img

3 Easy Steps To Secure Word Documents With A Password

Do you regularly send sensitive documents via email? If so, you are probably careful to double check that you have included the right recipient; you might even go one step further by adding a read receipt to the email. The next step that you could take when sending sensitive documents via email, is...

Keep Reading

Do You Know These 5 Simple Cost-Effective Tips To Protect ePHI?

HIPAA security guidelines can be perplexing for most. However, there are simple and inexpensive tips you can use to secure your patients' electronic Protected Health Information (ePHI). The first thing to know is that HIPAA security is a process – it takes time to implement. Your healthcare org...

Keep Reading

FBI Warns Businesses Of Cyber Attack From China

Who Has Been Impacted by Chinese Cyber Attacks? At the beginning of the year, the FBI warned businesses to protect themselves from cyber attacks by foreign entities, saying activity has spiked in the past 18 months. Hewlett Packard and IBM are among the businesses most recently targeted. There’s ...

Keep Reading

How To Add A Column From an Example In Microsoft Excel

Microsoft Excel has been around for ages. However, did you know that there are a whole host of functionality features to simplify your workflow and help you save time? One of the most commonly used tools is the Add Column from Example option. Here’s what you need to know about it. How Do You ...

Keep Reading

9 New Game-Changing Additions To Microsoft Office 365

Microsoft recently announced several new updates to Office 365. These updates and additions will help organizations who want to streamline efficiencies and remain compliant with new regulations across numerous industries. The nine key additions and updates to Office 365 will also help organizatio...

Keep Reading

How To Explain The Costs Of Cloud Computing To Healthcare Execs

How Much is Spent Worldwide on IT Costs? Worldwide IT costs in 2018 hit an estimated $3.7 trillion, up 4.3 percent over the prior year, according to the Gartner, Inc. With so much at stake, it’s essential for all companies that utilize IT to consider the pros and cons of a traditional IT approac...

Keep Reading

SCAM ALERT: Google Play Gift Cards

If there’s a will there’s a way when it comes to scammers, especially with gift cards. Everyone loves gift cards. Consumers love how easy it is to purchase gift cards, use gift cards and even give gift cards. It’s as simple as buying a card at a brick and mortar store or clicking a few butto...

Keep Reading

What Are The Top Cybersecurity Predictions For 2019?

There was something of a cultural shift in the technology sector during 2018 that will undoubtedly impact 2019. Up until last year, cybersecurity issues seemed to predominately plague significant corporations and organizations. The Democratic National Committee hack fallout and Russian bots on Face...

Keep Reading

Should Your Business Upgrade It’s Website To WordPress 5.0.2

Only a few short weeks ago, we wrote about the introduction of WordPress 5.0 in early December and discussed whether or not your company should upgrade now, never or at a later date. Our recommendation was to wait until some of the bugs had been worked out of the system and until your business has ...

Keep Reading

Are Bitcoin Bomb Threats A Serious Security Threat?

Users around the world have been receiving bitcoin extortion emails for a long time, one of the most notorious being a “sextortion” threat to show a computer-eye view of you watching adult videos to the world. The latest threat is more alarming: the sender claims to have a bomb planted at the...

Keep Reading