David Ferris

Intelligent Business Applications To Accelerate Your Business’ Digital Transformation

Transform Your Small Business With Intelligent Business Applications To Make Life Easier Is your business halted by precious time filling out invoices? Are you struggling with organizing your workflow outside of the office? Or do you need smarter…

When You are Using an Android Smartphone for Business, It’s Time to Reconsider

Hackers getting into your Android devices through a pre-installed backdoor can get full access to your smartphone and potentially computer network If you are using an Android smartphone in business, you may want to think again. BitSight just…

Upgrading to macOS Sierra & iOS 10?: What You Need To Know

Remove PPTP VPN before upgrading to macOS Sierra & iOS 10 If you have recently set up a PPTP VPN server, macOS Sierra and iOS 10 users will not be able to connect to your server. This is…

7 Quick Tips to Help You Maximize Employee Productivity

There are only so many hours in a day, and figuring out how to get the most out of each one is a trick we all wish we could master. Or perhaps more importantly, it’s a trick you…

Are Your Data Backups Compliant With HIPAA Regulations?

Operating in the healthcare field requires you to use extra caution when it comes to your technology. Especially with regards to HIPAA compliance. One item that requires special attention is your practice’s data backup protocols. Having a reliable…

Guarding Against DDoS Attacks

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix,…

700 Million Android Phones May Be Sending Data to China Right Now

Significant vulnerability may be affecting as many as 700 million Android smartphones and devices RIGHT NOW. The world around us is getting more dangerous all the time, particularly as businesses leap head first into the new digital world…

7 Strategies To Modernize Your Insurance Company’s Information Technology

A discussion of the seven core strategies that insurance companies can use to modernize their IT efforts. When it comes to information technology, the legacy systems of yesterday are very rarely capable of handling the unique challenges of…

John Podesta and Colin Powell’s Email Accounts Hacked – And How

It happened on March 19 of this year – campaign chairman for Hillary Clinton John Podesta unwittingly clicked on a link in an email he thought was from Google corporate. It wasn’t from Google, but rather from a…

Multi-Factor Authentication a Good Solution to Unauthorized Access Problem

The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more…