Information Security Program Is Critical

Information Security Program Is Critical

An information security program is a critical component of any organization regardless of the size of your business or the industry you’re in. A good information security program consists of a comprehensive set of information security policies and procedures, which is the cornerstone to any information security program. Whether you’re responsible for protected health information … Read more

KRACK Security Flaw Protection

KRACK Security Flaw Protection

Researchers have discovered a new weakness found in the WPA2 protocol (Wi-Fi Protected Access 2), the security method which protects all modern Wi-Fi networks, known as the KRACK security flaw. Although there is no evidence at this time that the KRACK vulnerability was maliciously exploited, this still raises many concerns for both personal and enterprise … Read more

Government Data Scientists Be Glad

Azure Government cloud platform

Government data scientists spend inordinate amounts of time each day manually scrubbing terabytes of operational data for advanced analytics and business intelligence. Well, now they can be glad that Microsoft has unveiled its new data analytics and visualization offerings, called HDInsight and Power BI, as part of the Azure Government cloud platform. AIS Network is … Read more

School Report Cards for Virginia

School Report Cards for Virginia

The school report cards for Virginia’s schools, school divisions, and the state never looked better! Today, AIS Network announced that we’ve wrapped up development work on the Virginia Department of Education’s School Quality Profiles website. One more reason that I’m particularly proud of this project is that I’m the parent of two children who attend a … Read more

Cost of Downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the … Read more

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history, … Read more

March Is Governmental Purchasing Month in VA

March Is Governmental Purchasing Month in VA

March is Governmental Purchasing Month in Virginia! Just last week, Commonwealth of Virginia Governor Terry McAuliffe issued a proclamation to recognize March as Governmental Purchasing Month in Virginia — in conjunction with National Purchasing Month as proclaimed by the National Institute of Governmental Purchasing (NIGP) and other public purchasing and contracting organizations across the country that recognize … Read more

PCI DSS Requirements 3 and 4

Questions about PCI DSS Requirements 3 and 4? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Previously, we addressed questions about PCI DSS Requirements 1 and 2. Today, we’re reprinting highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview, … Read more

Call Monitoring Compliance

Call Monitoring Compliance

It’s important to analyze and fully understand the areas of risk as the CFPB continues to closely supervise the collections environment and call monitoring compliance. One of the biggest risks to a collection agency is communication with consumers, making the monitoring of calls a very telling practice.  An effective call monitoring program is a critical … Read more

IT Regulatory Standards Are an Alphabet Soup

IT Regulatory Standards

IT Regulatory Standards Are an Alphabet Soup IT regulatory standards got you down? If you work in IT or IT compliance, you’ve probably heard of the “Alphabet Soup” of regulatory standards. Think SSAE 16, SOC 2, HIPAA, PCI DSS, FISMA, ISO 27001, and others, of course. However, what do they all really mean?  Which one is right for me? … Read more