Blog

Blog
News Posts

Latest Blog Updates

Security Checklist: Protect Your Devices and Network…

Assign a password to every PC and device your company owns Set up PCs so they lock and require a password when an employee walks…

Clock ticking to upgrade Office 2016

Office 365 commercial subscribers still running the original Office 2016 applications have until October to update or they risk being without support, including security patches.…

Ransomware does not have to succeed

Unlike many other cyber attacks and malware types, the goal of ransomware is as well-known as the method: Critical data is encrypted until the victim…

The Importance of Windows Updates (and how…

Microsoft is constantly working towards making your PC experience better through Windows. No matter if you’re running Windows Vista or Windows 10, the Windows updates…

Distance learning platforms

Universities are increasingly offering entire degrees online in an effort to cater to a burgeoning crop of students who are learning by distance education. According…

Is this the most exciting cable ever?

There are three clichés about USB cables that emerge instantly: 1. The drawer full of knotted charging and connecting cables that would give your tidiness…

Data center upgrade: not all or nothing

Everyone wants one screen to rule them all: one console display to monitor and manage all systems in a data center. According to some vendors,…

Desktop, laptop, or tablet fleet?

Choices abound when it comes to creating a fleet to empower your workforce. When it comes to whether employees should have desktops, laptops, tablets, or…

2016 computers in review

Another year is almost over, so it's time to look back and see what happened in the world of laptop and desktop computers in 2016.…

Healthcare 2.0 in 2017

Technology will have a big role to play in serving the biggest, most expensive user group of healthcare: the over-65s. But that technology will have…

Convertibles make health care IT flexible

Computers have traditionally come in one of a few carefully defined forms. Desktop computers are systems that you go somewhere to use. Laptop computers are…

Will you ditch landlines this year?

For many small and midsize businesses, the shift to VoIP is yet to come. Even though it makes sense budgets and communications resources are limited.…

Ready for 2017: the year of ransomware?

It sounds easy: never negotiate with terrorists or other criminals. It’s not so simple, however, as the Hollywood Presbyterian Medical Center found out after its…

How to stop ransomware attacks in 2017

The screen shows an ominous message. Your system is locked, and you have hours or a few days to pay the ransom to have it…

HIPAA Security Reminder of the Week

What is PHI? PHI is individually identifiable health information which is created or received by a health care provider, health plan, or health care clearinghouse.…

No more passwords in 2017?

Yahoo!’s disclosure that hackers might have vacuumed up the passwords of as many as half a billion users lit the floodlights on two gaping issues…

HIPAA Security Reminder of the Week

Logon ID Sharing user IDs and passwords is not advisable and may be a non-compliance with your company policy or local legislation. If you shared…

Education 2017 major ransomware target

Everyone in IT for the education sector is most likely aware of the plague of ransomware that has visited their colleagues in healthcare this year.…

HIPAA Security Reminder of the Week

Treat Paper Records & Electronic Data Equally Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected…

How to stay safe and secure online…

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected,…

HIPAA TIPS: Mobile Device Compliance Part 1

Use a password or other user authentication You can configure your mobile device to require a password, personal identification number (PIN), or passcode (a pattern…

HIPAA Security Reminder of the Week

Check Devices to Ensure They Are in Compliance All desktops, laptops and other mobile computing devices must encrypted. This is to ensure that all devices…

HIPAA TIPS: Implementing a Security Management Process…

Lead Your Culture, Select Your Team, and Learn Designate a Security Officer(s): Your security officer will be responsible for developing and maintaining your security practices…

HIPAA Security Reminder of the Week

Secure PHI in Patient or Customer Care Areas Do not discuss PHI or customer details in common places such as cafeterias, elevators, parking lots, or…

Understanding the flipped classroom

For generations, teachers and students have followed a common pattern: lecture first in the classroom, do homework, and then review. Now, a growing number of…

HIPAA TIPS: Mobile Device Compliance Part 2

Install and enable encryption What is encryption? Encryption is the conversion of data into a form that cannot be read without the decryption key or…

HIPAA Security Reminder of the Week

Social Networking Safety Social engineering is quickly becoming the most common way the “bad guys” are breaking into systems. Our systems are good at keeping…

Looking after your security involves understanding the…

Today’s diverse IT environment is calling for a rethink of how information and intellectual property is secured from potential attackers. It is now crucial to…

HIPAA TIPS: Implementing a Security Management Process…

Document Your Process, Findings, and Actions The HIPAA Security Rule requires you to document your risk analysis and HIPAA-related policies, procedures, reports, and activities. Also,…

HIPAA Security Reminder of the Week

Protecting a Patient’s Privacy Well-known individuals or celebrities have the same rights to privacy as anyone else. Privacy violations involving celebrities are further complicated due…