Community involvement Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/community-involvement/ Your Office Technology Partner Thu, 13 Oct 2022 22:56:30 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://lesolson.redpeppersoftware.net/wp-content/uploads/2021/11/cropped-LO_ITfavicon-1-1-32x32.png Community involvement Archives - Les Olson IT https://lesolson.redpeppersoftware.net/blog/tag/community-involvement/ 32 32 Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 https://lesolson.redpeppersoftware.net/blog/concerned-about-cyber-4-easy-steps-for-staying-secure-in-2022/ Fri, 30 Sep 2022 18:29:57 +0000 https://lesolson.com/?p=17307 Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

The post Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 appeared first on Les Olson IT.

]]>
[cz_image id=”cz_74627″ image=”17331″][/cz_image]
[cz_gap height=”30px”][cz_title id=”cz_99764″]Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a seemingly endless news cycle dedicated to cybersecurity mishaps and concerns.

 

And with this onslaught of negative news, it can be easy for everyday individuals to become overwhelmed and feel powerless in the face of the “insurmountable” threats posed by cybersecurity. But nothing could be further from the truth.

 

With all the jargon that is typically thrown around in relation to cybersecurity, there is a longstanding misperception that cybersecurity is beyond everyday people and that it should be left to professionals. Moreover, there is a prevailing sense among the public that breaches are simply a fact of life and that we should just learn to deal with them. But this just isn’t true. In fact, everyday people have a huge role to play in cybersecurity threat prevention, detection, and remediation. For example, according to IBM, 95% of breaches have human error as the main cause. Therefore, everyday day technology users are very much the first line of defense when it comes to thwarting cybercrime. Unfortunately, though, many individuals are not aware of some of the best practices for boosting cybersecurity and how easy they are to use.

 

With that, here are a few key best practices that everyday people can implement today to enhance their own cybersecurity and create a more secure world for everyone.[/cz_title]

[cz_gap height=”100px”]
[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”-6″ image=”17315″ id=”cz_57663″ sk_css=”padding-right:30px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_36977″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Watch out

For Phishing

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Phishing – when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today. In fact, 80% of cybersecurity incidents stem from a phishing attempt. However, while phishing has gotten more sophisticated, keeping an eye out for typos, poor graphics and other suspicious characteristics can be a tell-tale sign that the content is potentially coming from a “phish.” In addition, if you think you have spotted a phishing attempt be sure to report the incident so that internal IT teams and service providers can remediate the situation and prevent others from possibly becoming victims.

[cz_gap height=”100px”]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_78857″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Update your Passwords or Use

a Password Manager

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Having unique, long, and complex passwords is one of the best ways to immediately boost your cybersecurity. Yet, only 43% of the public say that they “always” or “very often” use strong passwords. Password cracking is one of the go-to tactics that cybercriminals turn to access sensitive information. And if you are a “password repeater,” once a cybercriminal has hacked one of your accounts, they can easily do the same across all your accounts.

One of the biggest reasons that individuals repeat passwords is that it can be tough to remember all the passwords you have. Fortunately, by using a password manager, individuals can securely store all their unique passwords in one place. Meaning, people only must remember one password. In addition, password managers are incredibly easy to use and can automatically plug-in stored passwords when you visit a site.

[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”6″ image=”17320″ id=”cz_62832″ sk_css=”padding-left:32px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”100px”]
[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”-6″ image=”17325″ id=”cz_47699″ sk_css=”padding-right:30px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_52772″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Enable

Multi-Factor Authentication

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Enabling multi-factor authentication (MFA) – which prompts a user to input a second set of verifying information such as a secure code sent to a mobile device or to sign-in via an authenticator app – is a hugely effective measure that anyone can use to drastically reduce the chances of a cybersecurity breach. In fact, according to Microsoft, MFA is 99.9 percent effective in preventing breaches. Therefore, it is a must for any individual that is looking to secure their devices and accounts.

