3108, 2016

Skype for Business and its benefits

By |August 31, 2016|Categories: VoIP|Tags: , , , , , , , , , , , |

Skype for Business (as hinted in the name), is the corporate-oriented version of Skype. Besides the snazzy title, Skype for Business possesses unique office applications that will benefit your company. Yet, many business owners pose the same question: how important is it to adopt Skype for Business? Here are three [...]

707, 2016

SMBs turn to hybrid clouds for flexibility

By |July 7, 2016|Categories: Web & Cloud|Tags: , , , , |

Who would have guessed that clouds could be so complex? Yet in a day and age of seemingly continuous technological advances, “cloud” computing has become one of the more intricate and interesting approaches to managing IT resources for businesses. Not to mention one of the most cost effective, flexible, and [...]

507, 2016

WordPress 4.5.3 fixes several security bugs

By |July 5, 2016|Categories: Security|Tags: , , , , , , , |

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it is also one of the most frequently targeted platform for hackers. Websites that are running older versions of WordPress are often vulnerable to security breaches and data leaks. Seeking to [...]

407, 2016

Microsoft Office 365 ravaged by ransomware

By |July 4, 2016|Categories: Office|Tags: , , , , , , , , , , , , |

The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad - some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in [...]

2006, 2016

Spoofed email takes down NBA team

By |June 20, 2016|Categories: Security|Tags: , , , , , , |

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a [...]

1506, 2016

Learn from this NFL team’s EMR fumble

By |June 15, 2016|Categories: Healthcare|Tags: , , , , , , , |

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable [...]

906, 2016

Ransomware adopting self-replication

By |June 9, 2016|Categories: Security|Tags: , , , , , , |

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital [...]

2305, 2016

VoIP: 5 security tips for SMBs

By |May 23, 2016|Categories: VoIP|Tags: , , , , |

As SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical. Here are [...]

1805, 2016

OpenNotes portal initiative gaining steam

By |May 18, 2016|Categories: Healthcare|Tags: , , , , , , |

A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes. Since that initial [...]

1705, 2016

New security flaw in popular image uploader

By |May 17, 2016|Categories: Security|Tags: , , , , , , |

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a [...]

Go to Top