IT News
May/June 2017  
In This Issue

All 2017 eRecycling proceeds are donated to Kate's Club.  Kate's Club empowers children facing life after the death of a parent or sibling. Read more about their mission here!
Connect With Us

This issue includes our latest Case Study on Gameday Leggings. It is a great example of the most agile Cloud solutions for a growing company. Low cost of entry with instant scalability allows them to get their game and technology on!

The CEO Fraud scam is now a billion dollar industry.  Even tech-savvy companies like Google and Facebook are listed among the victims. Our series on Cyber Safety for Employees continues with ways to spot and stop phishing scams.

As always, please reach out with questions, suggestions or comments!

Cyber Security for Employees - The Presentation
Technology alone cannot keep us safe online.  Trained and vigilant, employees are the only defense against scams like the CEO Fraud.

LAN Systems has designed an employee training program focused on the latest threats. We use real examples to show you how to spot the clues and avoid the traps. Don't be a victim, learn how to recognize a cyber scam.
If you are interested in the training for your company or organization, please contact
Case Study:  Gameday Leggings

About Gameday Leggings
Gameday Leggings came to life during the 2014 football season. We are fashion fanatics and wanted some tiger striped leggings but couldn't find any. So, we decided to make some...just for us. We started with the SEC and we've now expanded to multiple conferences and pro teams. We love the games but most of all, the fun we have just being a FAN! Get your GAMEDAY ON!
" We need connectivity and real time ability to interact with our shoppers whether they are online consumers or wholesale retailers -up 24/7/365. Even when we have had small company bumps (all companies have them) LAN was a phone call away and helped us stay connected and operationally sound. LAN helps us Get our GameDay On!! "     -Lisa Malvea, CEO
Executive Summary   
Gameday Leggings was created out of a passion for football and fashion. Team spirit on college campuses is a time-honored tradition of cheering, tailgating and dressing for the occasion. Throughout the country, college coeds search for ways to support the team and make a statement. This passion is not limited to our SEC alma maters. Our pro team fans feel it too.
The message may be time-honored, but the delivery is ultimately modern. Today, social media, mobile technology and anywhere, anytime connectivity drives the gameday experience. Getting the word out is a technology masterpiece that shows how our love for sports affects all generations. From the young to the young-at-heart, gameday fashions transcend age.
Technology is essential to reach so many, so quickly. And modern technology is perfect for Gameday Leggings' mobile workforce, distribution network and growing marketplace. As an online retailer, Gameday Leggings understands the need for technology, so as they expanded their operation it made sense to choose a modern, Cloud infrastructure.
Gameday Leggings has distributed manufacturing, a mobile workforce and receives orders through several outlets. To control inventory, fulfill orders and stay connected, they need reliable and flexible infrastructure. Their employees and ambassadors need to connect from anywhere, anytime for productivity and they must react quickly to market changes.
As a growing company, Gameday Leggings needs solutions that are economical and scalable. Additionally, with their fast growth, their solutions must scale quickly with little to no downtime. They need to get new staff up-to-speed quickly to maximize efficiency and productivity.
Technology solutions must be powerful, yet simple and agile, to satisfy their rapid growth.   Hardware and software must scale with ease to meet the demands for growth without large capital expenditures.
A Complete Cloud Environment
Using the Cloud for all operations was a touchdown for Gameday Leggings. The ability to access applications and database from anywhere, anytime served their operational needs. Utilizing Cloud servers not only saved the initial capital expenses, but also reduced the operational expenses by simplifying maintenance and facility costs. Additionally, the Cloud gives a fully-scalable environment that allows for quick and easy expansion of their position in the Cloud. For their rapid growth, the characteristics of the Cloud outweighed on-premise solutions.
Data is protected with built-in local redundancy provided by Azure. Since this is a full Cloud installation, all disaster recovery operations are Cloud-based.
They tackled stringent user demands for communication and access with mobile solutions selected for easy use and quick turnaround. Implementing a Windows Server Domain allows for solid user management, authentication and security. They simplified their vendor-management and access by providing secure access with authentication through Azure Active Directory.
The new infrastructure is built on Microsoft Server and Cloud services by Azure. Below is a summary of some of the modernization features:
  • Cloud server with Microsoft Server 2012 R2 used for AD, file and application publishing, including accounting and shared resource access
  • Microsoft Office 365 for email and collaboration
  • Azure workload that provides anywhere, anytime access and high server availability
  • Robust backup and disaster recovery that utilized a complete Cloud solution
Results, Return on Investment and Future Plans
Gameday Leggings' choice of Cloud servers gave them the most flexible, reliable infrastructure to manage today's IT demands and offers unlimited scalability for growth. ROI is realized by avoiding costs associated with hardware, power consumption and colocation space.
Their choice of Office 365 provides the strong communication and productivity features needed for a growing organization. New employees can quickly get up-to-speed and have all necessary resources at their fingertips.
Gameday Leggings has an IT environment that is full-featured, scalable and positions their winning team for substantial growth.
Click here for more information on Gameday Leggings.
Cyber Safety for Employees - Phishing
Phishing . . . any number of scams that want to hook you and steal from you
Phishing can be an email, IM, phone call or website that tricks you into doing something that gives up your personal information or grants access to your computer. As you can imagine, the name comes from fishing. You bait a hook and see what you get. It is not surprising that so many people are taken in by phishing scams. The scams are quite plentiful and the bait looks like the real thing. Phishing is the number one way of delivering ransomware. And with Ransomware as a Service (RaaS) on the rise, you must protect yourself. In this article, we look at the most common phishing attempts, how to spot them and avoid being a victim. Remember, just like learning anything, it takes practice to spot phishing and other online scams. Keep your eyes open and be vigilant.

