WPA2 Hacks And You

By | 2017-11-09T09:33:28+00:00 November 9th, 2017|Categories: Security|Tags: |

Seven Things You Can Do to Keep Safe The world has been rocked once again with a serious flaw in a basic security mechanism that we all take for granted to keep us safe and secure. According to Dark Reading, researchers at Belgium’s University of Leuven have uncovered as many as 10 [...]

Are there independent programs that can enable call recording for eDiscovery, auditing and quality control?

By | 2017-06-27T10:07:29+00:00 June 27th, 2017|Categories: Cloud, Compliance, Security|Tags: , , |

The quick answer to this question is “Yes, there are,” which is remarkable considering all the ways there are to make phone calls these days. Software is readily available for recording calls made over PBX and VoIP systems and can be used with smart phones, tablets, over Skype® and as [...]

How do I ensure that my business continuity plan is efficient enough to be a worthwhile investment?

By | 2017-06-23T14:09:32+00:00 June 23rd, 2017|Categories: Backup, Cloud, Infrastructure, Security, VOIP|Tags: , , , , |

According to the Federal Emergency Management Agency (FEMA), 40% of small businesses go out of business when faced with an unplanned disruption. All it takes is a few inches of flood water, a car to crash into a power pole, a gas leak in your building or a neighboring site, [...]

Are maintenance costs for on-premises servers really high enough to make it worth transitioning to hosted services?

By | 2017-06-23T13:58:30+00:00 June 23rd, 2017|Categories: Cloud, Compliance, Cost, Infrastructure, Management, Security|Tags: , , , , |

Businesses of all sizes are taking a strategic look at whether to run IT infrastructure on-premises or shift to a hosted model. The answer will depend on your situation and requirements. Some will keep key applications in-house and move the rest to the cloud.  Others will decide IT is [...]

How do I make sure my email and file system are compliant with HIPAA?

By | 2017-06-23T13:49:04+00:00 June 23rd, 2017|Categories: Cloud, Compliance, HIPAA, Security|Tags: , , , |

Passed by Congress in 1996, the Health Insurance Portability and Accountability Act (HIPAA) mandates protecting the privacy and security of patients’ confidential health information, including when and with whom that information can be shared. A supplemental HIPAA Privacy Rule regulates the use and disclosure of patient data—whether verbal, written, [...]

Can a cloud solution prevent phishing?

By | 2017-06-22T08:44:42+00:00 June 22nd, 2017|Categories: Cloud, Security|Tags: , |

Everyone gets a suspicious email from time to time. Maybe it asks for personal or account information. Maybe it directs you to a legitimate-seeming website, and there you’re asked to fill in details about yourself. Perhaps, it’s a generic request or it may seem to come from someone specific, [...]