A Beginner’s Guide to Purchasing a Workstation

A Beginner’s Guide to Purchasing a Workstation

 

LUTZ BUSINESS INSIGHTS

 

a beginner’s guide to purchasing a workstation

melissa tejral, operations lead

 

In a world where we have technology in the palm of our hands, we can do most things without getting up. Although this is convenient, sometimes things are easier to do on a desktop. This guide will help you determine how to purchase the workstation that will best meet your needs. Some basic items that you should consider when looking to make a purchase are the processor, memory, hard drive, and the operating system.

 

The Processor

The processor is the brain of the computer. The highest processor isn’t always a necessity; in fact, most of the time, the middle of the road works for the majority of functionality. As application vendors continue to change their apps, they tend to require a little more processing power. So, ideally, avoiding the lowest power option will help you stretch the use of your workstation out for longer before needing to purchase a new one.

Currently, the i5 processors are the middle of the road and the best bang for your buck. The 9th generation processors are the most current option available (i5 9XXX). So, for example, if you are comparing models and see something that shows i5 6XXX, that means it is a 6th generation. The 6th generation processor is around three years old and probably still works, but with advancements in the last few years, you may not get the longevity out of it.

 

The Memory

You will typically see this labeled as RAM. Most consumer machines will come with 4GB, 8GB, or 16GB of memory space. Everything that is running on your computer at any time requires memory – every internet tab, application, etc. When very basic use, such as utilizing one application at a time, are the primary use, 4GB will get you by. However, 8GB is going to be your best bet for most everyday use and will allow multiple applications to be up at the same time without a reduction in performance.

 

The Hard Drive

Your hard drive houses all of your computer on it. This includes your operating system, applications, stored files, etc. There are two main options for your hard drive. An HDD is a standard hard drive. These typically come in larger capacities and are less expensive. They have several moving parts and are pretty basic.

The better bang for your buck is to look for a machine with a solid-state hard drive (SSD). These drives are generally faster and have fewer moving parts. They are more expensive for larger capacity drives, but your machine will function better with them, and they tend to last a little longer.

 

The Operating System

The operating system is the blanket that covers your computer. It allows your applications to run. All the components that your computer has on it are tied together in the operating system. So, when you tell an application to run, it gathers all the components of that application and runs it for you.

For Microsoft, the version you want to look for is Windows 10. If you plan to remote into your work computer from your new home computer, you will want to look for Windows 10 Pro as there are more security features. If you find a machine that looks like it’s a steal, but it has Windows 7 on it, you do not want to purchase that as Windows 7 will stop receiving support (updates and patches) from Microsoft in January 2020.

 

Storage

A few other tidbits, if you are someone who typically at home stores a lot of files or photos, you may want to consider an external hard drive. You can purchase larger capacity drives to store all your photos and files, so they are not bogging down your machine. If you run a lot of photo editing software or highly technical designing software, you will want to increase the processor and memory of the machine you purchase.

 

Warranty

Most consumer machines will come with a 1-year warranty. However, you may want to consider protecting your investment for longer by asking for an extended warranty. While most machines should have a lifecycle of about five years, covering that machine for a more significant amount of time will help protect your investment.

Whether your work permits the use of a workstation, or you just prefer to use one, being sure to purchase something that fits your specific needs is essential for optimal functionality. If you have any questions, please contact us today.

ABOUT THE AUTHOR

402.514.9166

mtejral@lutz.us

LINKEDIN

MELISSA TEJRAL + OPERATIONS LEAD

Melissa Tejral is an Operations Lead at Lutz Tech. She is responsible for managing the on-site coordination for support calls, preparing quotes for clients, maintaining IT business review coordination schedules, and assisting account managers and vCIOs.

AREAS OF FOCUS
  • Outsourced Technology Support
  • Internal Tech Operations
EDUCATIONAL BACKGROUND
  • Associates in Applied Sciences, Metropolitan Community College, Omaha, NE
THOUGHT LEADERSHIP
  • A Beginner's Guide to Purchasing a Workstation

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850

Decoding Tech Talk: 10 Technology Terms You Should Know

Decoding Tech Talk: 10 Technology Terms You Should Know

 

LUTZ BUSINESS INSIGHTS

 

decoding tech talk: 10 technology terms you should know

Steven brabec, IT account manager

 

Even if you don’t work in an IT department, you interact with technology daily. You don’t need to understand all the nuances of the various concepts and applications, but, at the very least, you should know some basics. Below are ten technology terms you might encounter.

