When it comes to data backup and data mirroring, there is a lot of confusion about the two terms. Some people think they are the same thing, while others believe they are completely different. In this blog post, we will clear up the confusion and explain the difference between backup and mirror. We will also…
Read MoreProtect Your WiFI Connection If you’re like most people, you probably use the internet in public places quite often. Whether you’re at a Starbucks or other coffee shop, even in a library it’s easy to access the web on your laptop or phone. However, did you know that using the internet in public can be…
Read MoreAs technology advances, so does the way criminals can exploit us. Here are some tips to help protect yourself online. Don’t open mail from strangers In some cases, malware can be installed on your hard drive without even having to download any attachments. These ‘drive by downloads’ may disguise themselves so that even the…
Read MoreToday’s biggest cyber security concern is Identity Theft. Cyber thieves use all kinds of methods (hacking, use of spyware for intercepting information, etc.) in stealing personal or financial information from their victims, mostly from the computers. The latest of these nefarious activities even sports a name: phishing (pronounced like (fishing). The thief sends a simple…
Read MorePasswords are key to accessing all of your personal business information. It’s important to create not only a strong password, but also a memorable one so that hijackers can’t take sensitive data. 3 rules to creating a strong password include: Make your password more than 8 characters long Include a mix of numbers, symbols, and…
Read MoreMedical records are the new frontier for hackers. When you’re in need of medical attention, your records can be used against you. The more information that is leaked about you, the easier it will be to steal your identity and take advantage of you financially or physically. Protected Health Information (PHI) The HIPAA privacy rule…
Read MoreThis is one the newest scams and we’ve all had it happen: You look at your phone and notice a missed call from a familiar-looking number that isn’t in your contacts. Scammers are purposely calling numbers, hanging up, and hoping your first instinct might be to call back and see who it was, but that’s…
Read MoreThe latest Malware Scam you may not have heard of Google Docs is a great way to document share for individuals and businesses alike. With the click of your mouse, you can send an email directly to a recipient you want to share a document with, giving them the capability to view, edit, and download…
Read MoreWhy is the Doc an easy target? When it comes to data breaches and cyberattacks, healthcare organizations are a prime target. There are a few reasons why this is the case: 1) their IT infrastructure has a tendency to be older and connected in ways that create convenient attack surfaces, 2) minimizing IT staff combined…
Read MoreWHAT IS HOSTED EXCHANGE? Microsoft Exchange Server is the leading business-grade messaging system employed in North America and is currently used by 180 million people worldwide. Exchange offers a number of capabilities, including email, calendaring, task management, address lists, and access to shared document repositories, and other functions. Exchange was originally introduced in June 1996…
Read More