Contact Us Today!   314.394.3001   |   info@andersontech.com
Anderson Technologies
  • Home
  • Services
    • Overview
    • Managed IT Services
    • Cyber Security
    • System Administration
    • HIPAA Compliance Services
    • Ransomware Protection
    • Hardware & Software Consulting
    • Cloud Computing Services
    • Web Design
    • Anderson Archival
  • Industries
    • IT Support for Accountants
    • IT Support for Dental Offices
    • IT Support for Financial Services
    • IT Support for Architects and Engineers
    • IT Support for Manufacturing
    • IT Support for Nonprofits
  • Learn
    • What Are the Biggest Mobile Security Threats of 2020?
    • What Are Mobile Security Best Practices?
    • What Does a Firewall Do for a Network?
    • How to Maintain Security When Employees Work Remotely
    • How to Protect Your Data from Ransomware
    • Comparing Mobile OS
    • What Is Phishing?
    • How to Identify Phishing and BEC Scam Emails
    • What Is MFA And Why Do I Need It?
    • How to Reduce Risk and Secure Your Internet of Things Devices
  • Resources
    • Free Ebooks
    • Webinar: Cyber Security at Home: Protecting Your Business & Family
    • Newsletter Sign Up
  • About
    • About Us
    • What Our Clients Have To Say
    • Careers
  • Press
  • Blog
  • Contact
    • Contact Us
    • Free Consultation
    • HIPAA Services Inquiry
  • Help
  • Menu Menu

Posts

Listen & Learn: The Keys to IT Innovation

January 5, 2021/in Client Feature, Managed Services /by Marcia Spicer

Technology and innovation go hand in hand more often than not. The drive for creativity and efficiency feeds the ideas that lead to technical innovations, and innovative tech allows us to process information and complete tasks faster.

Manufacturing and engineering firms know the importance of the tools they use every day to find and solve problems. The difference in using outdated models or underperforming systems truly shows in final output. These businesses need technology and innovation to be on the same page, especially when it comes to IT and cyber security.

MC, the Controller of a manufacturing company in St. Louis, Missouri, can personally attest to the importance of a tech partnership that is tuned toward innovation. MC’s firm of about thirty employees is split between the production line and administrative positions. Though the production side of the company is straightforward in its technical structure and IT needs, the company as a whole was having issues making their needs about problems and projects understood by their former IT vendor. Crucial issues with their server were blocking MC from moving forward with creative projects that would allow the company to grow.

Server Life Preserver

The primary technical issue MC’s company was experiencing—the thing that needed to be resolved before moving forward with anything else—was their server. “We were in the Stone Age with the equipment we had,” MC says. The age and slow speed of the server was dragging systems down and barring him from moving forward with new tech upgrade ideas his company’s previous IT partner failed to implement.

We were in the Stone Age with the equipment we had.”

When he signed to a managed services agreement with Anderson Technologies in September 2020, MC had hopes that the company’s existing server would last for another year. However, the server had other plans. “Initially I told everybody we’d be ready to do this [server transition] in December,” MC says, but “we [had to do] it late October. We were having a lot of troubles with the server going into that period, so it was good timing.”

The new server had twice the capacity as the one it was replacing, which meant backup services also needed to grow. Planning this change in service required extensive coordination between MC and the Anderson Technologies team. Full server transitions can be tech challenges for companies in any industry, as they require all connected devices to fully disconnect from the network while new virtual avenues are created.  “I haven’t really done a server transition like that,” MC says. “I’ve added new servers and moved some things around, but this was a whole big piece, the whole thing.”

Thankfully, the Anderson Technologies team was able to subvert expected downtime significantly. “The team worked throughout the evening and early the next day and got everybody up and running,” MC says. “I was thinking they’d be done around noon that day, but I think it was more around 8 or 9[A.M.]—so ahead of what was expected.”

“It’s almost like they work here,” MC says of the Anderson Technologies team. “It’s not just getting it settled, it’s ‘What else can we do to make this better?’ That’s really what we need.” That above-and-beyond mindset can make a world of difference in an industry where uptime is money, and listening to the experts can keep everything moving and functioning.

In times of major upgrades, or day-to-day monitoring, you should feel like your MSP works both for and with you—because they do.

MC points out the difference. He witnessed the Anderson Technologies team “caring about if people are up and running and getting it set up right” from the start. “Everybody’s been super fantastic to deal with. They’re very responsive and really wanting to dig into it.” An IT team you can count on is essential to building an innovative business infrastructure.

Band-aid Fixes vs. Lasting Solutions

Once a company establishes their IT foundation, it’s only natural to think “What’s next?” Manufacturing and engineering companies have a business model built on finding new ways to refine their processes and make them more efficient.

