Blog

3 Reminders for HIPAA compliance in 2017

3 Reminders for HIPAA compliance in 2017

Even if notable punishments and fines for HIPAA non-compliance have only been doled out over the last 6 years, data privacy regulations have been around for 14. And with each passing year, these rules evolve in ways that make it near impossible to keep up without an expert on hand.

Browsers leak sensitive info to hackers

Browsers leak sensitive info to hackers

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill.

Why your business needs CRM

Why your business needs CRM

The right technology investment can lead to business success. With customer relationship management (CRM) software at the helm of your sales and marketing efforts, you can nurture long-lasting business relationships and improve your bottom line. If you need a little bit more convincing, we’ve compiled five more reasons why your business needs CRM.

Grows with your business
The ol’ Rolodex may have been useful for managing a few clients, but you’re going to need a better solution if you plan to maintain relationships with hundreds, possibly thousands, more.

G Suite launches new features

G Suite launches new features

Tech giant Google has always listened to customer feedback to make continuous improvements to its powerful suite of applications. And in the most recent case, Google Cloud’s G Suite has introduced five new updates. What do they include and are they worth getting excited about?

Basic Mobile Management

G Suite’s Basic Mobile Management offers an agentless way to manage iOS devices by allowing admins to mandate basic security on those devices without requiring users to install mobile device management profiles.

Simplify calendar sharing with Office 365

Simplify calendar sharing with Office 365

Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers.

How to protect against VoIP call hacking

How to protect against VoIP call hacking

VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases.

Type and talk on enhanced Google Assistant

Type and talk on enhanced Google Assistant

By now, that voice on your smartphone that you constantly rely on to search for recipes or movie schedules may already be part of your Googling routine. As helpful as it is, barking commands at your Google Assistant, an intelligent personal assistant, isn’t always the best way to go.

Window 10’s biggest flaws addressed

Window 10’s biggest flaws addressed

In the past year, Microsoft was heavily criticized for forcing the Windows 10 OS update on PC users. After thousands of customer complaints, the tech giant vowed to make changes and appease disgruntled end users. With the new year are signs that the firm is finally tending to these problems.

Cyber security and managed services

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.

Why consider disaster recovery for 2017

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.