Articles

Build a Reliable Wireless Network for your Business

Don’t settle for wireless that doesn’t work at your office.  Implementing wireless used be complex and difficult, especially if you needed more than one access point. As with any technology, wireless has become easier, faster, better, and less expensive as the technology has matured. At JNT TEK, we’ve had great success with two brands, Meraki

2017-09-20T18:51:32+00:00August 1st, 2017|Articles, Networking|

Automate your Organizational Chart

As companies grow, keeping up with who reports to who and the management chain can be difficult. Many businesses turn to organizational charts to help visualize the structure of the management hierarchy.  Software like Visio or Lucid Charts are great tools for developing org charts, but fall short when someone changes positions, leaves the company,

2017-09-20T18:51:32+00:00July 28th, 2017|Articles, General IT|

HIPAA Compliance & Gathering Patient Data Electronically

Implementing HIPAA requirements doesn’t have to the rocket science.  In fact, with the right support implementation for most practices can be handled without too much effort.  It just takes a little commitment from the organization and basic compliance requirements can be met. HIPAA and IT 101: Protect patient data Never send any patient data electronically

2017-09-20T18:51:33+00:00July 20th, 2017|Articles, Medical|

Make sure your next computer has this security feature before making the purchase!

Many of us use our computers on a daily basis to check bank information, organize information about our families, employees, work, & ourselves. If you are like most people, your computer contains data such as usernames, passwords, social security numbers, medical information, addresses, and more whether you realize it or not.  The scary part is

2017-09-20T18:51:33+00:00July 14th, 2017|Articles, Systems|

Inexpensive and Easy to Implement Secure e-mail using Office 365

Why is it that so many companies and people still send credit card numbers, bank information, social security numbers, patient data, IT passwords, and other private information via email without basic security in mind?  The answer is -- because it’s easy! When you press the send button, your email is routed through a maze of

2017-09-20T18:51:33+00:00July 12th, 2017|Articles, Security|

Is Your Data Protected from a Virus/Ransomeware Attack?

Talking about data backup to decision makers is a great lesson in human psychology.  Many companies just don’t take it serious enough.  As long as everything is working, business owners don’t really think about it.  It’s one of those things where many people don’t think the worst will happen to them, until it does. In

2017-09-20T18:51:33+00:00July 10th, 2017|Articles, Backup & Disaster Recovery|