Before MC partnered with Anderson Technologies, he had decided to install some monitors in the company’s production area that showed jobs in progress, “so the production team would have an idea of what’s coming in the queue, what’s currently in production, what’s in assembly, [and] what’s ready to be shipped.” This new IT project would also include a similar monitor in the breakroom with a scrolling bulletin for employee notices.

MC’s previous IT vendor was less than enthusiastic about this project. “A lot of things that I wanted to do, the IT company was just blocking me from,” MC says, “because they may not have experience with that or with a certain piece of equipment or software.” MC had posited the idea of using mini PCs to run the monitors. “They said, ‘No, that will be really expensive. You don’t want to do that.’” Dismissive of MC’s vision, the vendor installed several separate virtual machines, which stressed the company’s already-wheezing server.

“That really caused issues for our server,” MC says. “The machines didn’t really run like they should, and [the previous vendor] kept billing me more and more because they kept sending people out to come troubleshoot it.” What could have been an inventive addition to the production team’s workflow ended up being a hassle. “I’m frustrated because I think, ‘Well, if we just did what I said then we wouldn’t have these kinds of issues right now.’”

Fast forward to the present, and Anderson Technologies heard MC’s production monitor aspiration and agreed that the mini PCs would be the best solution using the company’s existing infrastructure. “[Anderson Technologies] understood it all and guaranteed that I won’t have those kinds of issues if I make that move.” The lower profile machines are now set up in the server room alongside the new server, where they can’t drain the hardware’s resources or get dusty in the production area.

In times of major upgrades, or day-to-day monitoring, you should feel like your MSP works both for and with you—because they do.

The new IT partnership (and the new server) allowed MC’s company a moment to catch its breath after years of playing IT catch-up. “The issues that I had with the [former] IT company were providing more band-aid fixes just to get something working instead of finding the root cause of a problem so it wouldn’t come up again,” MC explains. “I would have a project list… and they would never get those things done. We would have our quarterly meetings but we weren’t any further, just adding more to the list.” Patching the same problems over and over again will only burn your resources and hinder developments that, if implemented, could give a company an edge in the industry.

What’s next for MC’s company? “The next thing would be getting into some cloud-based systems,” he says, “probably more into the two- to five-year plan”. This type of network and software transition would be a big shift, but now that the downtime from constant tech hiccups is in the past, MC’s company can focus on the manufacturing specialties that really matter.

Personal attention and respect can go a long way in a relationship with an MSP. Having IT professionals who actually listen creates space for innovation and creativity. In this new partnership, MC understands the choices the Anderson Technologies team is making, and Anderson Technologies takes the time to listen to MC’s needs and suggestions. “It’s the right way to do business,” MC says. “It’s been really refreshing.”

 

Are your IT essentials covered and running efficiently, or is a frustrating IT vendor or outdated hardware keeping the door closed to more innovative opportunities? If you’re feeling stuck, or just looking for an alternative solution, contact us today!

Contact Us

Don’t Wait for Your IT Infrastructure to Break Down

August 27, 2019/in Data Security, General, Managed Services /by Marcia Spicer

5 Benefits of an Annual Network Tune-up!

The importance of performing a network security audit can’t be overstated, but don’t be fooled into thinking network security is a one-time event. Just like you need to bring your car to a mechanic for a tune up, a yearly network security audit keeps your infrastructure running smoothly and allows your managed services provider (MSP) a chance to look at what’s going on beneath the hood. Better to keep everything running smoothly so problems can’t lurk unseen.

What is a Network Security Audit?

An initial network security audit provides a baseline for the status of your IT infrastructure, what is doing well, where the holes are, and allows you to get in front of any issues that could compromise your systems. Forgetting to fix a known vulnerability could cost you time and money if cyber criminals find and exploit it.

What exactly does a network security audit do? When performed by a professional IT firm, physical processes combine with state-of-the-art software solutions to assess the quality and security of your network. This means reviewing not only your IT systems for digital vulnerabilities but also walking through your physical work space to make sure hardware isn’t set up in a way that would decrease efficiency or be hazardous (such as plugging a space heater into the same surge protector as a computer).

A thorough network security audit should include a review of your business’s

  • firewall,
  • anti-virus and anti-malware software,
  • web and electronic communication filtering,
  • Active Directory environment,
  • password policies,
  • backups and disaster recovery policies,
  • and include an in-person assessment.

Five Benefits of an Annual Network Security Audit

As important as the initial security audit is, performing regular audits each year provides you with additional insights that can keep you moving forward in a secure and productive manner. Below are the top five benefits of performing an annual security audit.

  1. Assess how well you’ve addressed last year’s problems.

A network security audit is useless unless the issues it reveals are addressed. By performing an annual audit, you can compare where you were the year before with where you are now to see what systems improved and what still requires attention.

