[ Free Training] Protect Your Yourself From Hackers

Ransomware attacks are growing a staggering 350% each year. And to make matters worse, 43% of all cyber-attacks are aimed at small businesses. Why? Because more often than not, they don’t have the budget or[…]

keep Reading

Your Healthcare Organization Is HIPPA Compliant—Is That Enough for True Security?

The Health Insurance Portability and Accountability Act (HIPAA) is in place specifically to protect sensitive information in the healthcare operation. With a complex and diverse listing of standards regarding how information can be handled, how[…]

keep Reading

Are you ready for the New IOS? Here’s How to find out.

Are you excited about all the new iOS 13 features like Swipe to Type and Improved Dark Mode? Before you install, make sure your device is ready for iOS 13.   So maybe you’re not[…]

keep Reading

Top Reasons to Jumpstart Your Business’s Paperless Initiative

Jumpstart Your Business’s Paperless Initiative Want to “go paperless” with your company? See the many benefits of paperless business and learn how to jumpstart this initiative for effective results.   Many businesses toy around with[…]

keep Reading

Locking Down Endpoint Security

Mobile Devices on Your Network? Use Endpoint Security Software Mobile devices used for telecommuting can compromise your network. To keep your sensitive data safe, use a firewall, antivirus and endpoint security software.   In today’s[…]

keep Reading

Microsoft Teams Update: They Just Made It Even Better

Are you already experiencing the time-saving collaboration tools and productivity tools in Microsoft Teams? Wait until you see the 2019 Microsoft Teams Update. It’s no secret to you that no one is an island when[…]

keep Reading

Free Microsoft Outlook Training

Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”.  Yes, you can tune-in whenever and wherever you like.   This month’s[…]

keep Reading

To Lease or Buy a Copier?

Should You Buy a Copier or Lease It? Trying to decide whether to lease a copier or buy a copier? Find out the pros and cons. See when buying or leasing may be the best[…]

keep Reading

Factsheet on Mobile Applications and Cybersecurity

FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve put together a quick factsheet on mobile applications and cybersecurity.[…]

keep Reading

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word processing program for a phishing scam that disseminates TrickBot malware.[…]

keep Reading