cost of downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the…

frustrated man confronts hackers

When Hackers Strike

When Hackers Strike “The battle against terrorism is not only a military battle, but primarily a battle of information” -Ahmed Chalabi   In today’s globalized and cyber-connected world, hackers are a real and present danger. The threat of “bad guys” extends to the Internet and the security of your life and personal information. Throughout history,…

FERPA compliance

Securing PII Under FERPA

With a vast amount of personal and private data available on networks throughout the world, it’s easy to understand just how necessary and important securing PII (personally identifiable information) is today. Let’s look at student records and the FERPA-compliant world of higher education, for example. A student’s entire education file, filled with academic performance data and…

ask the auditor

PCI DSS Requirements 3 and 4

Questions about PCI DSS Requirements 3 and 4? You’ve come to the right place. As you may know, AISN is a PCI compliant cloud hosting provider. Previously, we addressed questions about PCI DSS Requirements 1 and 2. Today, we’re reprinting highlights from an exclusive online interview sponsored by our valued partner, KirkpatrickPrice. In this interview,…

call monitoring compliance

Call Monitoring Compliance

It’s important to analyze and fully understand the areas of risk as the CFPB continues to closely supervise the collections environment and call monitoring compliance. One of the biggest risks to a collection agency is communication with consumers, making the monitoring of calls a very telling practice.  An effective call monitoring program is a critical…