Don’t know what you’ve got or how it’s running? Let us help!
A Different Kind of Approach
When we entered the managed IT space in 2007, we didn’t know what we didn’t know. We happily on-boarded any client, any technology, and any problems that came with them. While that made it easy to add clients, it became increasingly difficult to meet our own high service expectations.
In 2015, we threw out everything we thought we knew about technology partnerships and re-imagined a better way. We call this way the “Network Discovery“, and we’ve never been happier with the process! By starting with a discovery, we emphasize education instead of selling. Read more about how we do it, why we do it, and the benefits to you!
The Proven Process
The first step of our process is to have a conversation with you about your office, your employees, support needs, and any high-level challenges you are facing. We’ll typically review cloud services, backup strategy, and any gaps in your current support system.
At the conclusion of that meeting, we’ll have enough information to determine if we should proceed with the conversation. If so, we’ll continue on to the Network Discovery.
Moving to the network discovery, we’ll spend time diving into the technical aspects of your network. We’ll explore details about your server(s), workstations, laptops, wireless access points, network switches, firewalls, and mobile devices. At the software level, we’ll review anti-virus and malware protection, patch status, backup protection, security policies, administrative settings, and password requirements.
We then take this information to our office and review the data with our technical staff and project managers. We’ll explore the good, the bad, and occasionally, the ugly, and put together an executive summary of our findings.
When working with Healthcare partners, it’s critical to take some time to understand the state of compliance. It’s not uncommon for a practice to have a gap or two, and it’s important to identify those issues early in the conversation.
During this time, we’ll meet with your compliance officer, review policies and procedures, obtain the most recent Annual Risk Assessment and Workplan, collect the sanction policy, ask about insurance policies, review physical, technical, and administrative safeguards to patient privacy and data security, email usage and encryption services, Business Associate Agreements, and examine system encryption status across the network.
The third step in our process is education. At this time, we’ll present an executive summary to you along with an overview of all of the information we’ve collected. We’ll cover the strengths and weaknesses found in the discovery as well as any security problems that may arise. For any problems we find, we’ll share how we would fix it if given the opportunity.
In some cases, we find the network is in great health, but in other cases we find significant challenges that must be addressed to protect the office, shareholders, employees, and customers or patients. Once the process is complete, you’ll have all the information required to make an informed decision about your technology needs.