Buying Pre-Owned Computers with Used Software: Know Before You Buy

Buying a used computer can seem extremely cost effective. However, it’s helpful to know what problems may arise. Used computers often come with preloaded software, a tempting way to save money and time. Some programs have non-transferrable licensing agreements that place you in breach of contract situations when they run secondhand. Before buying a used computer, be sure to ask the following questions to avoid potential software licensing infringements.

What type of software license does the preloaded software fall under?

There are many software license types and understanding the agreement associated with each application is important. Is the software licensed as Original Equipment Manufacturer (OEM), Individual, Volume, Client Access License (CAL), Node Locked, Subscription, Trial, or Free (to name a few)? Can the preloaded software legally transfer to you as the new owner?

OEM software can be especially tricky if you are buying secondhand. OEM software is sold with the original hardware it was installed on. It is important to ask the seller about the software provided with the computer and if all the hardware, such as the motherboard, is from the original computer. In some cases, such as with Microsoft, replacement of the motherboard in any way other than through the manufacturer counts as non-original hardware, and a new license needs to be purchased.

The experts at the St. Louis IT company Anderson Technologies recommend getting answers to these questions before you buy. Many computers are preloaded with automated End User Licensing Agreements (EULA) requiring acceptance of terms and conditions before using the computer and the software on it. If the EULA is signed by a different person (possibly from a different state or country), you could be flagged for a software audit.

What installation media is provided in case it needs to be reinstalled?

This is a precautionary measure in case the computer crashes. If the hard drive failed on a pre-owned computer, how would you restore it? Depending on the type of backup you have, fixing a crashed computer involves replacing the faulty hardware, re-installing the operating system, downloading all drivers, and re-installing the used software. You might have to go back to the computer manufacturer and prove you are the legitimate owner of the computer in order to reload and activate the operating system. “Even when you are the original owner this can be a time consuming process,” says Mark Anderson. “It can be even more daunting when you are missing crucial original purchase information.” Make sure the computer comes with all software license keys and system documentation and keep it handy.

Are software license keys provided and validated?

Some license keys included with the purchase of the computer may only be valid for the original purchaser. While the legality of this type of transaction is under review, it is still prudent to be aware and make sure the used software and any licensing agreements are transferrable to the new owner.

In this increasingly global environment, it is also important to know the differences in laws between countries. Vernor v. Autodesk, Inc., which involved the resale of pre-owned licenses of AutoCAD software on eBay, potentially set a precedent in the United States that software licenses are not resalable. However, this is not the case in other countries. According to Jennifer Baker at PCWorld, the European Court of Justices ruled that, “The exclusive right of distribution of a copy of a computer program covered by such a licence [sic] is exhausted on its first sale.” Meaning once bought, anyone can sell a license in the same way one would sell a movie or video game they purchased.

Is the installed software updated?

Most software companies provide regular updates to their programs and expect owners to update them on a regular basis. If a used computer has preloaded software that hasn’t been updated in a long time, the software may have reached its end-of-life (EOL) and updates are no longer available. In this case, be prepared to spend more money purchasing new software and be sure to factor this into the overall cost of the used machine.

Knowing the answers to these questions eliminates some of the more common mistakes associated with buying pre-owned computers. Discuss your needs with a professional IT support team.

Based in St. Louis, Anderson Technologies has over 25 years of experience providing IT support to businesses across the country. You can reach an IT support professional at 314-394-3001 or by email at info@andersontech.com.

Anderson Technologies is a St. Louis IT company. The information in this article provides general information about computer licensing agreements and is not to be considered specific legal advice.

Wireless Security — How Vulnerable Is Your Network?

Complementary Wi-Fi is such a commonplace service in our modern-day landscape that most customers expect it as part of every business’s onsite offerings. Customers tap into public wireless access points (WAPs) everywhere they go. Before you open up your business’s network, carefully consider how to implement wireless security and shield your firm’s proprietary and private data from public view.