Phishing emails with malware

They are so cleaver. They look real and come at a time when your guard is down. Getting you to act, before thinking is their aim. Whether notifications from a bank saying your account is locked or UPS saying your package has been returned, the attack is only successful if you fall for it and click the link.  If you do fall for it and click the link, you have probably loaded ransomware.  If you don't have a good backup, it will be a nightmare.

The best way to protect yourself is to be suspicious of every email you get with a link.  You can hover over the link to see where it goes. Even with this check, it may look legitimate.  If you have any suspicions, don't click on it.  Train yourself to always use your browser to secure sites for banking, shopping, etc.

Phishing emails looking to get your login

We have seen so many of these lately. They are trying to get you to put in your email login and password.  If you do, they will log into your email account and steal your contacts.  Your contacts become their next set of victims.  Not only will they send malware to your list, but they will try the same tactic to get their email lists. Phishing email is the number one way to deploy malware so the more email addresses they acquire, the bigger the net.

Never enter you email login and password from an email link.  Always navigate to the secure site from your browser.  If you have any doubt at all, don't enter your login, password or personal information.

Err on the side of caution

If you have any doubt, stop.  Get someone to look at it with you. Think about it.  Look at it again. Remember, the phisher is hoping your will act impulsively, not rationally.  Often, if you look harder at phishing attempts the scam becomes clear.  Take a second look, it could prevent the nightmare of identity theft and ransomware. If you believe an email or other communication may be legitimate, contact the company directly to inquire before doing anything. 

Mobile phishing

Fake apps are on the rise. Since so many use their mobile devices for everything from email to banking, cracked and pirated apps are used to nefariously gather personal data.  Don't believe that any device is safe.  Never use apps from an unknown source and if you think your mobile device has been hacked, wipe the device and install factory defaults.  You'll have to start again, but better safe than sorry.

Email phishing has many of the same risks on mobile devices. Often the smaller screen and the on-the-go nature of the device, makes it easier to fall for the scheme.  Be extra careful of clicking on links and entering data on your mobile.  The device may not be prone to the same malware, but scams that get you to enter your login and password can be launched on any platform. 

Cloud phishing

We all use the Cloud.  Many of us use gmail, Office365, DropBox, iCloud and dozens of other Cloud applications, so it is easy to create phishing emails that target one or more of the Cloud services that you use.  Just because you use that service, don't fall for the email telling you that you must login for any reason.  They want to steal your login and password.

If a hacker gets your credentials, you will most likely have to change your password and contact the Cloud service.  It is important to determine what was stolen, compromised or modified if they successfully gained access to your account.

Consider two-factor authentication on your online accounts if available.  This will give you another layer of protection.


If you see something suspicious, report it.  Merchants, banks and law enforcement should be contacted if you suspect your identity has been stolen. Phishing can be reported to US-CERT at, the Anti-Phishing Working Group at, FTC at or the Internet Service Provider/Registrar.   If you see something that concerns you and want to discuss, you can contact at our HelpDesk at 770 662-0312 or email