Blog

What can we expect from Apple HealthKit?

Medical records are generally inaccessible and hard to understand. In fact, if you were to try reading your own medical data, you might find that it’s almost as if it’s in a different language. A medical record can be riddled with cryptic phrases, acronyms and complex terms that mean nothing in the eyes of someone […]

Apps for Work from Google gets an upgrade

While many SMBs rave about Apps for Work and its ability to provide cheap enterprise-level productivity software, it’s generally agreed upon that there is one huge gap in what they offer. Google is hoping to amend this oversight with its recent announcement of Springboard, a tool designed to bring all of the individual apps together […]

Ecommerce: Squarespace adds new analytics

Even if your business doesn’t see internet-based commerce as a top priority, it’s hard to ignore it as a sizable revenue opportunity regardless of your target market. Content management service (CMS) Squarespace knows exactly how you feel. Long kept as a secondary goal, the popular service will finally make moves to better cater to ecommerce […]

Increased Cyber Attacks on Healthcare Facilities & Businesses

As cyber attacks continue to hit different healthcare organizations, it is time for healthcare information security to up its game. Where once healthcare companies were overlooked by hackers, they have now become prime targets. Each month, the healthcare industry faces cyber attacks and with yet no effective security measures in place, there is little to be done to fend off attackers.

Understanding and Avoiding BEC Scams

Over the last few years, the scams done through business emails have increased in an alarming number, causing companies all around the world to lose millions of dollars. Over the past two years, it has been reported that businesses have lost over 1.2 billion dollars due to these phishing attacks.

5 Tricks for Thwarting VoIP Threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your business.

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype.

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and […]