While traveling, how often have you tried to wirelessly connect your smartphone to the internet only to find several visible networks? You may notice most listings are paired with a lock symbol, indicating blocked public access. Without this protection, anyone with the right tools could gain access to private data. To protect yourself, never connect to a public Wi-Fi network that doesn’t provide a secure encryption.

A wireless network that segregates public and private traffic gives visitors guest network rules and a password that allows them to access only the areas you choose. IT support specialists at Anderson Technologies recommend this kind of network as an essential element to secure sensitive data. They also suggest configuring it for Wi-Fi Protected Access II (WPA2) utilizing strong passwords. WPA2 offers essential encryption and authentication to guard against unauthorized access to your network. This protocol, combined with a hardware firewall, allows employees to securely access the internet and shared files or folders within your company’s digital infrastructure.

In addition to protocols that enable wireless security, IT support experts at Anderson Technologies recommend regularly updating passwords on all company computers and devices (see our blog on Password Security). This includes changing access passwords on all wireless networks. It’s also important to continually update software. New versions contain patches that ensure existing vulnerabilities are taken care of.

“Once you’ve established wireless security in the office environment, don’t forget to set up guidelines for employees traveling with laptops, including common sense computer-use protocols,” said Mark Anderson, a principal partner of Anderson Technologies. “For instance, always be aware of your surroundings when entering passwords. Never attach to an unsecured/unencrypted network, and know what steps to take if a company device is misplaced.” Employees should always use caution and verify networks are legitimate before connecting to Wi-Fi in public spaces like airports and hotels.

Follow these wireless security guidelines to help keep your company data secure and guard against hacker attacks.

Providing companies in St. Louis wireless security as a part of a larger IT support program involves many areas of attention. For more information about establishing a segregated wireless network at your business, contact the St. Louis IT experts of Anderson Technologies at 314.394.3001.

Top Considerations When Selecting a Cloud Backup Provider

In the past two years, 63 percent of small and medium businesses (SMBs) began using an online or cloud-based backup service.

Clutch, a B2B research firm, recently surveyed 304 SMBs who use cloud-based, online backup solutions to determine how businesses use the technology and what they think about it. Mark Anderson, Principal and IT Strategist for Anderson Technologies, was one of several industry experts to review and provide feedback for Clutch’s publication on the survey’s findings. Specifically, he pointed to three factors that SMBs should consider when selecting a backup solution.

  1. Level of Service Offered

A big name does not automatically equate to big results for your business. SMBs surveyed listed Apple iCloud as the most popular backup solution used at work, followed by Google Drive and Dropbox.

Top 3 Backup Services Used at Work

However, despite these services’ popularity, they do not have full-service offerings. They may not meet a business’s more complex backup and recovery needs.

The prevalence of these three services point to companies focused on performing more file-level backups versus “bare-metal” backups. Companies wouldn’t be able to quickly and efficiently recover an entire server this way, and depending on their tolerance for downtime, they should investigate augmenting these offerings with other, more robust options.

  1. Capability to Perform Dual-Destination Backups

Do you want to store data both on-premise and online? If so, make sure your online backup solution can perform dual-destination backups. This setup provides peace of mind in the case of total data loss.

An overwhelming majority of SMBs — nearly 90 percent — already use both online and onsite backup.

Does your company use both online and on-premise backup?

In the event of a physical disaster, backing up data to the cloud allows SMBs to get back on their feet quickly.

The ability to perform a dual-destination backup gives clients the option of quick on-premise file restores as well as cloud recovery in the case of complete office loss due to fire, flood, or other natural disasters.

Meanwhile, having the option of on-site backup can assuage fears of the cloud’s potential failures since many businesses remain wary of the technology’s ability to keep data secure.

For years, on-premise was the only option available to businesses. This history is ingrained in IT departments the world over, and the fact that you can physically control the process is very compelling. However, it’s important to consider the cloud option in parallel.

  1. Cost Breakdown

Cost is one of the top three challenges SMBs face when deciding to use a cloud-based, online backup solution as well as one of the top fears that can prevent SMBs from adopting cloud services.

