Blog

Apps for Work from Google gets an upgrade

Apps for Work from Google gets an upgrade

While many SMBs rave about Apps for Work and its ability to provide cheap enterprise-level productivity software, it’s generally agreed upon that there is one huge gap in what they offer. Google is hoping to amend this oversight with its recent announcement of Springboard, a tool designed to bring all of the individual apps together as one big happy family.

Ecommerce: Squarespace adds new analytics

Ecommerce: Squarespace adds new analytics

Even if your business doesn’t see internet-based commerce as a top priority, it’s hard to ignore it as a sizable revenue opportunity regardless of your target market. Content management service (CMS) Squarespace knows exactly how you feel. Long kept as a secondary goal, the popular service will finally make moves to better cater to ecommerce subscribers looking to get more information and ROI out of the platform.

Increased Cyber Attacks on Healthcare Facilities & Businesses

As cyber attacks continue to hit different healthcare organizations, it is time for healthcare information security to up its game. Where once healthcare companies were overlooked by hackers, they have now become prime targets. Each month, the healthcare industry faces cyber attacks and with yet no effective security measures in place, there is little to be done to fend off attackers.

Understanding and Avoiding BEC Scams

Understanding and Avoiding BEC Scams

Over the last few years, the scams done through business emails have increased in an alarming number, causing companies all around the world to lose millions of dollars. Over the past two years, it has been reported that businesses have lost over 1.2 billion dollars due to these phishing attacks.

5 Tricks for Thwarting VoIP Threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your business.

Shadow IT: Ignore At Your Own Risk

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype.

Game Over: NBA team losses valuable data

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and dates of birth of players as part of a spoofed email attack.

5 ways to get a better ROI from your VoIP phones

5 ways to get a better ROI from your VoIP phones

If you’re making or receiving VoIP calls from clients you may be sitting on top of a trove of valuable data, and not even know it. Whether you’re still getting accustomed to your new telephony system and its features or you’ve been using it for much longer and are simply unaware of its existence, it’s time to take a look at your VoIP data.

Seven Microsoft Excel mastery tips

Seven Microsoft Excel mastery tips

When was the last time you used Microsoft Excel? And no, hovering over the icon doesn’t count. If it’s taking you too long to remember, then it probably is. Digital literacy is an essential part of finding a job these days, in fact taking a look at it further reveals that proficiency in Excel is a skill still sought after by most companies.

Learn from this NFL team’s EMR fumble

Learn from this NFL team’s EMR fumble

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable no matter the size of your company.