It Infrastructure

Overview

Our IT infrastructure is meticulously crafted to prioritize scalability, flexibility, and redundancy as its fundamental pillars. Supported by advanced incident management and support tools, our infrastructure is fortified with redundancy capabilities to ensure uninterrupted operations.

We have made significant investments in state-of-the-art networking technologies, complemented by top-tier computing and communication infrastructure tailored to meet the unique requirements of the healthcare industry.

Local Area Network (LAN)

Our Local Area Network operates on a TCP/IP-based foundation, delivering network speeds of both 100 and 1000 MBPS. The performance of our network is consistently monitored through LinkSys manageable switches. Physical connections are established using D-Link and Link Sys switches. We use Cisco Routers & RAD Modems, and employ Internet leased lines to establish robust connectivity.

Our Internet bandwidth is sourced from three distinct service providers, ensuring redundancy and reliability. We actively monitor bandwidth utilization through MRTG Graphs, enabling proactive management. To bolster security against malicious threats, Internet lines are secured by terminating them on Link Sys Firewalls.

Data Handling

Customer data handling within our network is strictly prohibited, with the majority of our tasks executed through secure remote access to customer environments. We enforce rigorous controls over internet and email access. Our backup policies are robust and tailored to address the distinct requirements of each process, ensuring meticulous implementation. Confidentiality agreements signed by staff members bolster data security, and access to printers is confined to controlled channels.

Accessibility & Security

We employ cutting-edge biometric access controllers to regulate entry into our office premises, with infrastructure dedicated to healthcare needs. Firewalls serve as the frontline defense, supported by comprehensive security policies spanning desktops, passwords, email, and domains. As an additional security measure, floppy, CD drives, and USB mass storage devices are disabled. Access to client systems requires mandatory user IDs and passwords. A 24/7 on-campus security staff ensures constant vigilance, while advanced anti-virus software guards against threats. For secure point-to-point network connectivity, routers are configured with Data Encryption Standard (DES) encryption at both ends.

IT Staff

We ensure round-the-clock availability of IT staff to guarantee uninterrupted service. Our IT team consists of certified professionals proficient in various technologies. In-house IT development teams are readily accessible to design and develop applications tailored to clients' unique requirements.

Monitoring

We conduct periodic network and host vulnerability tests to proactively address potential weaknesses. 3AG adheres to a schedule of routine internal audits to verify the integrity and security of our systems. Firewall logs are regularly scrutinized to ensure ongoing security.

Security Measures & Access Controls

Network Firewalls &Regular Review

Employ network firewalls and conduct regular reviews and updates to enhance security.

Login and ID Authentication

Enforce login and ID authentication at desktop level to access network and client systems.

Data Storage Disabled On Local Systems

Disable data storage on local systems to prevent unauthorized data retention.

Disabled Data Drives,USB, Ports, Wi-Fi

Disabled data drives, USB ports, ports, and Wi-Fi to mitigate potential security risks.

Anti-Virus Software

Installed anti-virus software on all systems to protect against malware and cyber threats.

Email Monitoring at Server Level

Monitor emails at the server level to detect and prevent potential security breaches.

Periodic Audits

Conducting periodic information security management and control audits by external third-party agencies.

At 3AG Business & Tech Solutions, our advanced IT infrastructure is designed with security and confidentiality as top priorities, ensuring that providers can trust us with their sensitive data and Protected Health Information (PHI). With a proven track record of safeguarding data for over 70 different institutions, we have established ourselves as a trusted partner in healthcare data management.

Providers can rest assured that their data remains protected and compliant with industry standards, allowing them to focus on delivering quality care while we handle the intricacies of data security and privacy.