Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Subscribe to this list via RSS Blog posts tagged in Best Practices

Happy New Year From Weston!

Posted by on in IT Blog

As we bid adieu to 2017 and jump into 2018, we'd like to look back on the year at Weston. Specifically, we want to look back at what we have done at Weston, but also what you have done as readers of this newsletter and link back to the most read content of the past year. New Year's technology resolutions of the past still apply as good practice. The 2016 and 2015's year end wrap-ups are still both worth a read as well.

We accomplished a lot this year, thanks to you, our wonderful customers. But our biggest accomplishment, in our mind, is the large impact we've made in the communities we serve. We've paid out nearly $30,000 (at last count) to lots of great non-profit organizations and continue to provide our time and expertise whenever we can. This is much more than we were able to contribute last year. Our core purpose is to better the lives of others. We try to do that in many ways, but donating our time and money to these organizations is something we're quite proud of. 

In 2017, we also debuted new customer feedback options (and bribed you with doughnuts), setup online payment options, hired a new guy (and have an even newer guy who just started whose profile you'll be getting soon), garnered some more certifications, debuted WestonSecureMobile and even survived an eclipse.

We hope this newsletter has been a valuable resource to you and please email us if there is any particular type of content you'd like to see. We ran the numbers and some reports to see what people are reading in this newsletter and on our blog. These 28 individual articles from the last year were the most popular based on newsletter clicks and post views, so you can revisit them again or read them for the first time if you missed them when we mentioned them before:

Thanks for supporting us and our goals this last year, and we look forward to working with you in 2018!

Tagged in: Best Practices

Cyber Threat Protection As a CompleteCare client, you can rest assured that we are doing everything we can to protect your network from security threats and problematic malware. We were asked by a client recently what we do to help protect them from cyber threats, so we figured we’d share a bit of our multi-layered approach here (these are the major items but not the only items).

office365With Office and OneDrive or SharePoint Online, you can work together with other folks in your office at the same time on the same document. That feature is called co-authoring, and here’s how you get going on it.

Remember the Basics to Prevent Data Breaches

Posted by on in Security

seccompModern technologies are certainly making it easier for an organization to minimize risk and detect and prevent security breaches when they occur. Between intrusion detection systems, next generation firewall systems, threat management solutions, data encryption solutions, there are a lot of ways to help your organization. However, the basics of security are just as important. If you look at the HIPAA data breach portal, you’ll find a pile of examples of breaches caused by simple errors and security mistakes.

While the FTC doesn’t cover enforcement of HIPAA-covered entities, their latest blog post for business is a must read for your business, no matter if you’re HIPAA-regulated or not. Start with Security: A Guide for Business covers the following aspects of data security in an easy-to-follow format:

  1. Start with security.
  2. Control access to data sensibly.
  3. Require secure passwords and authentication.
  4. Store sensitive personal information securely and protect it during transmission.
  5. Segment your network and monitor who’s trying to get in and out.
  6. Secure remote access to your network.
  7. Apply sound security practices when developing new products.
  8. Make sure your service providers implement reasonable security measures.
  9. Put procedures in place to keep your security current and address vulnerabilities that may arise.
  10. Secure paper, physical media, and devices.

While this is an especially important issue to regulated industries, the advice is good for any business to follow.

Healthcare BackupIn any business, keeping operational when you’re supposed to be is always the goal. But what if something happens to keep you from functioning properly? This is especially important in healthcare where timely access to critical health information can literally mean life or death. Is your IT infrastructure ready for worst-case scenario? Do you have a business continuity plan in-place?