tumblr site counter

Blog

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its stance. Find out why and learn what their new recommendations are for creating strong passwords. The problem The issue isn’t that the NIST advised people […]

Are you HIPAA-compliant? 4 Things to look into

Medical records are extremely private and their exposure could lead to negative consequences such as social stigma and job discrimination. The Health Insurance Portability and Accountability Act (HIPAA) protects this information and grants patients the right to view their own health information so that they can enjoy more control over their care. Healthcare practices must […]

Obsolete firmware poses security risks

Are you still hanging on to your old work computers since they “still work fine”? While they may still help you get the job done, their outdated firmware can make you vulnerable to security risks that can lead to major problems. What is firmware? Firmware is a basic type of software that is embedded into […]

Here’s how 5G will transform VoIP for the better

VoIP improved dramatically when telecoms shifted from 3G to 4G — and businesses are in for a treat once 5G is rolled out. Mobile VoIP VoIP calls rely heavily on sufficient download and upload speeds. For example, when mobile VoIP users on 4G networks are limited to 12 Mbps upload and 2 Mbps download speeds, […]

5 Tips to work smarter in Outlook

Microsoft Outlook comes with a raft of features that make managing your busy schedule and boosting your productivity easier. If you find Outlook’s myriad capabilities a little overwhelming, don’t worry — these tips and tricks will have you using Outlook like a pro in no time. Organize your inbox Is your Outlook inbox getting a […]

Why it pays to have a good-looking website

In a recent survey of 1,800 customers, 42% said they’re “very unlikely” to purchase from ugly websites. That’s not so surprising. After all, there are plenty of competitors’ websites that are more visually appealing and user-friendly that they can visit. If your business website fails to make a critical good first impression, it could lose […]

A closer look at fileless malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic, IT processes, and system administration tasks while leaving fewer footprints. Ultimately, your business could be at […]

Protect your Mac from these threats

Through the years, Apple products have shown resistance to different kinds of malware that Microsoft computers weren’t able to dodge. This, however, does not mean that Macs are invulnerable. Here are some threats you should watch out for to keep your Mac protected. What are the threats that can affect your Mac? There are several […]

Keep your mobile devices safe with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses. That’s why it’s even more important to keep track […]

Comparing proprietary and open-source VoIP systems

Voice over Internet Protocol (VoIP) has come a long way in helping businesses use digital telephone features with significant cost savings. The challenge for small- and medium-sized businesses is knowing where to begin. Here’s a list of pros and cons to help you decide which system is right for you. What are proprietary systems? When […]