Les Olson Blog
Les Olson Company was recently presented with a 2017 Best of State award for their Computer Network Solutions in the category of Science and Technology. The Best of State Awards were created to recognize outstanding individuals and organizations in the state of Utah.
The panel of judges considered overall excellence in endeavors, use of innovative approaches or methods, and contributions to the quality of life in Utah. As an I.T. Services Provider, Les Olson Company is pleased to have effectively demonstrated their superior performance in each criteria.
Pictured above from left to right: Troy Olson, President, Les Olson Company | Keith Adams, Vice President of I.T., Les Olson Company | Matt Olson, Chief Technology Officer, Les Olson Company | James Olson, Chief Executive Officer, Les Olson Company
If you own or manage a small business, you probably wear many different hats, pitching in wherever needed to keep things running smoothly. You really go above and beyond, but some things are better left to the experts, and your time could be better spent focusing on your core responsibilities.
1. Set a pin or passcode.
Your passcode is your first line of defense. If someone wants to access your device, they'll first need to break this code. This is not always easy, and can operate as a deterrent against theft. Many mobile devices also have the option to unlock your phone using fingerprint authentication. Based on high levels of encryption, this is a very good option for securing your phone.
Recently, Microsoft "Tech Support" Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.
Although there are many exciting biometric password technologies emerging, the good old-fashioned password is still as important as ever; possibly even more than ever before. Many people still have the feeling that it's unlikely their passwords will be compromised, but in reality, all of us are at risk. Your password is your first line of defense against hackers. That's why having a strong password is so important.
Lots of us would consider ourselves to be proficient in Microsoft Office. But even the most seasoned and savvy users may be surprised to learn these 3 Microsoft Office tricks that can make life easier:
The internet is now more important in our lives than ever. But every day hackers and scam artists are finding new ways to take advantage of unsuspecting busineses and individuals. Learn how to protect yourself with these 5 tips for online security.
Remote monitoring and management (RMM), also known as network management or remote service software, is a type of software designed to help our Technicians remotely and proactively monitor client Servers, networks, and computers.
We deploy this RMM on client workstations, servers, mobile devices (if subscribed to our mobile device management program), and other endpoints. These agents then send us information about health and status so we can stay up to date on what is happening in a client’s network. This RMM approach gives us unique insight and allows us to stay ahead of issues and resolve them remotely or decide if we need to be onsite for full resolution.
Flash Drives (or USB Drives) may seem like an innocuous item to find laying around in an office environment. You may find one and decide to use it, or simply plug it into your computer to see if you can identify an owner. What you might not know is that this can be bait used by hackers to gain access to your computer and network. Don't fall victim to the flash drive hacker scam.