The majority of SMBs spend between $250-$5,000 yearly on their online backup. The top percentage (23%) spend $501-$1,000.

Yearly Spending on Online Backup Solutions

There are three primary factors influencing the price tag for online backup providers:

  1. The number of systems that need to be protected
  2. The amount of data being stored indefinitely
  3. Provision of dual-destination backup

However, the cost of using online backups should be contrasted with an SMB’s ability to provide the same level of service in-house. The security and reliability of top-tier cloud vendors’ state-of-the-art data center infrastructure and the systems they put in place will be far more robust and stringent than what a small to medium-sized business can afford.

While online backup solutions’ accessibility, cost efficiency, and security make them a smart choice for small businesses, it is necessary to consider the array of product choices carefully before selecting a service.

If you’d like to look into cloud backup services for your business with one of Anderson Technologies’ specialists, please give us a call at 314.394.3001 or send an email to info@andersontech.com.

Data Backups

Where is My Backup Located?

You may not believe this at first, but geography can be essential to the integrity of computer systems. If your company experiences a local disaster, where you house your backup data becomes imperative. The following computer backup solutions illustrate the three location-specific types, each with pros and cons.

  1. On-Premise

Implementing an on-premise backup is a simple way to establish a local backup data repository. These backups are straightforward to put in place and can be saved to external hard drives, flash drives, tapes, or other electronic media. Computers can be programmed to back up files automatically or manually. We recommend systematizing the process and establishing a backup schedule that meets your company’s data recovery requirements.

  1. Offsite

Some businesses perform an offsite backup daily or weekly to a removable media device and then transport it to a separate location. It is important to store your data in more than one physical location should something happen at the primary office to compromise the integrity of the local backups. While this may seem arduous and time-intensive, offsite backups protect against theft, fire, or other natural disasters that could otherwise compromise your business.

  1. Cloud-Based

Utilizing a reliable internet connection, cloud-based services automatically back up data from your local systems to remote servers over secure, encrypted connections. Depending on the options selected and how they are configured, some cloud-based backup solutions can also be programmed to save a second copy of data to a local data repository. This gives a company the best of both worlds (on-premise and offsite through the cloud) and provides peace of mind that all of your digital data is safe and available in case anything happens to your computers.

Which of These Backup Solutions Is Right for You?

On-PremiseOffsiteCloud-Based
System RequirementsBackup host computer, backup software, external hard drive(s), tapes, or other electronic mediaBackup host computer, backup software, removable mediaSoftware subscription, reliable internet connection
Costs/FeesHigher initial out-of-pocket cost for backup software and backup mediaHigher initial out-of-pocket cost for backup software and removable backup media; Occasional purchases of additional removable media (depending on retention policy)Monthly fee varies based on number of machines to backup and amount of data
Time to ManageAfter initial setup, the system is programmed to back up files automatically but user monitoring is required to audit processManual backups can be performed anytimeAfter initial setup, the system is programmed to back up files automatically; Full monitoring available
Data AccessibilityOn-premise onlyMust be retrieved from offsite locationAvailable via secure credentials anywhere internet connection is available
Data EncryptionLimited by hardware and softwareLimited by hardware and softwareFull data encryption
SynchronizationCan be programmed to execute backups frequently — hourly, daily, weekly, etc.None; Remote media transfers handled manuallyCan be programmed to execute backups frequently —continually (in some cases), hourly, daily, weekly, etc.
Risk/LiabilitySingle location point of failureRemovable media could be lost, stolen, or dropped/corrupted in transitRetrieval of data unavailable during internet outages (unless local copy also configured)

At Anderson Technologies, the backup solution we most frequently recommend is a cloud-based solution that has the ability to perform a “dual-destination” backup. Clients have on-premise recovery options as well as cloud recovery in the case of complete office loss due to fire, flood, or other natural disasters.

If you’d like to consult with one of our specialists about your backup system needs, please call us at 314.394.3001 or send an email to sales@andersontech.com.

