Documentation

Meet Industry Standards and Reduce Tech Support Hours.

Portal Access
Technology Plan
Compliance
ProTech Reporting
Jump to a Section on this Page

Share
Share via Email Share on Facebook Share on Twitter Copy Link
Small Town Tech Inc.
  • Home
  • Storefront
  • Pro+Tech
  • Managed Services
    • Endpoint Management
    • Network Management
    • Backup Solutions
    • Remote Access
    • Credential Management
    • Microsoft 365
    • Documentation
  • Website Development
  • Acces Your Documentation

Documentation and Reporting

Documentation Portal

Picture
Documentation is key to help organizations meet industry standards and compliance. It also ensures that you have a record of your invoices, tickets, estimates, and more.

Access Your Documentation
or log in with username and password

Look Up an Existing Ticket

Simplicity, transparency, and efficiency form the pillars of our customer experience. To uphold these values, we've established a comprehensive Documentation Portal dedicated to helping you manage your account in the most seamless way possible.

Navigate to our Documentation Portal for a streamlined access to a wide array of account-specific details. Gain insights into your Account Overview for a snapshot of your ongoing engagements with us, check your Stored Payments to ensure you are updated with your transaction history, and monitor your Prepaid Hours Balance to optimize your package utilization.

Stay on top of your finances with our easily accessible Invoices and Payments section, providing you with real-time updates on your transactions. We've also integrated an Estimates section for quick access to all your cost approximations, ensuring you have the financial foresight you need.

The Managed Assets and Tickets sections further allow you to maintain an accurate record of your assets and keep track of your issue resolutions. Our extensive documentation includes a host of other features tailored to equip you with everything you need to manage your account effectively.

What's in a Technology Plan?

Overview
This comprehensive document presents a detailed overview of essential categories related to IT security and management in organizations. It covers crucial aspects such as asset summary, endpoint security, Windows account configuration, password management and MFA, email and communication policies, backup and disaster recovery, incident response plan, disk encryption, network and firewall configuration, user awareness programs, vendor agreements, cyber insurance policies, website and online resource management, and regulatory compliance procedures. The primary aim of this document is to facilitate effective IT asset management, safeguard sensitive data from cyber threats, and ensure compliance with regulatory requirements. By following the guidelines provided in this document, organizations can enhance their cybersecurity posture and prevent potential security threats.
Technology Plan Sections
Asset Summary: ​This section outlines all the hardware and software assets of the organization. It provides a comprehensive list of devices, software applications, and their versions. This information is critical for effective IT asset management, which ensures that all assets are accounted for, and the organization can identify potential security threats.

Endpoint Security: This category focuses on protecting endpoints such as desktops, laptops, and mobile devices from cyber threats. It includes the installation of anti-virus software, firewalls, and intrusion detection systems. It also involves the regular update of security patches and the implementation of security policies to prevent unauthorized access.

Windows Account Configuration: This section defines the configuration of Windows accounts used by employees. It covers user permissions, password policies, and account lockout policies. The configuration of Windows accounts ensures that only authorized personnel can access sensitive information and data.

Password Management and MFA: This category covers the management of passwords, including password creation guidelines and the use of multi-factor authentication (MFA) to add an extra layer of security. Password management ensures that passwords are strong, unique, and frequently updated. MFA requires users to provide two or more forms of identification before accessing sensitive data.

Email and communication: This section outlines the email and communication policies, including email encryption, email archiving, and the acceptable use of email. It also covers the use of messaging platforms, such as instant messaging and video conferencing.

Backup/ Disaster recovery: This category defines the backup and disaster recovery procedures. It includes the frequency of backups, the backup storage location, and the procedures for restoring data. The goal is to ensure that in the event of a disaster, the organization can recover critical data and resume operations as quickly as possible.

Incident Response Plan: This category outlines the organization's incident response plan (IRP). It covers the procedures for detecting, analyzing, containing, and eradicating security incidents. The plan also defines the roles and responsibilities of the incident response team and outlines the communication procedures during a security incident. The IRP ensures that the organization can respond promptly and efficiently to potential security threats, minimizing the impact on the organization and its assets.

Disk Encryption: This section outlines the encryption of hard disks, USB drives, and other storage devices. Disk encryption ensures that data is protected even if the device is lost or stolen.

Network and Firewall: This category covers the configuration of network devices, including routers and switches, and the installation of firewalls to protect the network from cyber threats.

User Awareness: This section outlines the user training and awareness programs. It covers cybersecurity best practices, phishing awareness, and the importance of password management. User awareness programs ensure that employees understand the potential risks and how to avoid them.
Vendor Agreements: This category outlines the agreements with vendors, including cloud providers and third-party software providers. It includes service level agreements (SLAs) and the handling of sensitive data by vendors.

