Twelve Months of Best Practices

written by Michael Anderson posted on December 21, 2017
“On the third month of 2017, my 365 Technologies gave to me, a RDP Configuration best practice…”

At 365 Technologies, we select a best practice to discuss at a monthly meeting, where we apply it to related industry standards. We then create a checklist to follow up with our clients’ network and software systems. This process shows our committment to using all of the available knowledge and technology at our disposal to ensure our clients’ systems are up to date and secure from potentially invasive entities.

As we know, an organization’s data is extremely valuable, and if it falls into the wrong hands, it could mean financial and reputational losses.

Best Practice List 2017:

Month Best Practice Description
January Anti-Spam Methods Anti-spam refers to services and solutions that focus on blocking and mitigating the effects of spam for email users

Objective: To ensure anti-spam measures are in place, and integrated into clients’ systems.

February User Setups Documenting custom configurations for user environments.

Objective: To ensure user setups are correct and consistent.

March RDP Configuration Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides users with a graphical interface to connect to another computer over a network connection.

Objective: To ensure RDP connections are secure and two-way authentication is enabled.

April Power Management Review In the spring, we do a power management review – just before the storms come.

Objective: To discuss business continuity, and ensure our clients know their uptime, if a power outage hits.

May and June Network Equipment We take an inventory of our clients’ network equipment (switches, wireless devices, etc.) and make recommendations to replace older and slower equipment.

Objective: To discuss the advantages of good network equipment. We want to ensure our clients are operating at the highest level possible. In the past, we’ve discovered clients on network speeds of 100 Mbps (100 mega bits per second), and we want to get them up to gigabit speeds, which are 10 times faster.

July Website Hosting A service that allows an organzation to host a website on the Internet.

Objective: To ensure backend software is up to date, passwords are strong, and the website is secure.

August Shadow Copies Technology included in Microsoft Windows that allows backup copies or snapshots of computer files or volumes.

Objective: To review a client’s backup configuration and protocols.

September Account Audit An examination and verification of a client’s account and records.

Objective: To ensure contact information is current.

October Scheduled Tasks Scheduled tasks are set to run on servers at regular intervals (hourly, daily, or weekly). We create a scheduled task inventory and remove unnecessary tasks.

Objective: To ensure servers are running right and clean – with nothing slowing down the severs.

November Wireless Networks A wireless local-area network (LAN) uses radio waves to connect devices to the Internet, your business network, and its applications.

Objective: To ensure networks are secure and safe from threats or vulnerabilities.

December Firewalls A part of a computer system or network designed to block unauthorized access while permitting outward communication.

Objective: To ensure firewall rules are documented and maximized for best traffic speed.

By performing best practices, we ensure our clients are performing at the highest level for the best return on their investment. We can do the same for your business – contact 365 Technologies to find out how our services can help you.

Watch Our Latest Tech Videos From 365 Technologies

  • How Technology Helps Entrepreneurs With Business Operations

  • Cybersecurity Awareness