[cz_gap height=”40px” id=”cz_13892″ height_tablet=”30px”][cz_title bline=”cz_line_after_title” smart_fs=”true” id=”cz_62625″ sk_lines=”background-color:#ba0230;width:60px;top:0px;”]Activate

Automatic Updates

[/cz_title][cz_gap height=”30px” id=”cz_58641″]

Making sure devices are always up-to-date with the most recent versions is essential to preventing cybersecurity issues from cropping up. Cybersecurity is an ongoing effort, and updates are hugely important in helping to address vulnerabilities that have been uncovered as well as in providing ongoing maintenance. Therefore, instead of trying to remember to check for updates or closing out of update notifications, enable automatic update installations whenever possible.

[cz_gap height=”25px” height_tablet=”10px” height_mobile=”10px”][cz_image parallax_h=”true” parallax=”6″ image=”17320″ id=”cz_37090″ sk_css=”padding-left:25px;margin:0 auto;position:relative;”][/cz_image]
[cz_gap height=”100px”]
[cz_image id=”cz_19172″ image=”17219″][/cz_image]
[cz_gap height_tablet=”10px” height_mobile=”10px”][cz_title id=”cz_75729″ cz_title=””]

Learn even more about Cybersecurity

with industry professionals

[/cz_title][cz_gap height_tablet=”10px” height_mobile=”10px”][cz_button title=”Security Summit Overview” btn_position=”cz_btn_center” text_effect=”cz_btn_txt_move_down” id=”cz_77690″ link=”url:https%3A%2F%2Flesolson.com%2Fsecurity-summit%2F|title:Security%20Summit” sk_button=”font-size:24px;text-align:center;line-height:20px;background-color:transparent;background-image:linear-gradient(0deg,#5b0000,#ba0230);padding:20px 30px 35px;border-radius:5px;” sk_hover=”color:#ffffff;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;” alt_title=”Register” alt_subtitle=”FREE FREE FREE” cz_button=””]

[cz_gap height=”100px”]
[cz_gap height=”100px”]

The post Concerned About Cyber? 4 Easy Steps for Staying Secure in 2022 appeared first on Les Olson IT.

]]>
3 Fundamentals for Shoring Up Phishing Defenses https://lesolson.redpeppersoftware.net/blog/3-fundamentals-for-shoring-up-phishing-defenses/ Thu, 07 Oct 2021 23:32:56 +0000 http://lesolson.com/?p=16149 From Ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing -- one of the oldest pain points in cybersecurity -- is continuing to quietly wreak havoc, and is as big of a threat as it has ever been.

The post 3 Fundamentals for Shoring Up Phishing Defenses appeared first on Les Olson IT.

]]>
[cz_image fx_hover=”cz_image_zoom_in” id=”cz_76584″ image=”16150″][/cz_image]
[cz_title id=”cz_103138″]

Week 2: 3 Fundamentals for Shoring Up Phishing Defenses

From Ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing — one of the oldest pain points in cybersecurity — is continuing to quietly wreak havoc, and is as big of a threat as it has ever been.

Despite often being overlooked in terms of hype, phishing has been a mainstay in the cybersecurity threat landscape for decades. In fact, 43 percent of cyberattacks in 2020 featured phishing or pre-texting, while 74 percent of US organizations experienced a successful phishing attack last year alone. That means that phishing is one of the most dangerous “action varieties” to an organization’s cybersecurity health. As a result, the need for proper anti-phishing hygiene and best practices is an absolute must.

With that in mind, here are a few quick best practices and tips for dealing with phishing threats.

1- Know the Red Flags

Phishes are masters of making their content and interactions appealing. From content design to language, it can be difficult to discern whether content is genuine or a potential threat, which is why it is so important to know the red flags. Awkward and unusual formatting, overly explicit call outs to click a hyperlink or open an attachment, and subject lines that create a sense of urgency are all hallmarks that the content you received could be potentially from phish and indicate that it should be handled with caution.