Have all your planned policies and IT practices been implemented? Did the fixes you put in place successfully mitigate the previous year’s problems? An annual security audit serves as benchmark to the condition and maintenance of your business’s IT environment.

  1. Review your security vulnerability analysis with your MSP or IT department.

As part of a thorough audit, your MSP or IT department should use specialized software to probe all the nooks and crannies of your network to search for vulnerabilities. But simply performing the audit isn’t enough. An annual review of your network security audit with your MSP or IT staff allows you to go over the security vulnerability scans each year and look at any reoccurring failures. By discussing the results together, you can work to find the underlying reason for any trends you find. Sometimes the problem revealed is actually a symptom of a much larger issue.

  1. Prioritize your technology needs for the next year.

IT security and maintenance can be expensive, especially when technology changes happen outside of your control, such as Windows 7 reaching end-of-life on January 14, 2020. An annual network security audit is a chance for your MSP or IT staff to discuss what needs to be done in the coming year, and more importantly when it needs to be done, so you can prepare accordingly.

  1. Address the nitty gritty details of IT management.

As part of an annual audit, your MSP or IT staff should review the state of your hardware, Active Directory for any overlooked users who have left the company, and the configurations of permissions to your systems. These are basic issues that  sometimes get lost amidst the pressing everyday IT issues that arise. Having a dedicated time to check foundational elements keeps your IT infrastructure productive and secure.

  1. Provide feedback to your MSP or IT department and keep the dialogue open.

IT security may feel like it lives solely in the realm of IT professionals, but it requires two-way communication to remain effective. An annual network security audit is an effective mechanism to open a dialogue with your MSP or IT staff and address any concerns you have. The annual audit is a great place to discuss what’s working and what’s not that so all your IT needs are met in the way your business requires.

 

Don’t wait too long to tune up your IT systems with an annual network security audit. You can’t fix a problem you don’t know exists, and cyber attacks get more sophisticated each day. A look under the hood every now and then offers more than solutions to your problems—it offers peace of mind.

For managed services clients of Anderson Technologies, a network security audit is performed annually. If you want help with a network security audit, contact us today for a free consultation.

Contact Us

Quotables: How to Determine If You Need a Computer Security Audit (Lady Boss Blogger)

December 8, 2017/in Quotables /by Anderson Technologies

Check out Amy Anderson’s recent guest article on Lady Boss Blogger providing readers with advice on how to determine if they need computer security audits!

Click here to read the full article!

Are you in need of expert IT consulting?  Anderson Technologies is a St. Louis IT consulting firm that specializes in system administration for small businesses.  Let us help you today!  Give us a call at 314.394.3001 or email us at info@andersontech.com.

What are Quotables?  This is a category in our posts to highlight any professional publications that benefit from our expert IT consulting advice and quote us in articles for their readers. 

Contact Us

What Is a Network Security Audit?

September 22, 2017/in Data Security, General /by Anderson Technologies

You can’t improve your IT processes and keep your data secure without a complete picture of your IT infrastructure. By conducting a network security audit, you’ll understand what is working and what needs to be improved so you can proactively get ahead of issues and improve your systems.

Cyber security threats are on the rise. Small businesses need to take cyber security seriously.

A network security audit, sometimes referred to as an information security audit, is a technical assessment of your IT systems. It’s conducted by a professional IT firm that uses physical processes and digital solutions to assess the quality and security of your business network environment, including your operating systems and all your applications.

Looking for a network security audit you can trust? Contact Anderson Technologies today!

When you work with a managed IT services or IT consulting company, a network security audit is an important fact-finding step, akin to a look under your car’s hood by your mechanic. It’s a way for the managed IT firm to get a complete picture of your business and spot potential holes in your security that could leave you vulnerable to hackers.

As part of a network security audit, your IT partner may conduct an IT infrastructure audit—an assessment of your IT architecture that covers areas beyond cyber security, such as performance and cost-savings opportunities. Both processes are complicated and technical, but the results don’t have to be. Your managed IT partner should be able to present its findings in plain English and recommend easy-to-understand actions based on the report.

A network security audit should include review of the following:

  1. Firewall

The IT partner should review your firewall configuration, check for security vulnerabilities, and make sure it is being patched regularly with the necessary firmware updates.

  1. Anti-Virus and Anti-Malware Software

The audit will determine if all systems, including your servers, are protected by updated anti-virus and anti-malware software.

  1. Active Directory

Microsoft’s Active Directory is a centralized way of managing all the users, computers, and security policies on Windows domains. Your business should be managing its Active Directory on an regular basis, which means removing inactive computers and user accounts from the system as needed. This helps reduce security threats posed by stale accounts with network access and passwords that never get updated.