Cloud Computing

Why Move to Cloud Computing?

We’ve all heard this popular term or even know someone whose company has embraced it…. But is the cloud right for your business? In its most basic sense, cloud computing enables users to run programs from the internet that traditionally would’ve run from an application installed locally on their computer.

Most clients are rightfully cautious when adopting new technology, especially when it comes to keeping their data secure. Previously, a server room of expensive equipment was the only option. This is no longer the case. Utilized correctly, cloud computing helps businesses on multiple fronts.

Here are eight benefits of cloud computing.

  1. Accessibility

Applications and company data are accessible whenever and wherever you or your employees need them. Utilizing desktop computers, laptops, mobile phones, tablets – anything with an internet connection – you’re no longer limited to one physical location. Your programs and data are available from the office, home, while traveling – anywhere.

  1. Immediate Data Updates

Most cloud providers synchronize data changes as they occur so others can see the updates almost immediately. This is especially helpful for co-workers who need to share data in real time.

  1. File Versioning

Depending on subscription levels, many cloud providers offer file versioning for a period of time (i.e., 30 days). This allows you to undo saved changes or restore a file if it gets corrupted by going into the archive list and reinstating a previous copy.

  1. User Permissions

With cloud computing systems, it’s easy to limit access to data through the implementation of granular user permissions. Users can only view and interact with files that their permissions allow them to access.

  1. Data Redundancy

The cloud essentially enables users to have multiple copies of their data—a local copy and a copy in the cloud. If you experience a device failure, no problem! Your files are immediately available by logging into the cloud environment on the internet. Once the failed device is replaced, your data synchronizes back to you from the cloud copy to the new hardware.

  1. Popular Software Integration / User Collaboration

Many cloud providers now offer direct software integration with popular productivity suites such as Microsoft Office, providing easy ways for teams to collaborate on projects that share files stored directly on cloud drives.

  1. State-of-the-Art Data Centers with No Capital Expense

Commercial, enterprise-level cloud providers store your data in very secure data centers on redundant hardware in multiple locations. This would be cost prohibitive for most businesses to implement and maintain on their own.

  1. Security

Another benefit to having your data in the cloud is the peace of mind gained from knowing your files are secure. If something were to happen to your PC or laptop, such as theft, you can remotely wipe the hard drive the next time it connects to the internet and safeguard your company’s sensitive data.

If you’d like to explore the potential of cloud computing for your business with one of Anderson Technologies’ IT specialists, please give us a call at 314.394.3001 or send us an email to info@andersontech.com.

St Louis IT Experts Assist Financial Services

St. Louis IT Experts Assist Financial Firm for Over 15 Years

For deep-value investing firm Towle & Co., it pays to have St. Louis IT experts advising them on the computer systems running their business. Towle & Co. has worked with Anderson Technologies for over 15 years, seeking advice whenever technology changes or industry requirements demand it. When you pay for professionals to plan your entire network, you can be confident your systems are properly configured.

Joe Bradley explains, “In IT, you’re totally exposed to whoever comes in, so trust is paramount. Anderson Technologies is a trusted resource — we can trust them completely.”

A few years ago, Anderson Technologies helped Towle & Co. move their file and application servers to an industry-specific cloud-based solution. Regulatory requirements were changing, and cloud-based systems offered improved reliability and redundancy. Towle & Co. wanted to maintain client data security while ensuring regulatory compliance and turned to the St. Louis IT experts at Anderson Technologies to help investigate options that best supported these needs.

After a successful cloud migration, Towle & Co. still had local computing infrastructure to maintain, and Anderson Technologies configured it for maximum long-term performance. While a server typically lasts between three and five years prior to being upgraded, many small businesses look to stretch their investments by extending the service life of their equipment. Anderson Technologies understands this fiscally prudent approach and helps its clients take full advantage of equipment investments while guarding against potential complications that might arise from such a strategy.