1. Multi-Factor or Two-Factor Authentication: 

A second layer security measure for accessing an account. In addition to entering your username and password (the first authentication factor), you must provide an additional credential. The second credential typically is a randomly generated number or prompt on your phone to finish signing in to your account.

2. Office 365: 

A subscription online software service provided by Microsoft. Depending on your subscription plan, Office 365 can include email, the Microsoft Office software suite, and numerous other collaboration and communication tools.

3. Phishing:

An attempt by a cybercriminal to obtain your password, credit card, or other confidential information via email. Phishing uses deceptive emails and websites that claim and appear to be from legitimate entities.

4. SaaS:

Also known as software as a service. SaaS is a method of licensing an application where it is purchased with a subscription that allows access online. Typically, the application is not installed or hosted on local computers, but in a cloud and usually accessed via web pages.

5. Cloud Hosting:

Instead of managing your own physical server equipment, cloud hosting outsources to a cloud provider, such as Microsoft Azure or Amazon AWS, for storage and computing resources. Cloud hosting is spread across hundreds of virtual servers in the cloud providers network.

6. SIEM:

Also known as security information and event management (SEIM). This is a software solution that collects and analyzes log event data in real-time from network devices and applications to provide IT threat monitoring, event correlation and incident response.

7. Business Continuity:

A way of creating a system of prevention and recovery plans to handle potential threats to a company. Business continuity is an organization’s ability to ensure operations and core business functions are not severely impacted if some unplanned incident, such as a natural disaster or cyberattack, takes critical systems offline.

8. Centralized Password Management:

This consolidates account login credentials for multiple applications and devices across an organization’s network in one single application that requires only one login for access. It also allows IT administers more control over user security.

9. Disk Encryption:

A technology, such as Windows BitLocker, that protects information on a computer’s hard drive or USB flash drive by converting the data into unreadable code that cannot be deciphered easily by unauthorized people. A password key is required to decrypt the data.

10. Business Intelligence:

A technology-driven process of gathering data about various aspects of the business from multiple sources, analyzing the data, and converting that data into information and actionable insights that can be used to make strategic decisions.

 

As the use of technology continues to increase, it’s critical to have a general understanding of its main concepts and applications. This list of decoded terms will equip you with the knowledge necessary to better comprehend and use the various technological systems in our world today. For more information or questions, please contact Lutz Tech.

ABOUT THE AUTHOR

402.778.7960

sbrabec@lutz.us

LINKEDIN

STEVEN BRABEC + IT ACCOUNT MANAGER

Steven Brabec is an IT Account Manager at Lutz Tech with over eight years of information technology experience. He is responsible for working with clients to develop IT solutions that help them reach their business goals. Additionally, he will be providing account management support and IT consulting services. 

AREAS OF FOCUS
  • IT Consulting
  • Account Management
  • IT Security

 

EDUCATIONAL BACKGROUND
  • BS in Information Technology, Wayne State College, Wayne, NE
COMMUNITY SERVICE
  • Pinnacle Bank Championship, Volunteer

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850

Spotting IT Risks Before They Become a Problem

Spotting IT Risks Before They Become a Problem

 

LUTZ BUSINESS INSIGHTS

 

spotting it risks before they become a problem

jessica murray, LUTZ TECH account manager

 

With technology being as vital as it is to business, staying ahead of your IT troubles is an essential step to keeping your doors open. Being proactive with your IT goes a long way to preventing breaches of your network and sensitive data. Let’s look at some of the lurking threats to your systems and what you can do to spot them before they become a problem.

Infrastructure Risks

How old your hardware is can pose a risk. Once equipment gets more than a few years old, the manufacturer stops supporting it. The lack of updates means there are fewer people with the skills to fix problems, and it makes them more vulnerable to cyber-attacks.

One example of this is spectre, a security vulnerability that has been identified on chips that are over five years old. Using spectre, hackers can access computer data without you knowing.

It can also be difficult to access data and provide the lightning-fast service that many clients demand, as well as rising maintenance and energy costs. Software is similar in that it is only worthwhile as long as it is up to date. Cisco’s Annual Security Report found that out of the 115,000 devices they scanned, 92% ran software with known vulnerabilities. Upgrading your software and hardware will cost money, but it is much cheaper than a full-scale data breach.

Proper Redundancies

Having redundancies in your system is what keeps you up and running when something goes wrong. If something fails, or part of your system loses power, having a back up is essential to keep business running as usual. For smaller companies, this can be as simple as a spare laptop. More prominent companies require having systems like redundant ISPs, firewalls, and other systems.

