Seven Things You Can Do to Keep Safe The world has been rocked once again with a serious flaw in a basic security mechanism that we all take for granted to keep us safe and secure. According to Dark Reading, researchers at Belgium’s University of Leuven have uncovered as many as 10 [...]
Free WiFi is awesome, no doubt. But public networks hide numerous hazards, including even the risk of losing all the funds in your bank account. The only foolproof way to protect yourself from data theft is to use mobile traffic to make online purchases or Internet banking. A few paid [...]
Are there independent programs that can enable call recording for eDiscovery, auditing and quality control?
The quick answer to this question is “Yes, there are,” which is remarkable considering all the ways there are to make phone calls these days. Software is readily available for recording calls made over PBX and VoIP systems and can be used with smart phones, tablets, over Skype® and as [...]
According to the Federal Emergency Management Agency (FEMA), 40% of small businesses go out of business when faced with an unplanned disruption. All it takes is a few inches of flood water, a car to crash into a power pole, a gas leak in your building or a neighboring site, [...]
Are maintenance costs for on-premises servers really high enough to make it worth transitioning to hosted services?
Businesses of all sizes are taking a strategic look at whether to run IT infrastructure on-premises or shift to a hosted model. The answer will depend on your situation and requirements. Some will keep key applications in-house and move the rest to the cloud. Others will decide IT is [...]
Passed by Congress in 1996, the Health Insurance Portability and Accountability Act (HIPAA) mandates protecting the privacy and security of patients’ confidential health information, including when and with whom that information can be shared. A supplemental HIPAA Privacy Rule regulates the use and disclosure of patient data—whether verbal, written, [...]
Everyone gets a suspicious email from time to time. Maybe it asks for personal or account information. Maybe it directs you to a legitimate-seeming website, and there you’re asked to fill in details about yourself. Perhaps, it’s a generic request or it may seem to come from someone specific, [...]