high energy and brings an expertise in customer service that will be an asset to LammTech. He is excited to start developing relationships with our customers. “Said Robert Lamm, CEO. “He is going to be a great asset to our Business Development team.”.

Posted in News Alerts, Press Release | Tagged , , | Comments Off on Warren Olson Joins LammTech To Spur Growth

Who’s Watching Your Network – Part 2 Security

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you and your employees take time off from your business.

Missed Part 1 on Managed IT? Click Here.

 The number of cyber threats and attacks is growing, and as a result, it is crucial that businesses prioritize IT security. It’s time to stop living in denial about an attack and start taking proactive measures with managed security services. As a busy owner or IT employee, it can be difficult to feel you have control over all aspects of your network. Instead of stressing about a possible security breach, bring in the professionals for non-stop monitoring and management of your security systems.

Managed security services offer remote monitoring that allows a business to operate at full capacity with minimal intrusions. Functions of managed security service include 24/7 monitoring and management of threat detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. The IT experts always update the business with the status of security issues, audits, and maintenance, so the organization can focus on security governance and not administrative tasks.

It’s very difficult for a small or medium-sized business to keep an eye on their networks all the time. Managed security services offer continuous monitoring 24 hours a day, 7 days a week, 365 days a year. This sort of monitoring is just not feasible to do in house and doesn’t provide opportunities for employees to ever take that much-needed time off.

Instead, business owners can rest easy knowing they have a team updating their security, adding the latest firewalls and patches, and keeping their system running smoothly. When it comes to security, it always pays to be proactive, and constant monitoring is the best way to ensure protection.

Managed security services help your business stay prepared for potential cyberattacks. Hackers are becoming increasingly sophisticated, and it’s less a matter of if an attack will occur, but when. Unfortunately, even small businesses are falling victim to attacks, as hackers know a weak security system is easy to infiltrate. If an incident is detected too late, recovery can take a big toll on your business, putting your data, customer privacy, and sales at risk.

A security contract helps your network keep up with evolving threats and address issues as they arise. Working with a professional IT company ensures your network is as protected as possible from attacks. Their team helps eliminate blind spots with firewalls, anti-virus software, and other management tools, and should something occur, they’ll do everything possible to stop it or keep it from spreading further. Their team can determine which threats are the most dangerous and critical to your network. They provide real-time notifications, enabling everyone to take fast action.

Keeping your business up-to-date on the latest security threats and measures can feel impossible. A professional team made up of highly educated experts, skilled in monitoring the threat landscape, provide a distinct advantage. With early threat detection and protection, you can minimize security risks and prevent your business from going offline. An experienced team will always alert customers when something needs to be addressed.

During the busy summer season, it’s important that you and your team have the opportunity to take time off for relaxation and recharging. With the threat of a security breach hanging over your head, you’ll never really be able to unplug. Managed security services put your network in good hands, so you can finally take time off. Trusting a professional team of experts keeps your data and your business protected around the clock.

Want to know more how LammTech can help secure your network? Click Here

Posted in Newsletter Articles | Tagged , , , , , , | Comments Off on Who’s Watching Your Network – Part 2 Security

Who’s watching your network – Part 1 Managed IT

While you’re enjoying summer break, who’s watching your network? Just because you’re on vacation, doesn’t mean you’re free from security breaches, system errors, and more. Read our six-part series to learn how you can ensure your data is safe while you take time off from your business. managed IT

If an emergency occurs with your system, who is looking after it? The web is a 24/7/365 structure, and you need eyes on your network at all times. A managed IT contract can ensure you have a team of dedicated tech experts serving your network around the clock. This summer, take the opportunity to actually enjoy a vacation and take a much-needed break from the business and outsource your IT management. Your system will be monitored with a proactive approach to errors, as well as go into defense mode should an attack occur.

Managed IT is a smart solution whether or not you have your own IT team. These services can remotely manage your entire system which is perfect for small or medium-sized businesses that aren’t ready to hire their own IT employees. Skilled technicians can also work side by side with your staff to provide support and expert advice should errors occur.

The last thing you want is to receive emergency phone calls from your business while you’re on vacation. Whether you’re off the grid or just trying to enjoy quality time with your family, it can be hard to solve system errors when you’re away. Not to mention it can be stressful for you and your employees at the office as precious minutes of downtime slip by, costing your business money and productivity.

Managed IT contracts provide 24/7 network monitoring with a proactive approach to managing your IT infrastructure. This constant monitoring can help eliminate small problems before they becoming debilitating to your system. Remote monitoring and management of servers, desktops, and mobile devices ensures that nothing ever slips under the radar. Managed IT identifies and fixes problems before they create downtime.

 Whether it’s a software update, harmful virus, hacker, or spyware, your system can’t afford to wait until your IT team gets back. If a problem gets out of hand, your website or primary applications could go down, causing you to lose business. With managed IT services, you get peace of mind at all times should an attack occur. This is perfect for the busy summer season, when you and your employees are hoping to enjoy family vacations and unplug for a while.