Keep your data safe

The only way to ensure that your data will always be there and accessible is to back it up. If you have a disaster strike, are a victim to a cyber-attack, or have faulty hardware, still having access to all your data is essential. Data can be backed up on-site, where your business is located, or offsite, either another remote location or in the cloud. Keeping your data backed up in a variety of ways helps to ensure that you’ll always have it. The 3-2-1 back up strategy, for instance, is where you will keep three copies of your data in two different media, and at least one copy is backed up offsite.

If you need to keep it from prying eyes now, encrypt it. That means all communications in and out of your office need to be encrypted. For the most secure network full disk encryption, where the entire hard drive, including data, files, the operating system, and software is locked up, is a good idea. Most major vendors today offer full disk encryption.

Make sure only the Right People Get Access to Your System

People love to be lazy when it comes to picking passwords. Given a choice, we would use the same ones for almost everything. Having a proper password policy in place is crucial to make sure that the passwords your employees are using aren’t easy to predict. Setting minimum standards for length and complexity, having a system to change those passwords, and making sure that nobody is sharing that information helps to close the door on intruders.

Using tools like multi-factor authentication can help tremendously in keeping unwanted people off of your servers. While just a password can be hacked, it is much harder to fake your geolocation or login behavior patterns. Considering that 95% of cyber attacks are done using stolen login data, adding that extra step to your email, VPN and desktop logon will save a lot of headaches.

Business Continuity Plan with Disaster Recovery Plan

You need to have an answer to the question, “What happens when our services drop?” Having a plan in place gets things moving faster to fix problems and keeps people from panicking.

Business continuity refers to maintaining business functions going or quickly restarting them if something happens. If the power goes out, where will everyone work? Will they go home, to another office, to the nearest Starbucks? How will you access data when part of the network is down? How long can you afford to be down, and how can you ensure you won’t go over that time? Who are you going to call? The better you can answer these questions now, the better off you will be when the worst happens.

Start by identifying these things: the scope of the plan, key business areas, critical functions of your business, identify dependencies you have between regions, find the acceptable downtime, and plan how to maintain operations.

Your disaster recovery plan focuses on getting your IT infrastructure up and running after something happens. If a disaster hits, will you be ready? Can you withstand a fire, flood, or cyber-attack? Do you have your data backed up offsite? Do you have a telephone backup plan? Having effective plans tested and in place will allow you to stay competitive no matter what.

In summary, understanding the risks your company faces relating to its technology is crucial in helping prevent any possible issues before they arise. Staying on top of all of these measures will keep your IT up and running and will instill confidence in your company for your clients and customers. If you need assistance, or if you have any questions, contact Lutz Tech today!

 

ABOUT THE AUTHOR

402.514.0000

jmurray@lutz.us

LINKEDIN

JESSICA MURRAY + ACCOUNT MANAGER

Jessica Murray is an Account Manager at Lutz Tech. She has over 5 years of experience in the technology field. Jessica is a trusted advisor that sees clients through the full sales cycle. Her responsibilities include developing proposals and providing recommendations to clients to assist them in reaching their business goals.

AREAS OF FOCUS
  • Client Relations
  • Technology
EDUCATIONAL BACKGROUND
  • BS in Management Information Systems, Briar Cliff University, Sioux City, IA

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850

Lutz adds Howes, McLane, Schriner, and Shafer

Lutz adds Howes, McLane, Schriner, and Shafer

 

LUTZ BUSINESS INSIGHTS

 

Lutz adds howes, mclane, schriner, and shafer

Lutz, a Nebraska-based business solutions firm, welcomes Jessica Howes, Andy McLane, Dakota Schriner, and Jeffrey Shafer.

Jessica Howes joins Lutz as a Talent Sourcer in the Omaha office. She is responsible for interviewing and placing candidates for Lutz Talent clients. Howes focuses on recruiting for the accounting, finance, office administrative and human resource industries. Graduating from the University of Nebraska at Lincoln, Jessica received a Bachelor’s degree in hospitality management with a minor in leadership communication. 

Joining Lutz Tech as a Systems Engineer, Andy McLane brings over 18 years of technology systems and engineering experience to the team. He is responsible for installing, configuring and maintaining application software and system management tools. Andy graduated from the University of Nebraska at Lincoln with a Bachelor’s degree in biological sciences. McLane works in Lutz’s Lincoln office.

