Les Olson Blog

What is SIP Trunking?

Posted by Chalise Moore on Jun 1, 2017 9:30:00 AM
Read More

Topics: Managed IT, SIP Trunking

Les Olson Company's Computer Network Solutions take "Best of State"

Posted by Marie Bradshaw on May 18, 2017 10:54:37 AM

Les Olson Company was recently presented with a 2017 Best of State award for their Computer Network Solutions in the category of Science and Technology. The Best of State Awards were created to recognize outstanding individuals and organizations in the state of Utah.

The panel of judges considered overall excellence in endeavors, use of innovative approaches or methods, and contributions to the quality of life in Utah. As an I.T. Services Provider, Les Olson Company is pleased to have effectively demonstrated their superior performance in each criteria.

Pictured above from left to right: Troy Olson, President, Les Olson Company | Keith Adams, Vice President of I.T., Les Olson Company | Matt Olson, Chief Technology Officer, Les Olson Company | James Olson, Chief Executive Officer, Les Olson Company

Read More

Topics: IT Services, Managed IT, Awards, Best of State

Why Your Small Business Should Be Outsourcing I.T.

Posted by Marie Bradshaw on Jul 19, 2016 1:03:31 PM

If you own or manage a small business, you probably wear many different hats, pitching in wherever needed to keep things running smoothly. You really go above and beyond, but some things are better left to the experts, and your time could be better spent focusing on your core responsibilities.

Read More

Topics: IT Services, Managed IT

3 Ways to Boost Mobile Security

Posted by Marie Bradshaw on Feb 17, 2016 2:00:00 PM

1. Set a pin or passcode.

Your passcode is your first line of defense. If someone wants to access your device, they'll first need to break this code. This is not always easy, and can operate as a deterrent against theft. Many mobile devices also have the option to unlock your phone using fingerprint authentication. Based on high levels of encryption, this is a very good option for securing your phone.

Read More

Topics: Network Security, Tips, Managed IT, Mobile Device Management, Security

Tips to Avoid the Microsoft Support Phone Scam

Posted by Marie Bradshaw on Feb 16, 2016 3:21:43 PM

Recently, Microsoft "Tech Support" Phone Scams have been carried out even more frequently than usual. You may get a phone call from someone claiming to be a Microsoft Support Technician. Be prepared so you can protect yourself and your business from becoming the prey of scammers.

Read More

Topics: Network Security, Tips, Microsoft, Managed IT, Scam Alert

8 Tips for a Stronger Password

Posted by Marie Bradshaw on Jan 25, 2016 11:34:02 AM

Although there are many exciting biometric password technologies emerging, the good old-fashioned password is still as important as ever; possibly even more than ever before. Many people still have the feeling that it's unlikely their passwords will be compromised, but in reality, all of us are at risk. Your password is your first line of defense against hackers. That's why having a strong password is so important.

Read More

Topics: Network Security, Tips, Data Security, Managed IT

3 Things You Didn't Know You Could Do With Microsoft Office

Posted by Marie Bradshaw on Dec 28, 2015 4:03:58 PM

Lots of us would consider ourselves to be proficient in Microsoft Office. But even the most seasoned and savvy users may be surprised to learn these 3 Microsoft Office tricks that can make life easier:

Read More

Topics: Tips, Microsoft Office, Managed IT

5 Tips for Online Security

Posted by Marie Bradshaw on Dec 15, 2015 11:58:41 AM

The internet is now more important in our lives than ever. But every day hackers and scam artists are finding new ways to take advantage of unsuspecting busineses and individuals. Learn how to protect yourself with these 5 tips for online security.

Read More

Topics: Network Security, Tips, IT Services, Data Security, Managed IT, Scam

What You Need to Know About RMM

Posted by Marie Bradshaw on Nov 27, 2015 8:27:00 AM


Remote monitoring and management (RMM), also known as network management or remote service software, is a type of software designed to help our Technicians remotely and proactively monitor client Servers, networks, and computers.

We deploy this RMM on client workstations, servers, mobile devices (if subscribed to our mobile device management program), and other endpoints. These agents then send us information about health and status so we can stay up to date on what is happening in a client’s network. This RMM approach gives us unique insight and allows us to stay ahead of issues and resolve them remotely or decide if we need to be onsite for full resolution.

Read More

Topics: RMM, IT Services, Remote Monitoring, Remote Management, Managed IT

Beware of Flash Drive Hacker Scams

Posted by Marie Bradshaw on Nov 2, 2015 9:15:00 AM

 Flash Drives (or USB Drives) may seem like an innocuous item to find laying around in an office environment. You may find one and decide to use it, or simply plug it into your computer to see if you can identify an owner. What you might not know is that this can be bait used by hackers to gain access to your computer and network. Don't fall victim to the flash drive hacker scam.

Read More

Topics: Network Security, Managed IT, Scam Alert

Request More Information

Your Office Technology Partner

Les Olson Company is the one place for all your office technology needs. Let us help you navigate the complexities of today's technology to find the right solutions for your business.

  • 60 Years of Expertise
  • Over 1,000,000 Customers Served
  • Experts with 2,243 Years of Collective Experience

Subscribe to Email Updates