Here at UniVista, we’ve spent many years cultivating best practices and procedures that surpass our needs. This means, they are more than likely capable of suiting your business needs as well. Because of this, we want you to have access to these same processes we have internally. Cultivating your relationship with us gives you access to our library of policies, procedures and more. This way you can build off our tried and tested internal processes to better yours! 

Read More

As the year draws to an end and the holidays are upon us we would like to take this opportunity to thank you for being a customer with UniVista. Our mission is to provide a quality service and our personal best to you each and every day. We do this by following specific processes, maintain technical structures, and build close-business relationships with our customers.  

Read More

So your company is growing and you need to increase your workforce, but what is the best way to do this smoothly and efficiently? The first thing to do is put together a checklist to ensure your new employee has the best onboarding experience possible. This promotes not only a good impression on the employee, it establishes an impression of organization and investment in the employee’s future.

Read More

We’ve been talking a lot about how end of life can negatively impact commonly used servers and desktops, but did you know this can affect your email software as well? In addition to Server 2008 and Windows 7, Exchange 2010 will be ending their support in January of 2020, which means any updates and patches will cease for your email as well.

Read More

Now that you know what EOL (end of life) means, let’s discuss what that means to your business. Previously mentioned in The Ping: End of Life, allowing end of life software on your network can leave you susceptible to malware and allow your company software to lose the ability to obtain updates and upgrades on either a server or desktop platform.

Read More

Criminal Justice Information Services (CJIS)

Criminal Justice Information Services, or CJIS, is a division of the FBI that provides criminal justice information needed to perform law enforcement duties. It “serve[s] as the focal point and central repository for criminal justice information services in the FBI.” – FBI. In Texas this information is disseminated via the DPS and includes details such as vehicle registration, criminal history, driver’s license, license plate, firearm, etc. Because this information is highly sensitive and needs to be protected, CJIS provides security compliance requirements and performs audits to ensure these requirements are being met. Below are just a few example requirements of the Security Policy…

  • Security Awareness Training
  • Perimeter Intrusion Detection
  • Advanced Authentication
  • Maintain Log History
  • Change Management
  • Device Encryption

Failing a single audit flags an agency as non-compliant. If compliance is not achieved, the agency can lose access to the information and tools needed to perform their duties.

Read More

Building an Effective Human Firewall

Cyber attacks aren’t just getting more frequent, they are also becoming significantly more vicious and sophisticated. One reason for this is because Cybercrime is easy to do…anyone can find the tools on the dark web and easily start their own cybercrime business. Now, more than ever, is time to take stock of your countermeasures with a focus on your staff as the likeliest entry point for cybercrime attacks.

Cyber criminals count on the fact that busy people perform hundreds, if not thousands, of daily actions on a computer or device connected to the internet and they know that most of those actions are performed automatically and without much thought. As a result, the majority of today’s data breaches result from human error, making cybersecurity a “people problem” as well as a technology issue.

The solution to this people problem goes beyond IT and involves cultivating an entirely new employee mindset around cybersecurity. Our recommendation is to create an expectation of 100% participation…it only takes one person to click on one link to bring the system down.
When fully engaged, these three steps creates a formidable human firewall capable of spotting and preventing even the most sophisticated cybercrime attempts and offers a significant step towards mitigating the human error that is behind 95% of the cyber breaches occurring today.

Read More

What is Cross Training?

For me, I like riding my bike but need to throw in a run sometimes to break up the monotony. You’re probably thinking, “That can’t be the cross training you’re talking about. What does that have to do with my business?”

You’re right!

The cross training I really should be talking about is the process that will keep your employees well trained and keep the critical functions in your business humming along regardless of who is out sick or on vacation.

Read More