Dakota Schriner joins Lutz’s accounting division as a Staff Accountant in the tax department. He performs complex consulting, as well as controversial service projects. Projects include assisting clients with tax-related issues from pursuing tax incentives, to managing state tax audits. Dakota received his Bachelor’s degree in accounting and management information systems from the University of Nebraska-Omaha. Dakota works in Lutz’s Omaha office.

Bringing over eight years of industry experience, Jeffrey Shafer joins Lutz Tech as a Systems Administrator in Lutz’s Omaha office. He is responsible for ensuring all systems are in working order through day-to-day system repairs and maintenance. Specifics include software installations, security inspections, server upkeep, troubleshooting and other technical support for end-users. Graduating from Bellevue University, Jeffrey received his Bachelor’s degree in information technology.

 

RECENT POSTS

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850

Cybersecurity Awareness Month + 8 Tips to Keep You Protected

Cybersecurity Awareness Month + 8 Tips to Keep You Protected

 

LUTZ BUSINESS INSIGHTS

 

cybersecurity awareness month + 8 tips to keep you protected

 

Cybersecurity is an ever-prominent, continuously evolving topic in the business world today. With new technological advancements daily, it can be challenging to stay on top of the latest “trends” in cybersecurity. Meaning, if you’re unaware of the latest cybercrime tactics, it will be difficult to evade its lures.

Luckily, here at Lutz, we have a team of tech-sperts who can help you understand what these cyber threats look like, and how to protect yourself and your business from becoming the next victim. Below are a few tips to help you stay safe and secure in the cyber-world:

#1

There are two ways cybersecurity threats are generated, internally and externally. Internal threats are the most common and cause about 55% of cybersecurity issues, while external threats cause about 45%.

Learn more: https://www.lutz.us/cyber-security-best-practices-for-your-business/

 

#2

Cybersecurity for your business, as well as for you individually, starts with understanding cyber threats and prevention measures in four primary areas: phishing, account security, physical security, and personnel security.

Learn more: https://www.lutz.us/staying-safe-cyberspace/

 

#3

When businesses want to keep their data safe and secure no matter where it’s located, they often use a virtual private network (VPN). It creates a safe way to access corporate data online over networks that are not encrypted or secure, such as free public Wi-Fi networks.

Learn more: https://www.lutz.us/should-your-company-be-using-a-vpn/

 

#4

Two-factor authentication is becoming the standard for many businesses. By simply requiring an additional form of authentication, for example, sending a text to your phone with a unique code to verify your login, helps to drastically reduce the probability that cyber attackers will be able to penetrate your system.

Learn more: https://www.lutz.us/two-factor-authentication-new-standard-online-security/

 

#5

At Lutz Tech, we advise all our clients to take widely accepted precautions such as using unique passwords, avoiding public Wi-Fi when accessing or sharing sensitive information, and regularly scanning for viruses and malware. On top of that, we recommend that our clients adopt a 3-step approach to guide them in preventing phishing attacks and minimizing damage if they occur.

Learn more: https://www.lutz.us/3-steps-to-help-you-steer-clear-of-phishing-scams/

 

#6

Securing your organization’s email is more important than ever. Microsoft 365’s addon, Advanced Threat Protection, includes anti-phishing capabilities that can detect email spoofing by hackers.

Learn more: https://www.lutz.us/microsoft-office-365-email-security/

 

#7

Your organization needs a robust Wi-Fi security policy that will protect its network from unauthorized access; without compromising the network availability or productivity for authorized users.

Use our four best practices that will help you ensure your business’s Wi-Fi network offers the highest level of protection to your organization.

Learn more: https://www.lutz.us/business-wi-fi-secure/

 

#8

If your business falls victim to cybercrime, it’s important to contact your financial institution immediately.

Other resources to contact in the event of a breach include your local FBI office, county sheriff’s office, police department, or division of criminal investigation. You should also report a breach at ic3.gov.

Learn more: https://www.lutz.us/cyber-security-best-practices-for-your-business/

 

There are many useful tools that can help you stay secure online. These resources, along with continued education, will help give you the protection you need in today’s cyber-world. Contact one of our Lutz Tech members today for or more information on cybersecurity, or to help you answer any questions.

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850

Running a Smarter Business + Simple Steps to Start Using Analytics

Running a Smarter Business + Simple Steps to Start Using Analytics

 

LUTZ BUSINESS INSIGHTS

 

running a smarter business + simple steps to start using analytics

ryan wade, software solutions manager

 

Small business managers wear many hats throughout the day: sales, operations, service, and support. Often, the days feel like a blur just keeping up with daily tasks. You know there is a better way, but it can feel overwhelming to add one more “thing” to the list. Spending time looking at data and ways to improve feels intimidating. What can analytics tell you that you don’t know by working in the business?

