Generating 1099 Reports Via 2022 QuickBooks

Tax

It’s tax season and below is a tip that I learned for QuickBooks. Tax season is in full swing, and we wanted to share an accounting tip that we learned while using QuickBooks Desktop Pro Plus 2022. While preparing to generate our 1099 reports, I ran into a discrepancy with my numbers. While running year-end … Read more

How To Get FERPA-Compliant Cloud Storage

FERPA-Compliant Cloud Storage

Aging IT infrastructure presents many challenges for an educational institution, not the least of which is ensuring compliance with the Family Educational Rights and Privacy Act (or FERPA). Migration to the Cloud may seem like the obvious solution — it can help you cut costs and improve accessibility, two major problems presented by older hardware … Read more

Ensuring Security and Compliance

Ensuring Security and Compliance

Most organizations tend to focus on becoming compliant rather than being secure. And while meeting client requirements and industry regulations is very important, it does not necessarily guarantee that your organization is secure. If your entire information security program is based on “What must we do to be compliant?”, you’re probably missing some major holes … Read more

Information Security Program Is Critical

Information Security Program Is Critical

An information security program is a critical component of any organization regardless of the size of your business or the industry you’re in. A good information security program consists of a comprehensive set of information security policies and procedures, which is the cornerstone to any information security program. Whether you’re responsible for protected health information … Read more

KRACK Security Flaw Protection

KRACK Security Flaw Protection

Researchers have discovered a new weakness found in the WPA2 protocol (Wi-Fi Protected Access 2), the security method which protects all modern Wi-Fi networks, known as the KRACK security flaw. Although there is no evidence at this time that the KRACK vulnerability was maliciously exploited, this still raises many concerns for both personal and enterprise … Read more

Award-Winning Website Development

We’re over the moon this week. Award-winning website development is always what we aim for, and our latest project has done just that. The Virginia School Quality Profiles state school report card site has just won its first major regional award, the Richmond Technology Council’s “Innovation in Utilization Award,” public project category. AISN worked closely with … Read more

School Report Cards for Virginia

School Report Cards for Virginia

The school report cards for Virginia’s schools, school divisions, and the state never looked better! Today, AIS Network announced that we’ve wrapped up development work on the Virginia Department of Education’s School Quality Profiles website. One more reason that I’m particularly proud of this project is that I’m the parent of two children who attend a … Read more

Universities That Have Deployed Microsoft Azure

Universities That Have Deployed Microsoft Azure

Should you join the other 750 universities that have deployed Microsoft Azure? The answer is a definite yes. Azure is a complete cloud platform with data centers located across the globe with capabilities that support a broad range of scenarios in the classroom and research settings. As more and more college classes are being taken … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history, … Read more