Unfortunately, businesses of all sizes are increasingly at risk of a cyber-attack. Managed IT providers also offer security services by partnering with trusted vendors to provide cybersecurity solutions that keep your business protected. They install components such as firewalls, intrusion prevention systems, and anti-virus software to reduce risk. Should an attack occur, constant monitoring means threats are proactively detected in real time and automatically mitigated.

With managed IT, you can spend more time building your business, not learning how to take care of your IT infrastructure. A team of experts takes care of your system and suppliers, including giving strategic advice on how technology can help support your goals. Whether your expertise is in something other than tech, or you want someone else to take the reins sometimes, managed IT is a smart business decision.

Consider managed IT this season, so you can enjoy peace of mind while you and your team spend days by the beach, pool, or exploring a new city. Proactive monitoring keeps your system updated and running smoothly, and the team is ready to snap into action should an error occur. With a team of IT experts on your side, you can trust your network is safe and your business is growing. When we work together, we can achieve more for your business.

Learn More about our Managed IT

Posted in Newsletter Articles, Robert's Blog | Tagged , , | Comments Off on Who’s watching your network – Part 1 Managed IT

How To Protect Yourself From a Future Email Attack

This is Part 3 in our series on email hacking, click for -> Part 1 or Part 2

Whether you’ve been hacked or not, everyone can take stronger efforts to protect their accounts. In the modern age, it’s no longer if you get hacked – it’s when. There are measures you can take, however to make it more difficult for hackers to gain control of your accounts. Follow these steps to keep your data and identity safe online.

Use Secure Passwords
Change your passwords on all accounts frequently, and they need to be strong, with at least 12 characters, including numbers, letters, special characters. Avoid any common information about you, or things that could be learned from your Facebook account, like address, kids’ names, pets’ names, birthday, etc. You should have a different password for every online account you have. A unique phrase that is creative and unpredictable is best, something like, il0veTr@vel, would be a good option.

Use Multi-Factor Authentication
You can set this up on your email, Facebook, banking sites, and other accounts as well. Every time you login, you’ll be sent a unique temporary code via text or to another email account, and you’ll need to input that to access your account. Hackers would have to also take your cell phone in order to login to your accounts if you set this up, so it gives a good layer of protection.

Use Secure devices
If possible, only access online accounts from your personal computer or device, while using a secured internet connection. Avoid accessing personal accounts from public computers, which could have been infected with malware, or might use an unsecured internet connection. If you do use public computers, always log out of every account when you are finished. It’s also advised to use your phone’s cellular data if you need to access a secure account, as opposed to public internet.

Protect your financial information
Though it’s convenient to have your credit card or banking info saved on accounts or websites you use, if your account is hacked, they now have all that information. Whenever you need to enter financial information on a website, make sure it is secure, so the URL starts with “https://”—remember that the “s” is for “secure”). And always log out once you are finished.

Never open suspicious emails
If you get an email from your bank or PayPal that looks strange, don’t open it. If you’re unsure if it’s real, call the office before opening it. Hackers have been known to impersonate banks, the IRS, and more to try and get your information. If you get a weird email from a friend with a link that you weren’t expecting, don’t click it. Call them to see if they sent the email before you open it. It is best to delete spam or dubious-looking emails without opening them.

Get account alerts
Some accounts give you the option to sign up for an email or text alert when your account is accessed from a new device or unusual location. This will instantly update you if an unauthorized person is accessing your account. As a result, you’ll minimize the amount of time they have in your account. If you get a suspicious alert, change your password immediately.

For your computer & devices:

  • Update security software
  • All internet-connected software and operating systems should be updated regularly, like email programs, web browsers, and music players. Sometimes an attack could have been prevented if your system was updated to the latest security measures.
  • Install antivirus software
    If you don’t already have security software, it’s a good idea to install a firewall and antivirus software and keep them up-to-date. If you need recommendations for software, let us know. These programs will help identify threats and help you remove any malicious software. Beware of scam software that may get you to download programs that actually contain malware.

Getting your email hacked is a scary prospect, but if you know how to keep your account secure and what to do if it happens, you can minimize the impact. If you have any further questions about protecting your accounts from hackers, please contact us.

Posted in Newsletter Articles | Comments Off on How To Protect Yourself From a Future Email Attack

LammTech Establishes Scholarship with State Fair Community College Sophomore Skyler Garrett Receives the Inaugural Award

Annual Scholarship to Students Pursuing a Degree in Computer Network Administration

June 6, 2018, Sedalia, MO: LammTech has established a scholarship fund with the State Fair Community College Foundation. The Foundation assists State Fair Community College’s mission of providing accessible education, while continuing to be a learning-centered institution, enriching its students and community by providing skills, knowledge, and perspectives essential for a changing world.

LammTech was founded in 1999, with the vision to build a business that created professional careers and had people embracing those careers while supporting loyal and happy clients.

“I believe that LammTech would be nothing without the communities we serve and giving back to those communities is of the utmost importance.” Said Robert Lamm, Founder/CEO, “We are excited to award Skylar the first scholarship of many to come.”