  1. Password Approach

The audit will determine the effectiveness of your company password policy. For example, are you prompting your employees to use strong passwords and routinely change them? Are you deactivating previous employees’ accounts promptly? These are crucial components of cyber security.

  1. Backups

Every company needs a process for backing up business-critical data and testing it regularly to ensure effectiveness. The audit will review your approach and pinpoint any shortcomings in your strategy.

These are just some of the aspects of a comprehensive network security audit. To identify all security vulnerabilities, your IT partner will also review your approach to data sharing, remote connectivity (how your employees access company assets when they are home or traveling), and internet content filtration (whether you block sites that violate your company’s internet policy).

Why a Network Security Audit Should Include an In-Person Assessment

The network security assessment should pave the way for a blueprint of your IT security plan. At Anderson Technologies, our experts use the audit to identify critical risks and help our clients prioritize their resources.

When conducting a network security audit, Anderson Technologies installs a sophisticated software tool on the client’s server to probe the network, gather information, and compile findings. Additionally, its experts go onsite to review the client’s setup in person. That is the only way you can truly assess the health and performance of IT equipment and ensure systems are wired correctly. For example, a software probe can’t tell you if too many systems are running from the same power source or if someone has plugged a space heater into the same surge protector as the computers, a common mistake in the winter months.

Curious about the network security audit process? Read all about it!

Next, the firm analyzes all the digital and on-the-ground findings and boils them down to key takeaways and prioritized action items for business owners. That is when the network security audit really proves its value—when it helps a business and its managed IT services partner find ways to stay safer and improve the business’s IT infrastructure.

Anderson Technologies is a St. Louis managed IT services and IT consulting company that performs network security audits and IT infrastructure audits for clients. It specializes in making meaningful recommendations based on findings and working with clients to improve their approach to cyber security. For more information on the company’s services, email info@andersontech.com or call 314.394.3001 today.

Contact Us

Network & Computer Audit for a Small Organization

November 17, 2015/in General, Managed Services /by Anderson Technologies

“We feel like the luckiest clients in the world to have the technology back-up that we have with Anderson Technologies,” says A.M., Executive Director of a small, nonprofit Christian Science nursing facility.

When Anderson Technologies first became the organization’s information technology (IT) advisors, the nonprofit was at wit’s end with its technology. Through the proprietary Network & Computer Audit process performed for each new client, Anderson Technologies thoroughly reviewed all of their needs and introduced systems to help their business run more smoothly almost immediately.

What is a Network & Computer Audit?

It begins with a comprehensive discovery phase to identify faults and weaknesses and learn exactly what a network requires to become stable and efficient.  The Network & Computer Audit involves a detailed evaluation of all network components – from servers and workstations to firewalls, routers, and wireless access points. Each device must reliably fulfill a specific business need.

A.M. says, “We limped along until Anderson Technologies was able to help, and we’re deeply grateful because they brought us into the next century. . . . Mark was able to help us with wireless [internet], lay computer lines, and get computers set up . . . with the programs we needed—everything from A to Z.

“[Anderson Technologies] basically set up every computer to create consistency with programs, system recovery, [anti-malware] scanning, memory disks, and setting up the whole system for that.  They also did a network map for us, which includes wireless access points, jacks, and ports, so now we have a map of where everything is!”

The nonprofit originally thought they needed to spend $20K-$30K for new server infrastructure. Instead, Anderson Technologies was able to recommend a much less expensive cloud-based option that serves the same purpose on a much more manageable scale.

As a small nonprofit, the budget is carefully allocated to the most pressing needs. They were thrilled to find a cost-effective IT solution that freed up their budget for other important projects. Through Anderson Technologies, Peace Haven found how cost efficient IT can be.

Do you want to stabilize your infrastructure so you can focus on your top priority needs?

Give us a call at 314.394.3001!

Contact Us

Newsletter Signup



Recent Posts

  • Busting Business Email Compromise
  • Listen & Learn: The Keys to IT Innovation
  • Merry Christmas and Happy Holidays (2020)
  • Learn: How to Reduce Risk and Secure Your IoT Devices
  • Rightsizing Now and for the Future

Seeking IT support and managed services?
Get a free consultation today.

Contact Us

  • Home
  • Services
  • Resources
  • About
  • Blog
  • Contact
  • Help
  • Privacy Policy
ATI Logo
Phone: 314.394.3001
Email: info@andersontech.com

13523 Barrett Parkway Dr
Suite 120
St. Louis, MO 63021



© - Anderson Technologies
  • Home
  • Services
  • Resources
  • About
  • Blog
  • Contact
  • Help
  • Privacy Policy
Scroll to top
We use cookies to understand how you use our site. Click Accept to confirm your approval of this, or learn more in our Privacy Policy. Accept Privacy Policy
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.