The Ultimate Guide to Ransomware Protection

A few weeks ago, a delivery guy walked into our office. As we signed for the package, he realized that we work in cyber security and asked the following question:

"My entire music collection from the past 11 years got encrypted by ransomware. Is there anything I can do about it?

They’re asking for $500 for the decryption key."

"Do you have a backup?"

He looked down and said a bitter "no.”

Frontier Business Products In Ricoh's 2019 RFG Circle of Excellence

We are happy to announce Frontier Business Products has been recognized as a 2019 RFG Circle of Excellence Certified Dealership by Ricoh USA, Inc. This status comes after meeting or exceeding several criteria including service organization structure, field staff and help desk productivity and efficiency measures, customer satisfaction measurement process and system, effective utilization of Ricoh resources, parts and supplies.

15 Ways to Protect Your Business From a Cyber Attack!

Cyber Security Best Practices

Cybersecurity threats pose significant risks to businesses, particularly those that have poor security measures in place. One in five small businesses will suffer a cyber breach this year. About 81% of all breaches happen to small and medium sized businesses, and 97% of breaches could have been prevented with current technology. If you are responsible for protecting your data and confidential information from hackers and other cyber threats, take the time to review these 15 best practices.

Four Tech Trends Small Businesses Need to Know

If you run a small business and you’d like a competitive advantage, noticing and staying ahead of technology trends is one of the most important ways to gain an edge over your competition.Consider that only 53% of small businesses have a website, and it’s easy to see that just a little tech-savvy-ness can go a long way when it comes to standing out in the small business world. In fact, Fast Company reported that roughly only half of small businesses reported spending more than $5,000 on IT in recent years.

When It Comes to Data Security, Convenience Can Be Trouble

Home Office

Most workers put convenience ahead of security policies, according to research from CEB—with 90% of them admitting to ignoring them when they feel they have to.

Almost two-thirds of employees report regularly using personal technologies for work, primarily for the sake of convenience. For example, most workers confess to sending a file from their company computer to a personal email account so they can work while not in the office.

5 Reasons Why Small Businesses are Taking to the Cloud

In case you have missed it, the adoption of cloud-based technology is rapidly growing, especially among small businesses. In fact, it is probably safe to assume your business is using cloud-based tools in some capacity. However, what exactly is the “cloud?” Without getting into the nitty gritty details of cloud computing, let us just say that the cloud generally refers to a collection of servers located at a central location that store data or serve various technologies, usually to a large number of people.

Smart Integration Workflow Ideas Draws Ricoh Honors

Frontier Business Products Logan Lyles Wins Ricoh Integration Workflow Award

Congratulations to our very own Logan Lyles (photo left) who was a recent winner in the Ricoh Smart Integration Workflow Contest. Logan’s workflow entry was deemed one of the best among a very elite list of submissions across the USA.  The  contest was intended to create more valuable automated workflows Ricoh dealers may use to add value  to customers. Congratulating Logan is Ken Lucero, Solutions Support Specialist, Dealer Division at Ricoh. Logan is the Director of Integrated Solutions at Frontier Business Products. 

With Knowledge Comes Greater Certainty

Selecting a new multifunctional printer (MFP) is an experience you shouldn’t have to repeat all that often if you understand the most important aspects of your decision.  And while there are many variables and considerations within such a move, it’s important to put more emphasis on the nature of your business and where it is heading and less concern over other factors that may not improve your life as much as you would hope.

Network Security and Fake Patches

Network Security and Fake Patches

We talk a lot about threats to data security on this blog, and personal experience has probably acquainted you with everything from Trojan Horses to phishing.

Here’s a particularly sneaky threat that’s becoming more and more common: fake patches.


Is your office mobile friendly?

Is your office mobile friendly?

Mobility isn’t just a fad, it’s a firm reality in the modern workplace. BYOD or “bring your own device” was coined in 2005, but went into use in 2009, when Intel realized employees were bringing their own devices into the workplace and connecting them to company data. Many companies were not properly prepared for the challenges BYOD posed for IT and management, so its popularity took a slight dive as security breaches and legal implications became a real threat.

Subscribe to News

Serving Colorado since 1979...