2- Verify the Source

Phishing content comes in a variety of ways, however, many phishes will try to impersonate someone you may already know — such as a colleague, service provider or friend — as a way to trick you into believing their malicious content is actually trustworthy. Don’t fall for it. If you sense any red flags that something may be out of place or unusual, reach out directly to the individual to confirm whether the content is authentic and safe. If not, break-off communication immediately and flag the incident through the proper channels.

3- Be Aware of Vishing and Other Phishing Offshoots

As more digital natives have come online and greater awareness has been spread about phishing, bad actors have begun to diversify their phishing efforts beyond traditional email. For example, voice phishing — or vishing — has become a primary alternative for bad actors looking to gain sensitive information from unsuspecting individuals. Similar to conventional phishing, vishing is typically executed by individuals posing as a legitimate organization — such as a healthcare provider or insurer — and asking for sensitive information. Simply put, it is imperative that individuals be wary of any sort of communication that asks for personal information whether it be via email, phone or chat — especially if the communication is unexpected. If anything seems suspicious, again, break-off the interaction immediately and contact the company directly to confirm the veracity of the communications.

 


 

Phishing may be “one of the oldest tricks in the book,” but it is still incredibly effective. And although it may be hard to spot when you may be in the midst of a phishing attempt, by exercising caution and deploying these few fundamentals, individuals and organizations more broadly can drastically mitigate the chances of falling victim to a phishing attack.[/cz_title][cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_36078″ image=”16120″ css_width=”50%”][/cz_image]

[cz_gap height=”25px”][cz_title id=”cz_59603″]

Does your businesses cybersecurity method have you up during the night with worry?

Are you looking for options to help you rest easy? Get a consult with one of our Expert IT Specialists for a Free Network Analysis and get risk score that will tell you how secure your network is.[/cz_title][cz_gap height=”30px”][cz_button title=”Learn More about Les Olson Company’s” btn_position=”cz_btn_block” btn_effect=”cz_btn_fill_right” sk_button=”font-size:17px;color:#ffffff;font-family:Assistant;background-color:#ba0230;border-style:solid;” id=”cz_36193″ link=”url:https%3A%2F%2Flesolson.com%2Fservices%2Fcybersecurity%2F” sk_hover=”color:#ffffff;background-color:#e9283b;” subtitle=”Business Cyber Security Offerings”]

[cz_image link_type=”custom” id=”cz_16225″ image=”7812″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”][/cz_image]
[cz_title id=”cz_59995″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”]

Get a FREE, Comprehensive Network Analysis

Let us provide a no-obligation health assessment of your computer network and business technology. We will analyze your network to identify vulnerabilities. Depending on what we uncover, we will also make suggestions on ways to augment security systems and get more out of your existing technology infrastructure.[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”]

The post 3 Fundamentals for Shoring Up Phishing Defenses appeared first on Les Olson IT.

]]>
Get Familiar with Cyber Basics https://lesolson.redpeppersoftware.net/blog/get-familiar-with-cyber-basics/ Mon, 04 Oct 2021 21:44:13 +0000 http://lesolson.com/?p=16112 Cyber-attacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks and stay one step ahead of malefactors.

The post Get Familiar with Cyber Basics appeared first on Les Olson IT.

]]>
[cz_image fx_hover=”cz_image_zoom_in” id=”cz_85305″ image=”16113″][/cz_image][cz_gap height=”30px”]
[cz_title id=”cz_11473″]

Week 1: Get Familiar with the Cyber Basics

 

At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWinds and Kaseya breaches, as well as high-profile attacks on the Colonial Pipeline and other critical infrastructure. Furthermore, as underlined by recent breaches, cyber-attacks are becoming more sophisticated with more evolved bad actors cropping up each day. Luckily, there are several steps that we can take daily to mitigate risks and stay one step ahead of malefactors. Here are a few quick tips:

 

Enable MFA

 

Multi-factor authentication (MFA) adds a necessary second check to verify your identity when logging in any of your accounts. By requiring multiple methods of authentication, your account is further protected from being compromised, even if a bad actor hijacks your password. This way, MFAs make it more difficult for password cracking tools to enable attackers to break into accounts.

