The importance of data security

Saturday, 08 February 2014 by

Recently, a server of a Texas health-care system was hacked, compromising the protected health-care records of approximately 405,000 individuals. The three-day attack, which took place in December of 2013 at the five-hospital St. Joseph Health System in Bryan, Texas, was one of the largest HIPAA security breaches ever, according to Department of Health and Human

Disasters can strike at any time, and at any level of severity. From the deletion of a critical file, to your business being destroyed in a fire, you should be taking steps to prepare for potential disaster. In order to be prepared for a disaster, and to make it out the other side, many companies

Technology is becoming increasingly complex and many small to medium business owners and managers are finding it an increasing challenge to manage their systems, while also ensuring that they are secure. One way to prioritize security is to turn to an IT partner, many of whom offer managed antivirus solutions. While this is a viable

One of the first steps many companies take when they are looking to secure their computers and networks is to implement an anti-virus or malware program and scanning. While this will go a long way in deterring network intrusions, malware can still sometimes find a way to get onto your systems. In order to minimize

4 tips to minimize malware

Friday, 08 November 2013 by

Over the past three weeks a new and potentially harmful piece of malware has come to light. The CryptoLocker virus can lock files and will hold them for ransom. If you don’t pay, your files will be deleted. It’s highly likely that this is the most destructive piece of malware of the year, and has

Research from CIO magazine in their “2013 State of the CIO Survey” discusses how CIO’s are now being more effective about building relationships with their non-IT stakeholders and are now viewed more as a business peer. CIO’s  and IT managers are building these non-IT relationships by focusing on solving business problems and providing solutions that

Small business owners often have a tough job. As the face of the business you will be held largely accountable for anything your business does, or anything that happens to your business. If there is a security breach of your systems and personal information is stolen, you will asked questions as to why. Therefore, it

Cloud – 5 common myths

Tuesday, 01 October 2013 by

One of the most common tech related terms of the past half decade or so is the cloud. It seems like nearly every software developer and vendor offers cloud-based solutions that will change the world – or at the very least how you work. The cloud is definitely useful, but there are some common myths

The BYOD (bring your own device to work) trend has many benefits. Employees are happier when they’re using their own computer devices, and they also tend to be more productive because they can use their device to work outside of the office. They like the flexibility it provides them when using their own smartphones, laptops,

The data on your computer includes your documents, music, photos, videos, contacts, and software. Modern computer hard drives are able to hold enormous amounts of data, which makes the consequences of data loss potentially disastrous for a business. Does your organization regularly back up your data? If not, it’s important to start backing up your

TOP