Last year, Towle & Co. experienced a hard drive failure on a seven-year-old server. Anderson Technologies had architected the server with a RAID (Redundant Array of Independent Disks) subsystem. As a result, Towle & Co. did not suffer a second of downtime — or lose a single file. The system continued to operate properly until the issue could be permanently addressed.

Towle & Co. chose to invest in Concierge Services for this new installation. Thus, after turning up the replacement server, the St. Louis IT experts at Anderson Technologies reconfigured every workstation so staff wouldn’t experience any difference in their workflows. They preserved all users’ local desktop customization, maintained internet favorites for each browser, and mapped printers correctly. There was no interruption to employee work.

To avoid the potential headaches that come from server failures, the safest and most cost-effective solution is to invest in Managed Tech Services to monitor systems. It’s easy to ignore maintenance issues, but this approach results in more frequent equipment malfunctions. All small businesses should regularly audit current systems to ensure proper security measures are in place, review performance, and establish an appropriate data backup strategy.

If you are currently struggling with a computer challenge, we’d love to help! Please either call us at 314.394.3001 or complete our Contact Us form online.

A St. Louis Disaster Recovery Story: Saving a Client’s Computer Systems during a Potential Flood

“They tell me our building is going to flood! We need to get all the computers up off the floor!”

That’s what we heard at the end of December when one of our clients called in a panic. A St. Louis County Building Inspector cancelled the inspection of a neighboring property because “that area will soon be under two feet of water.” Smile Station Dental needed help immediately! Municipal officials and news agencies warned of historic flood levels for the Mississippi and Meramec rivers.

Long before this incident, the Army Corps of Engineers advised Smile Station that their offices weren’t in a flood plain, but in late December 2015, Mother Nature decided differently. Fortunately, they had ignored the advice and purchased flood insurance anyway.

Though safeguarded with insurance, every wise business person knows time is money, and downtime without properly functioning computer systems leads to lost revenue.

Smile Station is a Citadel-level Managed Tech Services client who found Anderson Technologies a calm and helpful presence in the midst of a holiday emergency. With the warning of possible flood waters, the client madly scrambled to elevate equipment off the floor – every server, workstation, uninterruptable power supply, network cable, etc. They called and Anderson Technologies answered immediately. “I’ll be there right away,” Principal Mark Anderson said and dropped what he was doing to arrive onsite as quickly as possible.

All of Anderson Technologies’ St. Louis-based Systems Administrators are calm under pressure, and while the situation was chaotic, Mark remained unruffled and methodical. “He quickly and competently jumped right in and helped us get all the computer equipment up as high as we could. We weren’t worried about functionality; we just wanted to save everything,” explained Jo Ann Emery, one of the principals at Smile Station. Mark made sure everything was shut down, disconnected properly, moved to “higher ground,” and could be easily re-installed after the danger passed.

Once the client’s equipment was secured, Mark assisted a Smile Station neighbor in the same predicament. He found Dougherty Orthodontics doing all they could to protect against the threat of rising waters. They didn’t have flood insurance, and their IT support firm wasn’t local so they had no one to call for onsite assistance. Owner Stefanie Dougherty explained, “I’m completely paperless so everything in my business is on computers. That is how I survive. I never thought in a million years that this would be an issue; Mark was absolutely my knight in shining armor.”

Our team went right to work. Office Manager Lynn Hager said, “You’re like a tech angel!” As this was the first time visiting the office, Mark took photos of all critical components and corresponding wiring before disconnecting them, documenting how everything was connected, and noting any customized wiring. “A little bit of foresight up front can save hours of frustration down the line,” Mark advised. Armed with these photos everything could be confidently and reliably re-installed without confusion.

As it turned out, the building was fortunately spared any flooding. Stefanie talked about the process of putting everything back in place after the danger had passed and what it was like to work with Anderson Technologies throughout the whole ordeal. “Just by working with Mark on this one issue, it was clear to see that we have the same high standard of business ethics. We are so grateful to have found them!”

