Using Personal Email In The Office?

Personal email accounts for business purposes It can be tempting to use your familiar, personal email account to send and receive emails for your professional life – but you shouldn’t take the risk. Is it safe to use your personal email for business? Using your personal email to communicate for business purposes isn’t a good […]

read more

6 Ways To Help You Become HIPAA Compliant

Tips for HIPAA Compliance (Questions/Answers) Need a little insight into strengthening up your HIPAA compliance efforts? Check out these 6 simple steps you can take to become more compliant and secure. No one said HIPAA compliance was easy. It’s a higher level of security and data governance that healthcare organizations have to follow – if […]

read more

Honoring Those Who Gave Their Lives

On Memorial Day we remember the veterans who made the ultimate sacrifice for our country. These brave men and women have dedicated their lives to honor the living and make our lives better.     Can’t see the video above?  Click Here. The History Of Memorial Day Memorial day is the most solemn American holiday. Memorial […]

read more

What You Need to Know About NextGen Malware and AntiVirus Protection

If you’ve heard the terms “NextGen Malware and Antivirus Protection”, you might think they were made up by a marketer who had a few too many lattes — but this type of security truly takes it up a notch from more familiar offerings. Today’s cybercriminals are becoming increasingly savvy and are finding ways to short-circuit […]

read more

How to Share Screens with Microsoft Teams

  Microsoft Teams is an amazingly powerful collaboration tool that’s available as a part of the Microsoft Office suite. At its core, it’s kind of like Slack on steroids, but that core functionality is just the tip of the iceberg. Because it’s integrated with the rest of Microsoft Office, it has so many powerful features. […]

read more

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.” In other words, they require a login, personal access codes, or network […]

read more

Critical Update From Microsoft: Remote Desktop Services

Impacted Systems: Windows Server 2003 Windows XP Windows7 Windows Server 2008 Nonimpacted Systems: Windows 10 Windows Server 2016 Windows Server 2019 If you are still using Windows Server 2003 or XP, Windows 7, Windows 2008 R2, or Windows 2008 you could be in trouble. A wormable virus may be coming your way. The virus is […]

read more

Church Hit with Business Email Compromise

There was big business security news out of Brunswick, Ohio (a part of the Cleveland metro area) last month, this time involving a church. According to local reporting, the St. Ambrose Catholic Parish recently announced to parishioners that they had been swindled out of a whopping $1.75 million. The attackers’ methods have real implications for churches […]

read more

Search Our Tech Insights