Live Event

Cisco Connect Phoenix

Tuesday, September 19, 2017
8:00 a.m. – 4:00 p.m.
Arizona Biltmore
2400 E Missouri Ave
Phoenix, AZ 85016

Join us for a free Cisco tech event! Don’t miss out on your opportunity for free, in-depth technical sessions designed to help you drive improved business outcomes through digital transformation.

  • Customize your day with multiple technical session tracks
  • Network and learn in-person with local experts who are leading the industry in digital transformation
  • No other event offers the same best-in-class education, training and networking focused on the challenges and issues that matter most to you!

Technical Sessions

Enterprise Networks Track

  • Evolution of the Enterprise Network: The Cisco Digital Network Architecture
  • The Catalyst 9000 Switch Family - An Architectural View
  • SD-WAN and Branch of the Future
  • Meraki Full Stack: Simplicity Driving Simple IT

Security Track

  • NGFW Protecting the Edge Including Firepower 2100
  • Ransomware Defense with Cisco Advanced Threat Solutions
  • Umbrella (OpenDNS) / CloudLock
  • Talos Insights

Data Center Track

  • DevOps for Infrastructure Teams - Containerize IT
  • Digital Transformation Starts with Cisco ASAP Data Center
  • Deep Dive on Cisco Security in ACI
  • Next Generation UCS: Cloud Powered Intelligence

Collaboration Track

  • Cisco Collaboration Updates: CSR 12, Video Endpoints and Jabber
  • Spark Board - Hybrid Services - Integrating Cloud with On Premise Systems
  • Powerful Collaboration the Easy Way with Spark: Real world Application
  • Integrations
  • Connected Digital Experience for Customer Care
Tips and Tricks

When you leave home, you lock the door or close the garage. When you walk away from your computer, do you lock the display? Probably not.

In Windows 10, your display automatically locks after 10 minutes, which gives plenty of time for open windows to be inspected. One touch of the mouse or keyboard and the screen lock timer resets, providing another 10 minutes. It doesn’t take long for someone to run a search and email the findings off-site or upload them to a cloud account. They may connect a browser to a risky website or delete important folders.

Even a quick trip to the coffee station can be interrupted by a crisis that delays your return. When unattended, all computers should be:

  • Off
  • Asleep
  • Display off and computer locked

Don’t have time to lock your computer? Try this:

Some industries have serious compliance regulations and penalties. This policy protects you and your employer, customers and suppliers.

Technical Update

We all love social media, but in the era of Facebook, Twitter, Tumbler, LinkedIn, and Instagram, do you really know what information you have floating around on the Internet? Attackers in today's digital age are incredibly clever. Just because you consider something innocuous information, doesn't mean a hacker can't leverage it to their benefit.

As you saw in the video, something as simple as where you went to college can give an attacker an air of credibility. Don't think you'd fall for that? Let's look at another example. Have you publicly posted the names of your kids? What about where they go to school? Both of these are common tidbits of information that can be found on social media. Now what if somebody called saying they're from your child's school, and they're refreshing their records. Would you give them your cell number? Email? Home address? What if they told you one of your kids had an accident and you needed to come pick them up; could they get you to leave your office unattended?

Now, anecdotes like these are not meant to leave you cowering in fear. However, it's important to note that even information that may seem unimportant to you can be a treasure trove to an attacker


Don't overshare on social media! The less the world knows, the less can be used against you.

Look at email addresses closely to make sure they are from who you think they're from. Just because it has privileged information in it does not automatically make it authentic.

Call back. If someone wants information over the phone, or has called and asked you to do something, call them back. Just because they sound official doesn't mean they are! Use a number you already have for the school/ company/ partner you are talking to. Then you know you're dialing the real thing.

Change login information often! Social media is a prime target for hackers. Change your passwords on a regular basis, and make sure to use something complex.

We will be presenting all these 2ps and a plethora more in our upcoming "Security Lunch & Learn" so stay tuned for more information on that event coming up in March!

Security Advisory

On June 27 the US Government became aware of new ransomware called Petya.

Similar to WannaCry, it didn't require any user involvement, but infected through operating system vulnerabilities. It's demand for ransom in exchange for decryption key was a hoax, as encryption of Master Boot Records cannot be undone. Infected drives became unreadable and computers became un-bootable and any ransom paid was lost.

Recommended prevention steps:
  1. Protect end-point Windows devices with antivirus/antimalware software from respected providers (we recommend Trend Micro). Make sure subscriptions haven't expired. Central purchasing and administration allows for consistent protection and alert handling.
  2. Apply operating system and device patches (especially MS17-010) and updates to both Servers and end-user computers. It's true that updates occasionally cause problems. But vulnerabilities in unpatched systems increase over time.
  3. Apply updates to web browsers, Adobe Reader and Flash, Java, and other software regularly.
  4. Back up servers and file shares regularly, and periodically validate whether backups were effective. The date, time, and status should be reviewed for success. Try to extract several folders and files from backup sets. Ideally, disaster recovery and business continuity solutions are in place that synchronize continuously and can spin-up a server identical to the moment it failed. LeeShanok offers BDR and BC solutions that are effective and affordable.
  5. Make sure end users store data files on Shared Drives so they are included in backups.
  6. Protect end-user computers with active firewall software.
  7. Periodically review your network firewall. Businesses need a modern commercial grade device. Those with business centers or wifi for guests need filtering of malicious and illegal content, and traffic shaping. We recommend Cisco Meraki and Cisco ASA with FirePower. Make sure firmware updates are current.
  8. Host a security policy meeting for employees and satellite offices. Partner with LeeShanok's team as you prepare. To help you, we offer a 45 minute presentation called "IT Security for the Common Worker", also available via webinar.
  9. Many of these checklist items are managed by LeeShanok as part of our Managed IT and Hosted service plans.