As a St. Louis-based computer expert, Anderson Technologies knows a thing or two about flooding. Computers and water don’t mix well together, and when flooding is predicted, business owners need to be aware of potential damage to their critical computer systems. If there is any chance you may find your business in this situation, here are a few tips to consider:

  1. Establish a well-thought-out and documented Disaster Recovery Plan
  2. In addition to local backups, backup your data to a remote, offsite location and thoroughly test restoring from it at least once per year
  3. Document your network and computer infrastructure configuration as completely as possible, including the names and emergency contact information for all critical vendors and business partners
  4. After safeguarding your equipment but prior to the flood, shut off power to the office to minimize damage due to power shorts
  5. Re-evaluate your needs and your plan once the danger has passed

If you have disaster recovery planning needs, please call us at 314.394.3001 to discuss this topic.

St. Louis Company Software upgrade

Six Reasons Not to Perform a Software Upgrade

When should I upgrade my software? What do you do when the notice comes to update?

Some blindly click “OK.” Others ignore update messages for months on end. Some now-wary computer users have horror stories about how their digital lives came to a screeching halt for several days due to glitches associated with a software upgrade.

Whether it’s an update to your smartphone’s operating system or Microsoft’s enticement for a free copy of Windows 10, our world is full of opportunities to upgrade to the latest version of everything. Our instinct may be to immediately upgrade, following the logic: “Of course I want the latest and greatest! Think of all the ‘new and improved’ features I’ll be able to take advantage of!”

But wait just a moment. There are good reasons to exercise a little caution.

Here are six to make you think twice before hitting “OK”:

  1. You haven’t recently backed up your data, email, contacts, photos, videos, etc., to an external source – doing so enables recovery if the upgrade goes horribly wrong.
  2. Your hardware doesn’t have the capacity to effectively run the updated software. If you’re running older computers, upgrading to new software may consume more memory and disk space or overly tax the CPU, potentially bringing your machines to a screeching halt and resulting in unplanned hardware purchases.
  3. The user interface of the new software is so foreign compared to the existing version, productivity is negatively impacted while you learn its idiosyncrasies.
  4. All bugs aren’t fully ironed out of the new software. Unless your business absolutely requires a particular feature the new software offers, let other users “stub their toe” on corner-case problems. Wait a few months to upgrade.
  5. You‘ve misplaced the necessary information (software license keys, passwords, etc.), which may be needed during the upgrade process. Locate all required information for the update prior to proceeding.
  6. Updating existing software might result in being unable to access old files, which for business reasons must be left in their original format. Make sure the new software works with older file versions without needing to convert them.

Before hastily updating software to the latest version, consider the impact on other aspects of your business’s technology and work flow. After performing a complete backup, carefully review the software’s requirements before making the decision to move forward. Determine if you will truly benefit from the upgrade.

If you need a second opinion before undertaking a software update, please don’t hesitate to give us a call at 314.394.3001. We’d love to help!

St. Louis Computer Company IT TechWatch Newsletter

First IT TechWatch of 2016

We hope your year is off to a wonderful start! St. Louis finally received its first snowfall, and everything looks beautiful outside.

On January 21st, we sent out this month’s IT TechWatch, which featured several articles on critical technology issues important to every business ranging from data security to the IT infrastructure necessary for success. Our client feature article explains how implementing a proactive Managed Services program improved the reliability of a long-time client’s pet care business. Finally, we’re thrilled to introduce you to the newest member of our expert computer team, Luke Bragg.

If you’d like to receive our newsletter on an ongoing basis, there’s a sign-up section on our home page.

St. Louis Computer Experts-IT Infrastructure Success

St. Louis Computer Experts Share Their Secrets for IT Infrastructure Success

The start of a new year is full of expectation and a great time to look forward and plan how to best grow and “do things better.” We recently spent time reflecting on some of the IT challenges we’ve seen small to mid-sized businesses experience and how best to avoid them. The question becomes, “What do businesses need to do well in the IT infrastructure space in order to best set themselves up for success?”

