Technological progression has transformed business operations considerably, with VoIP being one of the most notable advancements.

Remember that sense of panic you had the last time you couldn’t find your smartphone? Now imagine your phone represents your company’s data and software systems. What would you do if you lost everything in the next 60 seconds? While your phone is usually in the last place you look, in the business world, losing something important like data and software doesn’t always have an easy solution. That’s why it is vital your company invests in disaster recovery.

Read more

As we rang in the new decade, the Emisoft Malware Lab’s 2019 State of Ransomware Report notified us that last year approximately 764 healthcare organizations, 113 state municipalities, and 89 universities were victims of this vicious form of malware. After a ransomware attack, hackers acquire and lock your employees out of their personal data. These staggering numbers and the damage done cause a natural reaction to want to investigate and resolve the problem at hand. 

Read more

Be safe, not sorry…

The life of a physician rarely allows for extracurricular studies in operational system security. However, a practice’s professional health relies on being HIPAA compliant. Even though you think you are HIPAA compliant, you have a nagging fear that your sensitive patient information (PHI) could be at risk or compromised. Time isn’t a luxury for you, and information technology isn’t your wheelhouse, so safeguarding data continues to feel like an albatross slowly choking your air supply…

Read more

The HIPAA in the Room

Mention HIPAA to any member of the healthcare industry and you may notice an involuntary shudder followed by a cool wave of ambivalence.  What is it about that assembly of letters that evokes such a reaction?  What is it about HIPAA …

Read more