


3 Process Documentation Best Practices
Though comprehensive process documentation is beneficial for many tasks, it’s essential when implementing technology to enhance your network security. Your process documentation must report the required steps to successfully complete a task or project, and it...
How to Prioritize Upcoming Technology Updates
Technology updates are never fun for any business, but they’re increasingly important to ensure your business’s systems are safe and secure. Unfortunately, upgrading everything all at once just to get it over with isn’t a safe approach. The investment of time and...
Social Hacks & How to Avoid Them
So-called social hacks, also known as social engineering, involves attacks on what is perhaps the most vulnerable, easily compromised component in any computer system: The user. A social hack is any of a number of techniques, strategies, and tactics used to convince...
Microsoft Extended Support Ending Soon! Better Start Thinking about Upgrading Now
Microsoft Windows 7 and Server 2008 end of life means that Microsoft will no longer improve the product, accept warranty claims, or provide non-security hotfixes. Don’t wait until the last minute to update your Microsoft operating system, we highly recommend leaving 6...
Why do some companies fail their disaster recovery plan (DPR) audit?
Why do some companies fail their disaster recovery plan (DPR) audit? Perhaps because they did not get the right information for it. They say experience is the best teacher; thus, nothing beats what you can learn from real-world case studies. See what you can learn...
4 Debunked Myths About Cloud Services
The cloud has grown in popularity in recent years and continues to do so. However, there are some common misconceptions about cloud services that still prevent people from trusting this technology. Here are some of the top myths about the cloud you shouldn’t believe....
4 Tips for Maintaining Small Businesses’ Network Security
As a small business owner, you know every dollar counts. Unfortunately, a single cyberattack can cost your business thousands of dollars and damage your reputation. This makes it essential for your business to achieve and maintain a high level of network security....
What do mother’s really want for Mother’s Day
Every year my family asks me, “What would you like for Mother’s Day?” I often say something like, “I don’t know. Let’s just go out for dinner.” But, is that what I truly want? Dinner? At a crowded, noisy restaurant? Humm… Not this year. What DO I WANT? Good Question....
HIPAA Data Security Breach Checklist
The Oregon Department of Human Services (DHS) recently reported a HIPAA data breach that exposed the personal information of more than 350,000 Oregon residents. The source of this breach was a phishing email with a malicious link that multiple employees opened and...
4 Ways to Bolster Your Network Security for HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) sets forth standards to govern the handling of sensitive patient information. These standards apply to hospitals, medical offices and companies that handle insurance and billing. For businesses that must...