Feel free to contact us to discuss your situation.

Windows Vista – Support Ends

On May 12, 2017 "WannaCry" malware began exploiting a vulnerability in most versions of Windows dating back to XP. A month earlier, Microsoft identified the risk and responded with a patch (Critical Security Bulletin MS17-010) that required rebooting after installation. Many servers and end-user pcs were left vulnerable in more than 150 countries.

The malware sneaks through SMB ports, then encrypts a user's data and presents a growing ransom demand, starting at $300 and growing to $600, after which the garbled data is lost forever without a valid external backup. Once active it spreads quickly to other PCs in the same network.

Solution: Apply Security Update patch for Microsoft Windows (4013389). A restart will be required to complete the update.

Workaround: Disable SMBv1 on client and server computers, but do not disable SMBv2 or v3. Additionally, block SMB ports (139, 445) from all externally accessible hosts. A restart will be required to complete the workaround.

Our Customers

Hosted - Your servers and workstations have been patched.

Managed - Your servers and workstations have been patched.

Time & Materials- Call our Support Team immediately.

We installed Microsoft's patch shortly after release on our Hosted and Managed client computers, providing protection weeks before WannaCry surprised the world. When LeeShanok performs monthly Network Update Checks, we also apply critical server patches that address this type of vulnerability. If your network is not receiving regular maintenance, call us to review your situation and plan for the update.

Your Technology Partner,

The LeeShanok Team Tucson

Security Advisory

Keeping Your Technology Secure in 2017

With 2017 kicking off, we would like to take a minute to make you aware of an area all companies can improve in; SECURITY!

It seems with each passing year IT infrastructure becomes more necessary, more rewarding, and unfortunately, more dangerous. In 2016 alone we saw some big names encounter security troubles in a very public manner. British Airways, Banner Health, Uber, Experian/ T-mobile, Slack, Minecraft, Yahoo, MySpace and so many other large companies have fallen victim to both targeted attacks and their own poor security practices.

Losing company data can be a terrifying prospect. Reacting to a breach is never as beneficial as preventing one in the first place an unfortunately there is no "SECURITY" one-button fix. So, this year, our IT newsletters are going to focus on security and how your company can avoid costly security mistakes.

Please take a moment to watch the Youtube video below.

Now, we know that was probably a bit terrifying. (It was to us!) However, we're here to help keep that frightening scenario from ever happening to you. In the coming months we will address the security concerns highlighted in that clip as well as a few others! So stay tuned, and hopefully you will never have to deal with IT events quite that dramatic.

If you have any questions or assistance in performing these steps, please don't hesitate to contact us.

Your Technology Partner,

The LeeShanok Team

Tips and Tricks

Monsoon Image

  • Shorts and Damage from WATER.
  • POWER Surges and Outages.
  • Failure from Excessive HEAT.
  • WATER - In your utility room, look for gaps between floor, walls, and ceiling, and around conduit entry paths and terminations. Water will follow cables into rack-mounted and free-standing devices, then seek low points on the floor to pool. Being a good conductor with little resistance, water lets big current flow where it shouldn't, zapping anything in it's path.

    Use Silicone based sealer to fill gaps in walls and around conduit and cable terminations. Patch roof coatings and gaps around flashing now to stop water on it's way to Arizona.

    POWER - Spikes, shorts, lows and outages cause unplanned shutdowns and can damage electronics and data. Uninterruptible power supplies (UPS's) condition lines against low voltage brownouts and power outages, which can spike when power returns. If power remains off, the UPS can initiate normal shutdown and avoid data loss. Check UPS batteries using monitoring software or dashboard. Make sure power capacity supports what's plugged in: Servers can require 1500 VA, Desktop PC's 600 VA, Switches/Routers/Firewalls 350 VA.

    If you haven't checked your backups in a while, now is a good time. Review logs for frequency and successful completion, then restore a few test files and folders. If you're not sure, create a new full backup before the first storm hits. We're here if you need help.

    HEAT - Monsoon storms are accompanied by excessive heat. As dust accumulates inside enclosures and airflow around components slows down, it's like wearing a heavy jacket on a summer day with little wind. It won't take long to exceed your comfort zone. Most electronic components have built-in temperature limits that cause rapid shutdown to avoid damage. The best prevention is adequate airflow around the devices in a relatively dust-free environment, with all internal fans working well. Don't forget annual device cleanouts. Monsoon storms can be dramatic, but these tips can help protect both network and data.

Security Advisory

Creating A Strong Password

With the vast avenues of today's internet, hackers have more and more opportunity to do terrible things to innocent people like you. Hackers have many ways of acquiring your information. Those ways may seem little or insignificant, but in the grand scheme of things, it could mean whether or not your information will be stolen.

For instance, making your password harder to guess can be an easy first step. Hackers try to guess your password based off simple things such as the name of your pet, your phone number, or even your birthdate. In turn, professionals suggest your password contain words, acronyms, or phrases which are easy to remember, yet difficult for others to guess.

This video provides more information about how hackers attempt to gain access to your personal accounts and safety tips to keep your password strong and protected!

If you have any questions or need assistance in performing these steps, please do not hesitate to contact us.

Your Technology Partner,

The LeeShanok Team

Technical Update

"We want to take this opportunity to express how thankful we are to have great customers like you.

Thank you for your business.

As we celebrate our 20th year, we look forward to supporting you as your technology partner in 2017."