 

Use strong passphrases/password manager

 

This may seem obvious, but all too often securing strong passphrases/password managers is overlooked. People spending more time online during the pandemic Have certainly contributed to more bad actors prowling for accounts to attack. Using long, complex and unique passwords is a good way to stop your account from being hacked, and an easy way of keeping track and remembering your passwords is by using a password manager.

 

Perform software updates

 

When a device prompts that it’s time to update the software, it may be tempting to simply click postpone, and ignore the message. However, having the latest security software, web browser, and operating system on devices is one of the best defenses against online threats. So, don’t wait – update.

 

Do your research

 

Common sense is a crucial part of maintaining good online hygiene. And, an intuitive step to stay safe online is to do research before downloading anything new you are downloading to your device, such as apps. Before downloading any new learning app on your device, make sure to check who created the app, what the user reviews say, and if there are any articles published online about the app’s privacy and security features.

 

Check your settings

 

Be diligent to double check your privacy and security settings, and be aware who can access your documents. This extends from Google Docs, to Zoom calls, and beyond. For meetings on Zoom, for example, create passwords so only those invited to the session can attend, and restrict those who can share their screen or files with the rest of the attendees.

 

 

Being cyber smart and maintaining stellar online hygiene is the best way to protect yourself and others from cyber-attacks. No single tip is foolproof, but used together they can make a valuable difference for taking control of your online presence. Following these tips is also easy, and free. By taking preventive measures and making a habit of practicing online safety, you can decrease your odds of being hacked exponentially – and prevent lost time and money. (As well as annoyance.)

Keeping our interconnected world secure requires all of us to be proactive and diligent. Learn how you can #BeCyberSmart this #CybersecurityAwarenessMonth at staysafeonline.org/cybersecurity-awareness-month/


[/cz_title][cz_image css_position=”relative;display: table;margin:0 auto” link_type=”custom” id=”cz_44236″ image=”16120″ link=”url:https%3A%2F%2Fstaysafeonline.org%2Fcybersecurity-awareness-month” css_width=”50%”][/cz_image][cz_gap height=”20px”][cz_title id=”cz_109675″]Need More help getting your business cybersecure? At Les Olson Company we can help! We have everything you need from Firewalls, Security plans, and Disaster Recovery plans. Speak with an IT expert today![/cz_title]

[cz_image link_type=”custom” id=”cz_16225″ image=”7812″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”][/cz_image]
[cz_title id=”cz_14328″ link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||”]

Get a FREE, Comprehensive Network Analysis

Let us provide a no-obligation health assessment of your computer network and business technology. We will analyze your network to identify vulnerabilities. Depending on what we uncover, we will also make suggestions on ways to augment security systems and get more out of your existing technology infrastructure.[/cz_title][cz_gap][cz_button title=”Request Your Free” btn_position=”cz_btn_block” text_effect=”cz_btn_txt_move_down” id=”cz_21447″ subtitle=”NETWORK ANALYSIS” link=”url:%2Fservices%2Fit-services%2Fnetwork-analysis%2F|||” sk_button=”font-size:18px;text-align:center;line-height:20px;background-color:#ba0230;padding-right:30px;padding-left:30px;border-radius:0px;” sk_hover=”color:#ffffff;background-color:#e8283b;” sk_subtitle=”font-size:17px;color:rgba(255,255,255,0.6);font-weight:400;” sk_icon=”border-radius:4px;padding:10px 10px 10px 10px;margin-left:-8px;margin-right:12px;background-color:#ffffff;”]

The post Get Familiar with Cyber Basics appeared first on Les Olson IT.

