Risk Assessments Can Save Your Business

Risk Assessments Can Save Your Business

Risk Assessments Can Save Your Business Think risk assessments can save your business? You’re right. A risk assessment is a critical component of any organization’s infrastructure. They help to create an awareness of risk. In today’s threat landscape, specifically cybersecurity, it’s more important than ever to know where your assets live, fully understand the controls … Read more

Debt Collection and Audits for Collection Agencies

Debt Collection and Audits for Collection Agencies

Debt Collection and Audits for Collection Agencies Debt collection agencies with sensitive data need to know how PCI, FISMA, SSAE 16/SOC 1, and SOC 2 apply to them. If you’re performing collections, you’re no stranger to regulatory compliance and the proactive supervision of government agencies such as the Federal Trade Commission (FTC), the Consumer Financial … Read more

IT Regulatory Standards Are an Alphabet Soup

IT Regulatory Standards Are an Alphabet Soup

IT Regulatory Standards Are an Alphabet Soup IT regulatory standards got you down? If you work in IT or IT compliance, you’ve probably heard of the “Alphabet Soup” of regulatory standards. Think SSAE 16, SOC 2, HIPAA, PCI DSS, FISMA, ISO 27001, and others. However, what do they all mean?  Which one is right for … Read more

Healthcare Infographic: Why It’s Moving to the Cloud

healthcare moving to cloud

Healthcare and The Cloud We are excited to share our new infographic on why healthcare is transitioning to the cloud. Many healthcare organizations are beginning to leverage the cloud and virtualization, and we’ve outlined some related trends in our infographic. It’s no surprise that healthcare is moving to the cloud, as many businesses and organizations … Read more

SharePoint and the Crypto Locker Virus

  By Terry Engelstad AIS Network VP, Network Operations   Last month, a client emailed with the following question, “We have had reports of one of our external SharePoint users that ended up with a crypto locker virus.  It is possible that documents from this infected computer got uploaded into SharePoint.  In cases like this … Read more

Business Continuity and Disaster Recovery Planning Checklist

Business continuity is a big deal these days, and disaster recovery plans are a key component of business continuity. Below is a brief checklist to help guide you: Business Continuity Plan (BCP) Project Approach 1. Business Impact Analysis a. Review existing business continuity capabilities: i. Evaluate the risk to business process failures ii. Identify critical … Read more

September 23: HIPAA Rules Kick in, Impacting Your Backup and Disaster Recovery Planning

By Jay Atkinson AIS Network CEO If you’re a company in the health care industry, you have just 47 days to get your act together on planning for IT disaster recovery. That’s right. Beginning Sept. 23, the HIPAA/HITECH rules governing protected health information (PHI) secure data backup and recovery will be enforced, and some businesses … Read more

The Pros and Cons of Social Media in the Workplace, Part 1

  GUEST BLOG By Daniel Dimov InfoSec Institute Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to this, some employers have implemented security systems designed to closely monitor or restrict, as needed, an employee’s access … Read more