Top Menu

The future of the enterprise is fully digital

The future of the enterprise is fully digital

Companies around the world have woken up to the potential of digital technology to improve every aspect of their operations. The digital revolution is changing every layer of the enterprise in ways that were unthinkable only five years ago. Fully integrated networks and supply chains are streamlining processes, from product and service design through to […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Use of Public Wireless Access Points The risk is especially high at coffee shops, hotels, airports and other places with a high turnover of laptop users. Many malicious individuals set up laptops to act as wireless access points with legitimate-sounding names such as “T-Mobile”, “Free Wireless Access”, or “Hilton” etc. Wireless access for your laptop […]

Continue Reading
Boost productivity by buying your employees the right tech

Boost productivity by buying your employees the right tech

The key to workplace productivity is equipping your people with the best tools for the job, which includes putting the right tech at their fingertips. Technology is a force multiplier that gives your business a competitive edge, so it’s important to spend your tech budget wisely. Whether you’re equipping your frontline staff with more powerful […]

Continue Reading
The future of network security

The future of network security

Network security worries have long kept the C-suite awake at night. What challenges do businesses face and how can executives overcome them? Emerging risks The network security game has changed considerably in recent years and will no doubt continue to evolve well into the future. Enterprises are now expanding their networks both geographically and through […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Email Tips The company-provided email is intended for business use. State the information in emails in a professional manner. Each email represents. Use spell-check and grammar-check. Prepare and send email responsibly; be aware of the reader’s perception and interpretation. Double check the accuracy of the intended recipient’s email address. When sending sensitive information outside of […]

Continue Reading

ALERT! MacOS Zero-Day root User Exploit Revealed

A critical flaw has been discovered in the High Sierra Apple Macintosh Operating System. This flaw allows anyone to login as the “root” user by leaving the password blank. On the MacOS, and other Unix derivatives, the “root” account is a super-user account with full control of the system. This is a MAJOR security problem […]

Continue Reading
Best tech for teachers

Best tech for teachers

Apps, gadgets and other technologies can all make a difference to teachers – whether in the classroom, the teachers’ lounge or at home. Here’s an overview of the most useful ed-tech apps, tools and devices used by teachers today. Email, social media and IM Email and instant-messaging tools give teachers the opportunity to send out […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Cloud Storage of PHI Web-based products such as Gmail, Google Docs and Dropbox should not be used to transmit or store a patient’s protected health information (PHI). These products do not have the proper encryption and other security measures necessary to be considered secure under the HIPAA regulations. Using these products to transmit or store […]

Continue Reading
Safe, secure, smart schools begin with endpoint

Safe, secure, smart schools begin with endpoint

With students accessing their school networks via desktop, laptop, mobile, tablet and now even wearables and internet of things (IoT) devices – such as smart speakers, TVs and smartboards – an up-to-date endpoint security system is vital. The internet is helping to fuel an educational revolution the likes of which we’ve never seen. It truly […]

Continue Reading