]]>
2020 Uplift Families Parenting Conference Sponsorship https://lesolson.redpeppersoftware.net/blog/2020-uplift-families-parenting-conference-sponsorship/ Sun, 02 Feb 2020 16:49:28 +0000 https://lesolson.com/?p=13482 We were a proud sponsor of the 2020 Uplift Families Parenting Conference. We commend their commitment to connect parents and organizations with programs, resources and information to help promote strong families and meaningful parent-child relationships.

The post 2020 Uplift Families Parenting Conference Sponsorship appeared first on Les Olson IT.

]]>
[cz_image id=”cz_63295″ image=”13485″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_106815″]We were a proud sponsor of the 2020 Uplift Families Parenting Conference. We commend their commitment to connect parents and organizations with programs, resources and information to help promote strong families and meaningful parent-child relationships.[/cz_title]

The post 2020 Uplift Families Parenting Conference Sponsorship appeared first on Les Olson IT.

]]>
2018 Amicus Invitational Marquee Sponsor https://lesolson.redpeppersoftware.net/blog/2018-amicus-invitational-marquee-sponsor/ Tue, 25 Sep 2018 14:14:56 +0000 https://lesolson.com/?p=12847 We were proud to be the Marquee Sponsor of the 2018 Amicus Invitational, a Golf Tournament raising funds for Intermountain Research and Medical Foundation.

The post 2018 Amicus Invitational Marquee Sponsor appeared first on Les Olson IT.

]]>
[cz_image id=”cz_30890″ image=”12850″][/cz_image][cz_gap height=”25px”][cz_title id=”cz_38396″ cz_title=””]We were proud to be the Marquee Sponsor of the 2018 Amicus Invitational, a golf tournament raising funds for Intermountain Research and Medical Foundation.

 

This year the foundation’s focus is on suicide prevention and substance abuse. Money raised at the Amicus Invitation will go toward enhancing Intermountain Healthcare’s existing behavioral health network structure. These networks create access to timely behavioral health follow-up care for low-income patients discharged from an Intermountain facility. We are honored to assist Intermountain Research and Medical Foundation in their efforts to counter the heartbreaking problem of suicide in Utah.[/cz_title]

The post 2018 Amicus Invitational Marquee Sponsor appeared first on Les Olson IT.

]]>
2018 Utah Summer Games https://lesolson.redpeppersoftware.net/blog/2018-utah-summer-games/ Thu, 14 Jun 2018 19:03:50 +0000 https://lesolson.com/?p=10897 We were proud to be a bronze sponsor of the 2018 Utah Summer Games, a festival for athletes of all ages and abilities.

The post 2018 Utah Summer Games appeared first on Les Olson IT.

]]>
[cz_title id=”cz_80894″ cz_title=””]We were proud to be a bronze sponsor of the 2018 Utah Summer Games, a festival for athletes of all ages and abilities.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_27698″ image=”11195″][/cz_image]

The post 2018 Utah Summer Games appeared first on Les Olson IT.

]]>
Ronald McDonald House Charities TV Donation https://lesolson.redpeppersoftware.net/blog/ronald-mcdonald-house-charities-tv-donation/ Thu, 31 May 2018 20:20:30 +0000 https://lesolson.com/?p=10900 Ronald McDonald House Charities created a beautiful CORNERSTONES OF LOVE DONOR WALL. We were able to donate the flat-screen TV in honor of Matt Olson.

The post Ronald McDonald House Charities TV Donation appeared first on Les Olson IT.

]]>
[cz_title id=”cz_55840″ cz_title=””]Ronald McDonald House Charities created a beautiful CORNERSTONES OF LOVE DONOR WALL. We were able to donate the flat-screen TV in honor of Matt Olson.[/cz_title][cz_gap height=”25px”]
[cz_image id=”cz_24598″ image=”11200″][/cz_image]
[cz_image id=”cz_75737″ image=”11202″][/cz_image]
[cz_gap height=”25px”][cz_image id=”cz_34392″ image=”11201″][/cz_image]

The post Ronald McDonald House Charities TV Donation appeared first on Les Olson IT.

