• Shorts and Damage from WATER POWER
  • Surges and Outages
  • Failure from Excessive HEAT
  • WATER - In your utility room, look for gaps between floor, walls, and ceiling, and around conduit entry paths and terminations. Water will follow cables into rack-mounted and free-standing devices, then seek low points on the floor to pool. Being a good conductor with little resistance, water lets big current flow where it shouldn't, zapping anything in it's path.

    Use Silicone based sealer to fill gaps in walls and around conduit and cable terminations. Patch roof coatings and gaps around flashing now to stop water on it's way to Arizona.

    POWER - Spikes, shorts, lows and outages cause unplanned shutdowns and can damage electronics and data. Uninterruptible power supplies (UPS's) condition lines against low voltage brownouts and power outages, which can spike when power returns. If power remains off, the UPS can initiate normal shutdown and avoid data loss. Check UPS batteries using monitoring software or dashboard. Make sure power capacity supports what's plugged in: Servers can require 1500 VA, Desktop PC's 600 VA, Switches/Routers/Firewalls 350 VA.

    If you haven't checked your backups in a while, now is a good time. Review logs for frequency and successful completion, then restore a few test files and folders. If you're not sure, create a new full backup before the first storm hits. We're here if you need help.

    HEAT - Monsoon storms are accompanied by excessive heat. As dust accumulates inside enclosures and airflow around components slows down, it's like wearing a heavy jacket on a summer day with little wind. It won't take long to exceed your comfort zone. Most electronic components have built-in temperature limits that cause rapid shutdown to avoid damage. The best prevention is adequate airflow around the devices in a relatively dust-free environment, with all internal fans working well. Don't forget annual device cleanouts. Monsoon storms can be dramatic, but these tips can help protect both network and data.

When you leave home, you lock the door or close the garage. When you walk away from your computer, do you lock the display? Probably not.

In Windows 10, your display automatically locks after 10 minutes, which gives plenty of time for open windows to be inspected. One touch of the mouse or keyboard and the screen lock timer resets, providing another 10 minutes. It doesn’t take long for someone to run a search and email the findings off-site or upload them to a cloud account. They may connect a browser to a risky website or delete important folders.

Even a quick trip to the coffee station can be interrupted by a crisis that delays your return. When unattended, all computers should be:

  • Off
  • Asleep
  • Display off and computer locked

Don’t have time to lock your computer? Try this:

Some industries have serious compliance regulations and penalties. This policy protects you and your employer, customers and suppliers.

Windows Vista – Support Ends

On May 12, 2017 "WannaCry" malware began exploiting a vulnerability in most versions of Windows dating back to XP. A month earlier, Microsoft identified the risk and responded with a patch (Critical Security Bulletin MS17-010) that required rebooting after installation. Many servers and end-user pcs were left vulnerable in more than 150 countries.

The malware sneaks through SMB ports, then encrypts a user's data and presents a growing ransom demand, starting at $300 and growing to $600, after which the garbled data is lost forever without a valid external backup. Once active it spreads quickly to other PCs in the same network.

Solution: Apply Security Update patch for Microsoft Windows (4013389). A restart will be required to complete the update.

Workaround: Disable SMBv1 on client and server computers, but do not disable SMBv2 or v3. Additionally, block SMB ports (139, 445) from all externally accessible hosts. A restart will be required to complete the workaround.

Our Customers

Hosted - Your servers and workstations have been patched.

Managed - Your servers and workstations have been patched.

Time & Materials- Call our Support Team immediately.

We installed Microsoft's patch shortly after release on our Hosted and Managed client computers, providing protection weeks before WannaCry surprised the world. When LeeShanok performs monthly Network Update Checks, we also apply critical server patches that address this type of vulnerability. If your network is not receiving regular maintenance, call us to review your situation and plan for the update.

Your Technology Partner,

The LeeShanok Team Tucson

Windows Vista – Support Ends

As of April 11, 2017, Microsoft stopped all support of Windows Vista. If Vista exists on any of your computers and you do nothing, they will still function but will grow slower and more vulnerable. If you hadn’t considered migrating before, now is a good time.

We recommend migrating to either Windows 7 Professional or Windows 10 Professional. A clean “custom” installation is recommended over an “upgrade” for both reliability and performance.

Backup your data – Don’t forget! There are many backup tools and methods available. To ensure your data migrates successfully please call the LeeShanok Team.

Migrating to a new operating system should never be taken lightly. There are many decisions to make and tasks to do. Any mistake can be costly. It’s important to replace Vista. Engaging our team early in the process will ensure a successful transition.

As always, if you have any questions, please feel free to contact us.

Your Technology Partner,

The LeeShanok Team

Tucson: 520.888.9122.
Phoenix: 602.277.5757.


Creating A Strong Password

With the vast avenues of today's internet, hackers have more and more opportunity to do terrible things to innocent people like you. Hackers have many ways of acquiring your information. Those ways may seem little or insignificant, but in the grand scheme of things, it could mean whether or not your information will be stolen.

For instance, making your password harder to guess can be an easy first step. Hackers try to guess your password based off simple things such as the name of your pet, your phone number, or even your birthdate. In turn, professionals suggest your password contain words, acronyms, or phrases which are easy to remember, yet difficult for others to guess.

This video provides more information about how hackers attempt to gain access to your personal accounts and safety tips to keep your password strong and protected!

If you have any questions or need assistance in performing these steps, please do not hesitate to contact us.

Your Technology Partner,

The LeeShanok Team