With the hustle and bustle of day-to-day life a personal assistant surely would come in handy, right? While this may not be fiscally responsible, maybe a voice assistant would be. In our last article, The Ping: Voice Assistants, we discussed how a voice assistant can manage a lot of your needs. Things such as the weather for the day, the traffic to work and your grocery list. However, sometimes just managing your house is what you need the most help with. Are you aware that they can do that too and what they are really managing?

Read More

How Does Email Work?

Creating and sending an email may seem like a magical process that happens all on its own, but it’s actually a little more complicated than that. So how does it work? To get an email to your intended recipient, you send an email from your server to their server via the internet. This is done using SMTP (Simple Mail Transfer Protocol). Seems simple, right? It doesn’t stop there. In order to ensure the safety of that email’s contents, your everyday applications use TLS (Transport Layer Security) to send that email securely across the network.

Read More

Microsoft Office 365 is a cloud-based subscription model that offers email and office productivity solutions that many are finding attractive. Business applications from Outlook to Excel is accessible anywhere you have an internet connection on multiple devices, depending on the plan you pick. Traditional Microsoft Office applications were only utilized through desktop installations, limiting access to your productivity environment.

UniVista offers three of the most popular licenses within O365, Business Essentials, Business Premium and Enterprise E3.

Read More

Criminal Justice Information Services (CJIS)

Criminal Justice Information Services, or CJIS, is a division of the FBI that provides criminal justice information needed to perform law enforcement duties. It “serve[s] as the focal point and central repository for criminal justice information services in the FBI.” – FBI. In Texas this information is disseminated via the DPS and includes details such as vehicle registration, criminal history, driver’s license, license plate, firearm, etc. Because this information is highly sensitive and needs to be protected, CJIS provides security compliance requirements and performs audits to ensure these requirements are being met. Below are just a few example requirements of the Security Policy…

  • Security Awareness Training
  • Perimeter Intrusion Detection
  • Advanced Authentication
  • Maintain Log History
  • Change Management
  • Device Encryption

Failing a single audit flags an agency as non-compliant. If compliance is not achieved, the agency can lose access to the information and tools needed to perform their duties.

Read More

Cybersecurity starts first, and foremost, with people. Even with a secure perimeter, the people using the network can introduce risks to the environment. Teaching your employees what to look out for and where their responsibilities lie are the first steps to closing the security gaps and lessen the chances of your business falling victim to a vicious attack.

Read More

Once you’ve decided to work remotely, you may find it difficult to stay in sync with the rest of your team back in the office.  Digital workforce infrastructure has been engineered for decades to provide a stable foundation for your office, but now that you’re outside of your firewall you may find yourself as frustrated as a hacker would be when trying to access your company’s documents.  While you may still be able to email back and forth with your coworkers, you can’t easily update your shared files, see who’s available to receive an incoming call, or update a customer’s order status.

Read More

Working remotely may seem rather quick and easy. You head on over to your local coffee shop, order your triple-shot, half-caff, no foam, extra hot latte and sit at your favorite table in the corner.  You double check to make sure no one is looking over your shoulder, pop open your laptop and get to work. Right? Well, it’s actually a little more complicated than that. Staying secure in a non-secure work place comes with some much needed extra steps to keep your company data away from prying eyes.

Read More

So what exactly would the Modern Office be considered nowadays? Just like Tamagotchis and Blockbuster Video, working full-time in an office seems to be a thing of the past. Telecommuting, or working from home, has increased in the workforce by 115% over the past 13 years -with most employees spending at least 50% of their time working remotely. All of the technology changes over the past years have made it easier to work not only from an office, but right from your home.

Read More