If this sounds like you, then this blog will provide a practical overview of data analytics, the benefits, and simple steps to help you get started.

 

What is analytics?

Asking what is “data analytics” is like asking what is “sales.”  It is a broad term. A simple way to think of data analytics is the practice of gaining knowledge from business information at the time when you need it. Reports are reactive, meaning they look in the past, where analytics are more real-time to help make informed decisions. Large companies have always used analytics to run their business, but today’s technology makes it more cost-effective for small businesses to implement best practices.

 

So when is the right time?

The truth is that not every business is ready. Becoming a more efficient, profitable or fast-growth company will require change, and change is difficult. Over time, implementing this may cause you to change processes, employees or customers, so at its core, the leadership needs to be committed to change.  But, with change comes rewards of working smarter.

 

Signs you are ready to get started:

  • You have standard processes in place and implemented systems
  • You use basic reports today but would value real-time data
  • Your systems “have the data”, but you need to combine it with spreadsheets to gain any real insight
  • You have a goal for the company that will help justify your efforts (growth, revenue, profitability, compliance, etc.)

 

How do I get started?

Once you’ve determined you are ready, there are simple steps you can take prior to engaging consultants like Lutz Tech.

 

Define your goal
  • As with any project, you need to determine the return on investment and the overall goal. Be specific with what you are looking to accomplish, such as, we want to know the true profitability of our client contracts.
Determine your key indicators
  • Starting with the end in mind can help simplify the process. Identify no more than three high level or low “indicators” that helps you understand the real-time health of your business or department.
  • Think of this as your wish list of what you want to know about the business. Once you have your list, prioritize them in terms of the value they bring you versus the complexity to get the information.
Keep it simple
  • With the list you’ve created, choose one or two indicators that are straightforward and add value immediately. The goal is to use these indicators as experiments that help you learn how to best implement analytics.
Map the inputs and process
  • Once you’ve determined what you are trying to learn, you need to determine what data you need to get to the result. This information may not come from the same system, and that is ok. It may not be easy to get, and that is ok too. The purpose of this exercise is to determine what needs to change in order to get the information you need to run a smarter business. The change will come next.
Create reports that demonstrate the vision
  • For those that are starting from scratch, use spreadsheets to combine data from systems and flush out what you are looking to create.
  • Measure the value that the information would bring the business if you were able to efficiently implement a process to get the information real-time.
  • Focus on the information that adds enough value to implement changes to processes or systems.
  • For those that are already using spreadsheets to combine data from different systems and looking for a more scalable solution, Microsoft Power BI is a natural next step. Power BI’s platform is free to try.

In summary, analytics can serve as a critical tool in helping your business grow and become more profitable. Questions? Contact us today!

ABOUT THE AUTHOR

402.778.7958

rwade@lutz.us

LINKEDIN

RYAN WADE + SOFTWARE SOLUTIONS MANAGER

Ryan Wade is a Software Solutions Manager with Lutz Tech and has over five years of relevant experience. His primary responsibility is to manage the software solutions team and client relationships.  He also maintains standards and procedures for the department, both internally and externally.

AREAS OF FOCUS
  • Software Consulting
  • Client Relationships
  • Professional Services Industry
  • Real-Estate Industry
  • Banking Industry
EDUCATIONAL BACKGROUND
  • BSBA, University of Nebraska, Lincoln, NE
  • MBA, Creighton University, Omaha, NE
COMMUNITY SERVICE
  • Business Ethics Alliance, Committee Member
  • Greater Omaha Chamber of Commerce, Audit Chair

SIGN UP FOR OUR NEWSLETTERS!

We tap into the vast knowledge and experience within our organization to provide you with monthly content on topics and ideas that drive and challenge your company every day.

Toll-Free: 866.577.0780  |  Privacy Policy

All content © Lutz & Company, PC

 

OMAHA

13616 California Street, Suite 300

Omaha, NE 68154

P: 402.496.8800

HASTINGS

747 N Burlington Avenue, Suite 401

Hastings, NE 68901

P: 402.462.4154

LINCOLN 

601 P Street, Suite 103

Lincoln, NE 68508

P: 531.500.2000

GRAND ISLAND

3320 James Road, Suite 100

Grand Island, NE 68803

P: 308.382.7850