Students pursuing a degree in Computer Network Administration are eligible to receive the $1,500 award to assist them in their pursuit of completing their degree. The scholarship has certain eligibility requirements that students must meet to be considered.

Students are encouraged to review the qualifications and contact their academic advisor for more information.

About LammTech

LammTech (www.LammTech.com)is a network management, Cloud and systems technology integrator providing end-to-end solutions that ensure business integrity for small, medium and enterprise-level clients.  From design through deployment LammTech is an advocate for clients to strategically align their business and IT objectives.  We architect, implement and fully manage IT solutions spanning computing infrastructure, enterprise management, VoIP, security and cloud solutions.  The company is headquartered in Sedalia, Missouri.

###

Posted in News Alerts, Press Release | Comments Off on LammTech Establishes Scholarship with State Fair Community College Sophomore Skyler Garrett Receives the Inaugural Award

What to do if your email gets hacked

If you missed part 1, you can click here to read it.

This is Part 2 of our 3 part series on email hacking.

Now that you’ve determined if your email has been hacked, what do you do? You definitely shouldn’t ignore it. You don’t have to be a celebrity to have valuable information in your email that hackers want. They aren’t looking for gossip – they want your data. Some will keep passwords or logins to government departments or large companies they may want to ’target’ to hack them. But the more sophisticated ones will sell your details including name, telephone, email address, and credit card details and cash in on The Dark Web.

Here’s what to do to clean up the mess the hackers left behind.

  1. Change your Password
    If you still have access to your account, change your password immediately. Always use at least 8-10 characters with a variety of upper and lower case and throw in some symbols and numbers. Avoid using any information a hacker could easily find, like maiden name, address, kids’ names, birthdays, pets’ names, etc.
  2. Report It To Your Email Provider
    Most likely, your email provider has seen this type of hack before and may be able to give you more details about the nature and source of the attack. They may also have specific tools to help you protect your information and get you up and running. If your work email was hacked, also inform your IT professionals for additional guidance.
  3. Inform Your Email Contacts
    Many email hackers will send emails to your contacts, posing as you, with links to then remotely hack your friends as well. Let your contacts know they should not open any emails or click any links from you that look suspicious. Also, if they did open anything from you, encourage them to check their own accounts for hacking.
  4. Change your Security Question
    It’s not enough to just change your password. If your email provider uses security questions, change those as well. Pick the most obscure questions, with answers that only you would know. Or better yet, come up with lies for the questions (as long as you remember them). If hackers get access to your answers to the questions you already had associated with your account, they could use them to log into other accounts.
  5. Add Multi-Factor Authentication
    If your provider has the option, add multi-factor authentication, which requires use of a one-time code to log in. It does add another step to your login, but you’ll be extra protected.
  6. Check Your Email Settings
    Hackers might have changed your email settings so they get a copy of your messages forwarded to them. Look to make sure there’s nothing suspicious hidden in your settings. Don’t forget to check your email signature, ‘reply to’ email address, and your sent folder. Eliminate any weird links or email accounts you don’t recognize.
  7. Scan Your Computer for Malware and Viruses
    Your hackers may have gained access to your entire computer. Scan your computer for any viruses, and get them taken care of as soon as possible. You may need to take your computer in to a repair shop so they can remove any that might be present.
  8. Change Other Passwords
    First, update any accounts that use the same password as your previous email account. This includes social media, banking, Amazon, Netflix, wherever you commonly login. Then, think about any other accounts associated with your email address where you may have sent recent “change password” requests, or have passwords that were shared in your email. Change those accounts as well.
  9. Consider Creating a New Email
    If you continue to get hacked, and your email provider isn’t helping, you might need to start a new account, but don’t delete your old account! Hackers could then recreate the account and spoof the old account causing unknown issues for yourself.
  10. Monitor Your Information
    The hacker may have been able to access your Social Security Number or other pieces of valuable personal information from your email. If this is the case, you need to monitor your credit and other financial accounts for suspicious activity. Check your credit report through the free sites to make sure nothing suddenly changes. You may want to contact the fraud department of these financial institutions or other organizations to let them know that you were hacked to ensure that they investigate and protect you from further issues.

Read part 3 of our series to learn how to protect yourself from further email hacks.

If you missed part 1, you can click here to read it, or Read part 3

Posted in Newsletter Articles, Robert's Blog | Comments Off on What to do if your email gets hacked

Team LammTech Supports Lub Dub 5K/10K Walk/Run

On April 28th members of the LammTech team participated in the 11th annual Lub Dub Run.  The team joined forces with 638 folks that came out and finished. A total of over $40,000 was raised for the Bothwell Foundation’s Camye Callis-Gaspard Memorial Heart Fund!

LammTech is a proud sponsor of the event where participants can run or walk in the 5K/10K.

You can see additional pictures on the LammTech Facebook page.

Posted in News Alerts | Comments Off on Team LammTech Supports Lub Dub 5K/10K Walk/Run