Microsoft Office 365 is a cloud-based subscription model that offers email and office productivity solutions that many are finding attractive. Business applications from Outlook to Excel is accessible anywhere you have an internet connection on multiple devices, depending on the plan you pick. Traditional Microsoft Office applications were only utilized through desktop installations, limiting access to your productivity environment.

UniVista offers three of the most popular licenses within O365, Business Essentials, Business Premium and Enterprise E3.

Read More

Criminal Justice Information Services (CJIS)

Criminal Justice Information Services, or CJIS, is a division of the FBI that provides criminal justice information needed to perform law enforcement duties. It “serve[s] as the focal point and central repository for criminal justice information services in the FBI.” – FBI. In Texas this information is disseminated via the DPS and includes details such as vehicle registration, criminal history, driver’s license, license plate, firearm, etc. Because this information is highly sensitive and needs to be protected, CJIS provides security compliance requirements and performs audits to ensure these requirements are being met. Below are just a few example requirements of the Security Policy…

  • Security Awareness Training
  • Perimeter Intrusion Detection
  • Advanced Authentication
  • Maintain Log History
  • Change Management
  • Device Encryption

Failing a single audit flags an agency as non-compliant. If compliance is not achieved, the agency can lose access to the information and tools needed to perform their duties.

Read More

Ah Budgeting… The least favorite thing we can do in both our personal and business lives.  Although it isn’t fun, it tends to make our lives much easier in the long run.  Let’s break down the basics to getting you and your organization onto a budget plan that will work for your business goals.

Read More

Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.  You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it’s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.

Read More

In our last post we talked about the Pros and Cons of moving your systems to the cloud vs. keeping them in your office.

As you can see, it can really be a toss-up. Some systems are better kept at your office and some should be moved to the cloud. It really depends on your business’s current and future needs.

Read More

What is “the cloud?” This is certainly a question you’ve asked or wondered. You may have received a few explanations too. When searching online, the first resulting definition used the words “Paradigm” and “Ubiquitous” … this does not clear things up for me. Let’s take care of that. If you’ve hear about “the cloud” you’ve likely heard the phrase “on premise” as well. If not, that’s ok. Defining both will help understanding each of them. So what exactly do those terms mean?  Simple.  Cloud vs On Premises is where your data is stored or resides.  On premises data is housed locally in an environment that you (or your trusted IT vendor) maintain.  Data is on your computers or servers and is easily accessible.  Cloud is similar to its name.  Data in the cloud resides offsite, somewhere outside of your home or office. Typically it is on a server, in a data center, miles away from you. Cloud data is accessible to you via a web browser or application.

Read More

Most of us look at that update notification from our devices and think, “I’ll do that later.” When we finally get around to it, there are multiple updates that have been sitting there for weeks. We continue with this behavior because nothing has happened to me yet. In order to change those behaviors, let’s begin to think of updates like you would your car insurance. If you waited to cover yourself, that fender-bender might have cost you a LOT more in the long run.

Read More



Ok, I have followed all the steps in last week’s blog post. I have identified my critical functions and reviewed my backups, but I still don’t have a recovery plan in place.

How do I create a plan based on the loss tolerance decisions that have been made?

Now that you’ve done some research and made critical business decisions that best fit your Disaster Recovery needs, let’s document it! You can simultaneously begin to implement some of the changes you will need to engage your plan when disaster strikes, but if there is no user manual then no one will know how to use it. You want to create a write-up that is comprehensive and easy to understand and to follow. At a high level, you want to make sure your plan covers the Who, What, When, Where, Why & How?

Read More


Disaster Recovery – what does it mean to your business? Heck, what does it even mean in general, and do you have to do something about it?

One of the more popular business-critical terms you might have heard before is Disaster Recovery (DR). The term Disaster Recovery first started floating around business communities in the 1970’s when organizations began to realize their dependence on computer systems and technology could potentially be harmful to their viability if they didn’t have a plan to address a system outage. So, what exactly does DR mean and how critical is it in the modern business? Let’s break down the terms.

Read More