Don’t Wait for Your IT Infrastructure to Break Down
5 Benefits of an Annual Network Tune-up! The importance of performing a network security audit can’t be overstated, but don’t be fooled into thinking network security is a one-time event. Just like you need to bring your car to a mechanic for a tune up, a yearly network security audit keeps your infrastructure running smoothly […]
Plan for Natural Disaster: Small Businesses in St. Louis
St. Louis, Missouri, known as the Gateway to the West, is well-loved by its residents for a variety of reasons that make it a great location for businesses and home to their employees. St. Louisans love their sports teams (Congrats to our NHL Stanley Cup CHAMPIONS!) and are proud hosts of the famous, award-winning St. […]
HIPAA Part 7: Getting Started
We’ve come to the end of our HIPAA series, and if you’ve been following along, you might feel overwhelmed by the prospect of becoming HIPAA compliant. There’s a lot to do if you’re just starting out. Keep in mind that by creating a culture of compliance, it becomes easier to verify that you’re following the […]
Tired of Waiting to Work?
The True Cost of Ransomware. Ransomware is a major threat right now. According to Datto, experts in data backup and recovery, 80% of managed services providers (MSP) report ransomware attacks in 2018, and 35% report that some of their clients experienced multiple attacks per day. Clearly, ransomware is nothing to sneeze about. Surprisingly, though, it’s […]
Talking Network Security Audits and More: An Interview
What makes your business special? This is probably one of the first questions anyone will ask about your company—your IT vendor included! Nobody knows your business better than you, and learning what goals and values drive your company is an important step in the Anderson Technologies discovery process. When a potential client reaches out to […]
3 Easy Ways to Make the Most of Your Firewall
Is the mess of cords and cables in your server room weighing heavy on your mind? Whether or not you rely on a managed services provider (MSP) to keep your IT systems organized and in check, you have a responsibility as a business owner to understand the hardware that keeps everything running. Misinformation about firewalls […]
HIPAA Part 5: The Cycle of Risk
In part 4 of our HIPAA series, we dug deep into the Security Risk Analysis (SRA) and how to perform one. This time, we’re going to look at what to do with the SRA once it’s completed. The SRA serves as a starting point for fulfilling many of the standards of the Security Rule, but […]
Small Business for Small Business: An IT Partnership
If you’re a regular reader of our blog, you might recall that we’ve written about Anderson Technologies’ avoidance of canned, one-size-fits-all solutions for IT. As a small business that specializes in serving other small businesses, we know that different clients have different needs. What works best for a small local nonprofit organization might cause more […]
Ring, Ring! It’s Voice Over IP!
Is it time to modernize your phone systems? VoIP, or Voice over Internet Protocol, uses your internet connection for phone services. Rather than transmitting a voice signal over separate analog telephone lines, a VoIP user takes advantage of your computer network and the internet already in place to make a voice or video call. You […]
HIPAA Part 3: Document! Document! Document!
As you read through the Privacy and Security Rules for HIPAA, you’ll see a pattern that shouldn’t be taken for granted. Nearly all the implementation specifications require some form of policy and procedure documentation. This involves more than the reasoning and justification for how you choose to implement the specifications (though that must be documented […]