CUPID —The New Heartbleed

The Heartbleed SSL Bug, one of the most serious vulnerabilities to ever hit the Internet,caused problems for enterprise wireless and wired networks about two months ago.  Since then, it has been patched and dealt with. […]

keep Reading

Cloud Technologies Allows Today’s Connected Law Firms To Better Serve The Needs Of Clients

More law firms are switching to cloud services in today’s mobile world. There are both positives and negatives to switching physical data to a third-party. Ultimately, only you can decide what’s best for your firm[…]

keep Reading

Did you know 62% of all emails contain malicious attachments?

Your business heavily relies on email as the foundation of your day-to-day operations. And as email continues to become more prevalent, your business must ensure your communications are secure. Vertical IT offers Email Security Solutions to prevent[…]

keep Reading

Did You Know? Most Security Threats come from inside your company network

Today’s rough economy is forcing businesses to downsize their workforce. Now that there are fewer employees, more important information is distributed to each individual. If too many employees have access to sensitive assets, there is[…]

keep Reading

Microsoft releases a new Windows Surface tablet that the company says will replace your laptop.

The Surface Pro 3 costs $850 for the basic version. Other features include a 12-inch multi-touch display screen, a pen to write on the surface, a detachable keyboard, 9-hour battery life, and a high-end Intel[…]

keep Reading

The Fog replaces the Cloud

The days of saving your information on your computer’s hard drive are gone. Now, there is a more efficient way to share or store data in a safer, accessible location. Unfortunately, the luxury to save[…]

keep Reading

New Ruling is a HUGE Step for Your Privacy Rights – You Can Ask Google to Remove Search Results About Yourself!

Have you ever looked up your name in a search engine and found something embarrassing or upsetting? As of May 13th, 2014, you’re able to request to delete that information. And if the search engine[…]

keep Reading

Sometimes HIPAA Violations Involve Technology, But Technology Is Not At Fault.

Our job as your trusted IT and Healthcare technology company is to help our clients comply with HIPAA regulations. We also strive to educate our clients and their employees on the importance of protecting patient[…]

keep Reading

Keylogging and HIPAA Breaches.  What’s Hiding In Your Computers?

The University of California, Irvine Student Health Center has been the victim of a HIPAA breach.  Nearly 2,000 pieces of PHI (protected health information), including financial data, were stolen via a keylogger attack.  The keylogger[…]

keep Reading

Tired of paying hidden fees with your current IT consultant? Here are some secrets to avoiding those hidden fees found in most Managed Services agreements.

Nobody likes to pay for a service only to be told they owe extra. Hidden fees are not only aggravating, but they’re also dishonest. Here are five ways to avoid paying more than the original[…]

keep Reading