attorney laptop with gavel

Ethics of Confidentiality

Ethics opinions stress the requirement for law firms to use reasonable and competent safeguards to ensure the confidentiality of email. And encryption is mandated for some types of client information used in banking and healthcare-related cases. We have the expertise and resources to help you comply, and our service will automatically encrypt messages and attachments […]

Audit Your Data Security

Data Security – How to Audit Your Company

After the Equifax data breach, it should be obvious why any business should audit the security of their data.  Most companies keep everything from inventory lists to customer financial data.  Data breaches could lead to legal and financial liability, bad publicity,  and potential law suits or fines by the government. Therefore, it is important that companies […]

Online Shopping Security – Can You Trust That Vendor?

After a lot of time and energy, your research has paid off and you have found the item that you want to purchase.  You even found it at a great price!  But before you complete your online shopping, are you sure that your credit card information is safe? Despite the popularity of online shopping, it isn’t […]

graphic of devil coming out of computer screens surprising user who doesn't know how to keep information safe

How to Keep Your Information Safe

How to Keep Your Information Safe Spoofing, phishing, keystroke loggers, malware, and schemes.  You cannot turn around anymore without hearing about someone that has been hacked or had their data compromised.  So, you ask yourself, what’s a computer user to do to keep information safe?  Below are some tips that we’ve put together to help […]

man holding orb with superimposed cyber security terms

National Cyber Security Awareness Month

October is National Cyber Security Awareness Month.  This is an annual campaign created by a partnership of the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to raise awareness about cyber security and offer tips to help people protect their online activities. Usernames and passwords are not enough to keep all […]

construction equipment creating the word change changing it provider

Changing Your IT Provider

The only thing worse than having your IT people fail to deliver on service to your business is actually changing your IT provider. There is so much that you remember when you tried to find the last one. Comparing pricing, services, doing your reference calling, and everything else – it can be overwhelming. Why Change? […]

Keyboard showing keys named Security and Malfunction with an unlocked padlock indicating a Cyber Security Mistake

Cyber Security Mistakes to Avoid

Did you know that the average cyber attack cost a small businesses over $20,000 in 2014? That number is expected to go up when you consider new cyber security threats like ransomware and the impact on how that can damage your business. Productivity stoppage, data recovery, and lost sales opportunities all add up. Not Knowing […]

windows 10 screen presentation with silhouette of person speaking

Windows 10 – Free Offer Expiration – Time To Upgrade

Microsoft confirmed last week that the free upgrade to Windows 10 will expire on July 29th, 2016. Yours truly was expecting an extension, but it seems that the market penetration is good enough for Microsoft at this time (they can still extend later of course). The free upgrade will allow you to upgrade your copy […]

a happy computer technology user on the left and an angry one on the right

10 Positive and Negative Technology Changes that Affect Business Operations

Your technology – everything in your office from physical devices to information networks – has an incredibly transformative influence on your business world and economy.  Not only does your technology impact the smallest details of day-to-day business operations by increasing the productivity of workers and investments, accelerating economic activity, promoting interdependence between industries, and allowing […]

puzzle pieces of a managed security strategy with the word security in the open surrounded by like words

Security Strategy

Layered Approach to Security A door isn’t always enough to keep people out, so we create locks. Locks can be broken, so we create security systems. Just because we have a security system, doesn’t mean we don’t have a door. Each component works with the others to help guarantee security. It’s all part of a […]