]]>
2018 Utah Open Pro-Am https://lesolson.redpeppersoftware.net/blog/2018-utah-open-pro-am/ Tue, 23 Jan 2018 18:57:17 +0000 https://lesolson.com/?p=10894 We were proud to be able to support Special Olympics Utah is a great asset to our community, giving children and adults with intellectual disabilities. We did this through our annual Utah Open Pro-am, which raises money for Special Olympics Utah and the great work they do.

The post 2018 Utah Open Pro-Am appeared first on Les Olson IT.

]]>
[cz_title id=”cz_39184″ cz_title=””]We were proud to be able to support Special Olympics Utah is a great asset to our community, giving children and adults with intellectual disabilities. We did this through our annual Utah Open Pro-am, which raises money for Special Olympics Utah and the great work they do.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_59658″ image=”11364″][/cz_image]

The post 2018 Utah Open Pro-Am appeared first on Les Olson IT.

]]>
2017 Road Home Donation https://lesolson.redpeppersoftware.net/blog/2017-road-home-donation/ Tue, 26 Dec 2017 20:38:08 +0000 https://lesolson.com/?p=10920 We recently had the opportunity to visit the Road Home in Salt Lake City to deliver a donation from Les Olson Company. We are proud to be able to help The Road Home and are thankful for the resources they provide to people experiencing homelessness.

The post 2017 Road Home Donation appeared first on Les Olson IT.

]]>
[cz_title id=”cz_19092″ cz_title=””]We recently had the opportunity to visit the Road Home in Salt Lake City to deliver a donation from Les Olson Company. We are proud to be able to help The Road Home and are thankful for the resources they provide to people experiencing homelessness.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_61311″ image=”11352″]Left to right: James Olson, Gary Facer, Matt Minkevitch, Dee Norton, Troy Olson, Scot Olson[/cz_image]

The post 2017 Road Home Donation appeared first on Les Olson IT.

]]>
2017 U.S. Marine Corps Reserve Toys for Tots Drive https://lesolson.redpeppersoftware.net/blog/2017-u-s-marine-corps-reserve-toys-for-tots-drive/ Thu, 21 Dec 2017 20:42:05 +0000 https://lesolson.com/?p=10927 Each year during the holidays, we try to encourage everyone at Les Olson Company to do something to brighten Christmas for others. In the past we’ve been sponsors of the Angel Tree program, gathering donations from employees in each of our offices. This year, we were excited to shift our efforts to another great program, Toys for Tots.

The post 2017 U.S. Marine Corps Reserve Toys for Tots Drive appeared first on Les Olson IT.

]]>
[cz_title id=”cz_63456″ cz_title=””]Each year during the holidays, we try to encourage everyone at Les Olson Company to do something to brighten Christmas for others. In the past we’ve been sponsors of the Angel Tree program, gathering donations from employees in each of our offices. This year, we were excited to shift our efforts to another great program, Toys for Tots.

 

The Toys for Tots program, organized by the U.S. Marine Corps Reserve, collects toys to distribute as Christmas gifts to children who otherwise may feel left out at Christmas time. We collected new, unwrapped toys in each of our offices, and were overwhelmed by the generosity of all those who participated. We’re touched that our employees were willing to help children in our community feel the joy of Christmas.[/cz_title][cz_gap height=”25px”][cz_image id=”cz_110690″ image=”11357″][/cz_image][cz_gap height=”25px”]

[cz_image id=”cz_89920″ image=”11358″][/cz_image]
[cz_image id=”cz_78274″ image=”11359″][/cz_image]

The post 2017 U.S. Marine Corps Reserve Toys for Tots Drive appeared first on Les Olson IT.

]]>