A Return to Routine

Michael Anderson IT Best Practices

While January 1st marks the beginning of a new calendar year, it is always the beginning of September that has more of a ‘new year’ feel for me. The end of summer holidays, the start of the school year, the reappearance of flocks of geese – it’s a return to routine, and I love it. As you settle back in,…

Two Factor Authentication

Before the Handshake (5 questions you MUST ask any prospective technology vendor)

Michael Anderson IT Best Practices

The handshake. A simple gesture that can communicate so much: congratulations, gratitude, sportsmanship, and often, the completion of an agreement. It’s the last one that I want to focus on. In the context of entering into a service agreement, the handshake (as a figurative representation of a signed deal) marks an important transition for you, the customer. It is the…

Spring Cleaning for your Computer Network

Michael Anderson IT Best Practices

While I’m still hesitant to say so, it looks like spring is finally coming to Winnipeg, and with it, the annual ritual of spring cleaning. Washing baseboards, dusting vents, and cleaning light fixtures – all while shaking your head in amazement at the dust and dirt that can accumulate over a few months. While you’re undertaking (or in my case,…

Two Factor Authentication

Disaster Recovery Planning, Simplified

Michael Anderson IT Best Practices

I’ll be the first to admit that technology service providers have a habit of overcomplicating things. We’ll talk about protocols, cloud computing, and desktop optimization – all while our listener gets that glazed-over look in their eyes. One area that can appear particularly daunting to business owners and managers is Disaster Recovery. Most of the companies that we meet with…

Two Factor Authentication

Thoughts on Dental Floss and Documentation

Michael Anderson IT Best Practices

I have a confession. I hate flossing. I know I should do it, I’m aware of all the dental health benefits, but I can’t bring myself to make it a habit. If there’s a flossing equivalent in network management, it has to be documentation. And yet, it’s one of the most important things that a company can do. Very few…

Two Factor Authentication

Your company needs an Internet and Email Acceptable Use Policy Heres Why:

Michael Anderson IT Best Practices

You may think that the last thing your company needs is another policy. That may be true, but there’s one policy that every company should have, big or small – an Acceptable Use policy that clearly spells out appropriate use of company technology. A good Acceptable Use policy will: Clarify guidelines around the use and distribution of sensitive data (customer…