Expert Strategic IT Advice

7 Quick Tips to Help You Maximize Employee Productivity

There are only so many hours in a day, and figuring out how to get the most out of each one is a trick we all wish we could master. Or perhaps more importantly, it’s a trick you…

Are Your Data Backups Compliant With HIPAA Regulations?

Operating in the healthcare field requires you to use extra caution when it comes to your technology. Especially with regards to HIPAA compliance. One item that requires special attention is your practice’s data backup protocols. Having a reliable…

Guarding Against DDoS Attacks

On October 21, we learned that the distributed denial-of-service attack has become a vastly greater threat than ever before. By attacking domain name service provider Dyn, a botnet was able to make multiple websites largely unreachable, including Netflix,…

700 Million Android Phones May Be Sending Data to China Right Now

Significant vulnerability may be affecting as many as 700 million Android smartphones and devices RIGHT NOW. The world around us is getting more dangerous all the time, particularly as businesses leap head first into the new digital world…

7 Strategies To Modernize Your Insurance Company’s Information Technology

A discussion of the seven core strategies that insurance companies can use to modernize their IT efforts. When it comes to information technology, the legacy systems of yesterday are very rarely capable of handling the unique challenges of…

John Podesta and Colin Powell’s Email Accounts Hacked – And How

It happened on March 19 of this year – campaign chairman for Hillary Clinton John Podesta unwittingly clicked on a link in an email he thought was from Google corporate. It wasn’t from Google, but rather from a…

Multi-Factor Authentication a Good Solution to Unauthorized Access Problem

The use of only passwords – even well-encrypted ones – for login permission is not enough, it seems, to stem the tide serious problem of black hat hacking and unauthorized access. Across the cybersphere, it seems the more…

How Ransomware Has Changed the Nature of Data Backup and Recovery

It used to be that you could safely backup data by taking copies of all of it at regular intervals and putting it on a local backup server, which would then write the data to tape replication which…

Why You Should Delete Your Yahoo Account Immediately

If the hack of Yahoo corporate and compromise of hundreds of millions of account users’ data wasn’t enough of a reason to delete your Yahoo account and never look back, how about the fact that former Yahoo CEO…

New Ransomware Strain “Mamba” Capable of Full Disk Encryption

A new discovery by a Brazilian Infosec research group called Morphus Labs should (once again) make you think twice about clicking on any unsolicited links. Dubbed “Mamba,” the new ransomware strain, like the snake it was named after,…