To protect against cyberattacks and assist with audits, IT in a Box engineers help you adopt policies and best practices that educate your staff and make sure your technology helps you comply with state law. In addition to staff training, we shore up any compliance gaps by securing, documenting, regularly testing, and proactively managing all your technology. We will also help you create policies around software, application, vendor, network, wireless, physical, user, and remote access.
Federal, state, and local laws, policies, and ordinances require that you protect and secure specific information such as
- Tax information
- Public safety information
- Payment information
- Personnel information
- Records eligible for open records and FOIA requests
How are you securing this information? Are you in compliance with the law?
IT in a Box helps you comply in multiple ways.
Who endorses IT in a Box?
Call (334) 262-2566
Call (501) 978-6106
Call (203) 946-3782
Call (678) 686-6213
Call (515) 974-5316
Call (800) 876-4552
ALM’s, AML’s, CCM’s, GMA’s, Iowa League’s, and KLC’s technology solution for Alabama, Arkansas, Connecticut, Georgia, Iowa, and Kentucky towns & cities.
Comprehensive technology products and services — from a new website to data backup — tailored to the unique needs of municipalities.
Priced for towns & cities — from the smallest to the largest — with a predictable, flat monthly fee.
Policy and Compliance Features
Identifying, eliminating, and mitigating vulnerabilities
To proactively identify vulnerabilities, we help cities set policies around:
- Applications and systems
- Vendor access
- Network access
- Wireless access
- Physical access
- User access
Clarifying policies around these areas helps you identify gaps in your security that are vulnerable to cyberattack and gives you the documentation to effectively enforce compliance and best practices.
Legal and compliant incident response
Let’s say a cyberattack or another serious incident occurs. Now what? This is usually where cities often make critical mistakes related to compliance. Our municipal-experienced senior IT engineers remain calm in a crisis and guide your city through a proper incident response plan that keeps you in compliance with the law.
We can handle incidents such as:
- Virus or ransomware infection
- Email security issue
- Open records request issue
- Video archiving issue
Assistance processing Open Records Requests and enforcing records retention policies
We help you process Open Records requests and will follow your state’s records retention policies. Our engineers have extensive experience handling Open Records Requests and quickly retrieving information for municipalities.
We can also help you automatically apply records retention schedules so that you consistently follow state law. Our team of senior, municipal-experienced engineers helps you enforce policies such as archiving, retention, authorization, and deletion with a combination of automation and oversight.
Is your city getting audited for security or compliance reasons? No problem. We help cities prepare for auditors by ensuring that you meet specific security and compliance requirements related to technology. You should feel no need to worry about auditors because of technology. During the audit, we are right there with you as part of your team to make the process smooth and eliminate your anxiety.
- Arkansas Legislative Audit: For Arkansas, we work with cities that must comply with Legislative Audit. We’ve created policies and procedures designed to meet the specific demands of Arkansas state auditors.
- Criminal Justice Information Services (CJIS): Our familiarity with CJIS standards and compliance helps us assist public safety departments in cities from any state.
- Georgia Crime Information Center (GCIC): The Georgia Bureau of Investigation (GBI) requires Georgia cities to submit network diagrams and other requirements for their audits. We can help with this process through our GCIC-trained engineers.
- Arkansas Crime Information Center (ACIC): We can help Arkansas cities with ACIC compliance.
- Alabama Law Enforcement Agency (ALEA): We can help Alabama cities with ALEA compliance.
Policy and compliance training
Technology-related policies and compliance can be a tough area to learn and difficult to keep up-to-date—especially when considering how fast the technology world evolves. We help your city staff learn about technology-related security and compliance policies, the ins and outs of enforcing those policies, and the reasons these policies are so important. We can train elected officials as well as city staff.
Want to know more?
A Municipal Guide to Complying with the Law Through Information Security Policies
Technology alone won’t protect towns and cities. Clear, detailed policies document important rules, procedures, and guidelines to help you comply with federal, state, and local laws. So, what kinds of policies do you need?
This guide gives you tips and best practices to help you create the following policies:
- Contract / Vendor Management
- Network Security
- Wireless Network Security
- Physical Access Security
- Logical Access Security
- Disaster Recovery / Business Continuity
- Data Input, Processing, and Output
- Application Security
Check out other IT in a Box features...
We help guard your municipality against cyberattacks, viruses, ransomware, and data breaches by keeping your computers patched, protected, and healthy—24/7. Our management includes always-on monitoring and alerting for issues, enterprise-class antivirus protection, automated computer maintenance, ongoing software patching to keep you secure, and regular training to keep you and your staff on guard and alert.
Every day of the week, our U.S.-based helpdesk team supports you in the office, working from home, or while you’re on the road. No entry-level or junior tech support. You speak to experienced senior engineers with years of municipal experience who help you address any IT issue ASAP—either remotely or onsite.
Server failure? Flooding? A tornado? Ransomware? No problem—your data is safe. We provide onsite data backup for quick recovery, and unlimited offsite data backup for worst-case scenario recovery after a major incident like a natural disaster. You also ensure the success of your data backups with our real-time monitoring to quickly address data backup issues and quarterly testing to verify your disaster recovery.
IT in a Box protects your records, documents, and email. We’ll apply your records retention schedules to your documents so that you can reliably archive, retain, access, and delete information—and we even help you process Open Records Requests. Plus, we provide you Microsoft Office 365 for your desktops.
Does your police department rely heavily on squad car and body camera video recordings? With IT in a Box’s fixed monthly cost, towns and cities no longer need to buy additional expensive storage for video. That’s right! As your squad car and body camera video recordings continue to grow at a rapid pace, your storage costs do not change.
To protect against cyberattacks and assist with audits, we help you adopt policies and best practices that educate your staff and make sure your technology helps you comply with state law. In addition to staff training, we shore up any compliance gaps by securing, documenting, regularly testing, and proactively managing all your technology. We will also help you create policies around software, application, vendor, network, wireless, physical, user, and remote access.
We provide you a modern, custom-designed website that looks good and delivers the information your citizens need. Have as many website pages as you want including pages for town/city hall, public safety, parks and recreation, news, and events. Our website also features the ability to offer online payments and offers a user-friendly backend system so that you can add and update website information yourself. Or if you want, submit your website updates to us and we will post them for you.
Do you get frustrated wasting time on software support calls where you’re not sure if you’re resolving the problem? Our experienced staff steps in to take care of this dirty work. From resolving issues to even purchasing new computers for you, we will work with technology vendors directly so that you don’t lose hours and days on the phone.