Two primary categories must be addressed: internal and external systems and efforts. Throughout the coming year, our St. Louis computer experts will share more detailed information on many of these areas to give you technological peace of mind. For now, let’s take a quick look at infrastructure issues you need to be thinking about.

Internally: Within Your Office

  1. Maintaining a stable computer infrastructure environment
    • How well do your workstations, servers, routers, firewalls, printers, and other hardware operate? Are they secured against external threats? Are they up-to-date or just “limping along?”
  2. Having a reliable wired and wireless network
    • Do clients or employees bring their laptops to meetings in conference rooms? Do you allow open access to your Wi-Fi network, or are those networks password-protected? Do you have both PCs and Macs and, if so, can they talk to each other? Can they both save documents to any shared drives you may have? When you send something to the printer does it actually print, or does it go into a “black hole” of unprinted documents?
  3. Managing robust network security
    • Your networks should be secure and accessible only by those with approved access. Are there any vulnerabilities in your systems that need to be remedied?
  4. Consistently backing up business-critical data
    • Losing a file erases your time, data, and effort. Make sure you have backups that actually work. Have you tested your backup systems recently to see if you can actually retrieve a document from your backup system? Just because it’s sitting somewhere “in the cloud” doesn’t necessarily mean that it’s properly backed up.
  5. Protecting computer infrastructure and business-critical data from malware: viruses, spam, ransomware (cryptolocker)
    • It only takes one corrupted file to wreak havoc with your whole data infrastructure. If you are in a non-critical industry, it might not seem worth the extra effort to properly protect yourself. But if data reliability and systems functionality are important to your business, you’ll want your systems locked down like Fort Knox.
  6. Protecting clients’ private data
    • Whether the law requires you (for firms entrusted with sensitive client information) or whether it’s more of an expectation in your industry, you need to have the proper systems in place to protect customer records and personal data.
  7. Being vigilant against developing cyber threats
    • Cybercrime happens at the speed of data. Hackers know that a brilliant piece of malicious code today will be worth very little six months from now. They won’t wait, neither should you.
  8. Complying with all governmental regulations appropriate for your industry (HIPAA, etc.)
    • For some industries, there are very specific, very strict rules that need to be followed; for others, there are merely “guidelines” that act as the hallmark of a company following “best practices.” Do you know the rules for your industry, and do you have a plan to keep abreast of changing regulations?

Externally: What Do You Need?

  1. Reliable e-mail platform capable of weeding out spam as much as possible
    • Of the hundreds of e-mails you get a day, how many of them could be classified as digital junk mail? Can you access your e-mails from anywhere, and does your e-mail automatically update in a timely manner? While it might seem like a hassle to switch e-mail platform providers, the benefits might be worth it!
  2. A digital presence which accurately communicates your organization’s value to your target audience
    • Websites, social media platforms, SEO efforts, Google AdWord campaigns and a whole host of other digital outlets should put you in the spotlight in the most strategically-grounded way.
  3. Reliable website hosting
    • Not all web hosting is created equal. For a few additional dollars per month, have the confidence your website is automatically backed up,secured from external threats, and kept “up-to-date.”
  4. Reliable telephony infrastructure
    • How many problems do you experience with your VoIP phone system in a day?Lost calls equate to frustrated customers and potentially lost sales. Don’t let an outdated telephone system weaken your growth efforts.
  5. The ability to collaborate effectively with clients, employees, and vendors
    • Let’s face it; we live in a shared, digital world where sending files via FTP and e-mail is considered too slow. People don’t want to wait for files to be delivered via e-mail; they want them immediately! And they want to be able to make changes and share those changes with colleagues or clients right now. Set yourself up with fastest methods of data transfer and enhance your collaboration efforts.

There are a many components to keep track of and successfully put in place in order to fully realize a reliable IT infrastructure. Master them and your business will experience less hassles, less downtime, and less computer angst. Keep a firm grasp on these core concepts and you’ll experience more—more productivity, more confidence, and more success.

And as always, if you have a pressing need we’d be happy to help!