At 365 Technologies, we select a best practice to discuss at a monthly meeting, where we apply it to related industry standards. We then create a checklist to follow up with our clients’ network and software systems. This process shows our committment to using all of the available knowledge and technology at our disposal to ensure our clients’ systems are up to date and secure from potentially invasive entities.
As we know, an organization’s data is extremely valuable, and if it falls into the wrong hands, it could mean financial and reputational losses.
Best Practice List 2017:
|January||Anti-Spam Methods||Anti-spam refers to services and solutions that focus on blocking and mitigating the effects of spam for email users
Objective: To ensure anti-spam measures are in place, and integrated into clients’ systems.
|February||User Setups||Documenting custom configurations for user environments.
Objective: To ensure user setups are correct and consistent.
|March||RDP Configuration||Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides users with a graphical interface to connect to another computer over a network connection.
Objective: To ensure RDP connections are secure and two-way authentication is enabled.
|April||Power Management Review||In the spring, we do a power management review – just before the storms come.
Objective: To discuss business continuity, and ensure our clients know their uptime, if a power outage hits.
|May and June||Network Equipment||We take an inventory of our clients’ network equipment (switches, wireless devices, etc.) and make recommendations to replace older and slower equipment.
Objective: To discuss the advantages of good network equipment. We want to ensure our clients are operating at the highest level possible. In the past, we’ve discovered clients on network speeds of 100 Mbps (100 mega bits per second), and we want to get them up to gigabit speeds, which are 10 times faster.
|July||Website Hosting||A service that allows an organzation to host a website on the Internet.
Objective: To ensure backend software is up to date, passwords are strong, and the website is secure.
|August||Shadow Copies||Technology included in Microsoft Windows that allows backup copies or snapshots of computer files or volumes.
Objective: To review a client’s backup configuration and protocols.
|September||Account Audit||An examination and verification of a client’s account and records.
Objective: To ensure contact information is current.
|October||Scheduled Tasks||Scheduled tasks are set to run on servers at regular intervals (hourly, daily, or weekly). We create a scheduled task inventory and remove unnecessary tasks.
Objective: To ensure servers are running right and clean – with nothing slowing down the severs.
|November||Wireless Networks||A wireless local-area network (LAN) uses radio waves to connect devices to the Internet, your business network, and its applications.
Objective: To ensure networks are secure and safe from threats or vulnerabilities.
|December||Firewalls||A part of a computer system or network designed to block unauthorized access while permitting outward communication.
Objective: To ensure firewall rules are documented and maximized for best traffic speed.