Cyber Insurance: This section defines the cyber insurance policies and coverage. Cyber insurance protects the organization from financial losses due to cyber attacks and data breaches.

Website and other online resources: This category covers the configuration and maintenance of the organization's website and other online resources. It includes the installation of SSL certificates, website backup procedures, and the acceptable use of online resources.
Compliance: This section covers regulatory compliance, including GDPR, HIPAA, and PCI-DSS. It outlines the procedures for compliance and the handling of sensitive data.

Reporting: This category defines the reporting procedures for security incidents, data breaches, and vulnerabilities. Reporting ensures that the organization can respond quickly and effectively to potential security threats.

Meet Industry Standards

Picture
​IT is important for every business to follow the technology standards that regulate their business and protect their business and customer data.  Each technology plan lays out the regulations that are specific business and a plan to get you to compliance as quickly and hassle free as possible.

HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) is a U.S. law that sets guidelines for protecting sensitive health information. It applies to healthcare providers, health plans, and healthcare clearinghouses that handle protected health information (PHI). Industries: Healthcare, insurance.

SOC 2: Service Organization Control 2 (SOC 2) is a standard developed by the American Institute of Certified Public Accountants (AICPA) for data security, availability, processing integrity, confidentiality, and privacy. It is intended for service providers that store, process, or transmit sensitive customer data. Industries: Technology, software as a service (SaaS), cloud computing, data centers, and other service providers that handle sensitive customer data.

ISO 27001: The ISO 27001 standard is an international standard for information security management systems (ISMS). It provides a framework for managing and protecting sensitive information and is recognized as a best practice for cybersecurity. Industries: Any industry that handles sensitive information, including financial services, healthcare, government, and technology.

PCI DSS: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements for businesses that process, store, or transmit credit card information. It is intended to prevent data breaches and ensure that customer payment card data is handled securely. Industries: Retail, hospitality, financial services, and other businesses that process credit card payments.

FISMA: The Federal Information Security Management Act (FISMA) is a U.S. law that requires federal agencies and contractors to implement information security programs to protect government information and systems. Industries: Government agencies and contractors that handle sensitive government information.

NIST: The National Institute of Standards and Technology (NIST) is a U.S. government agency that provides guidelines and best practices for information security. Its publications, such as the NIST Cybersecurity Framework, are widely adopted by businesses and organizations as a standard for cybersecurity. Industries: Any industry that handles sensitive information and wants to implement best practices for cybersecurity.

Pro+Tech Monthly Reporting

Picture

Sign Up for Pro+Tech
Learn More About Pro+Tech

At Small Town Tech, we are committed to ensuring transparency and facilitating seamless communication with our clients. Our comprehensive monthly report is designed to keep you informed about your technology environment, making it easy to understand the status and performance of your digital infrastructure. Starting with the Executive Summary, we provide you with a top-level view of your technology's health and performance. This section features vital data presented in a straightforward manner, helping you to stay abreast of any significant issues and the actions we have taken to address them.
Our Assets Overview and Device Details sections provide an in-depth analysis of your technology assets, including servers, desktops, laptops, and other network devices. These sections help you recognize potential points of vulnerability or improvement. The Antivirus and Remote Connections sections focus on the security of your systems and the level of remote access, respectively. The Task History section offers a transparent account of all tasks performed by Small Town Tech during the reporting period.
Key highlights of our monthly reports include:
  • An easy-to-understand Executive Summary of your technology health and performance.
  • A detailed Assets Overview and Device Details to understand your technology assets better.
  • Insight into your system's security through the Antivirus section.
  • A snapshot of remote system access in the Remote Connections section.
  • A complete Task History for transparency on the tasks undertaken by Small Town Tech.
In addition, if you opt for the Pro+Tech backup plan, we present a detailed status of your backups to ensure your data is protected against potential losses. Lastly, the monthly report also covers any software changes, keeping you up-to-date with your evolving software environment. At Pro+Tech, we believe in fostering satisfaction through informed services, and our monthly reports reflect this commitment.
​
 218-240-8802
304 3rd Street
​International Falls, MN 56649

Open Monday through Friday 10AM-5PM
Closed Saturday and Sunday

We appreciate your business.

Thank you for choosing Small Town Tech!
  • Home
  • Storefront
  • Pro+Tech
  • Managed Services
    • Endpoint Management
    • Network Management
    • Backup Solutions
    • Remote Access
    • Credential Management
    • Microsoft 365
    • Documentation
  • Website Development
  • Acces Your Documentation