Infections That Can Survive The Most Extreme Cleaning 

Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it’s common knowledge that computers are susceptible to viruses, today’s breed of hackers are more creative than ever. They’re utilizing new, innovative techniques to infiltrate systems of businesses big and small. Not […]

read more

October 16th Is Steve Jobs Day

Steve Jobs Day Sheds Light On Apple Founder’s Legacy In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His contributions are well documented in motion pictures, books and an authorized biography. October […]

read more

Does Power BI Make Sense For Your Business?

If you could draw insights from your data within five minutes flat, would that get your attention? Microsoft’s Power BI is an online service, with a connection to other Software-as-a-Service (SaaS) applications, that lets you analyze, visualize and transform data quickly and easily. Through the use of Power BI dashboards, interactive reports, and rich visualizations, […]

read more

Another Uber Data Breach – It’s Never The Crime, It’s The Cover-up

In 2016, Uber suffered a data breach that exposed the personal information (names, email addresses, and phone numbers) of 57 million users. In the same breach, some 600,000 driver’s license numbers of Uber drivers were exposed. So, What Was The Response? The Federal government and state governments have laws protecting data privacy. Most of them […]

read more

Digital Transformation: Is Your Business Ready?

“Digital transformation” is a term likely circulating around IT departments everywhere. The vast majority of businesses today, no matter how big or small, will likely need to further digitalize their operations in order to keep up with competitive markets and an ever-growing list of digital trends. There are endless components associated with digital transformation. Late […]

read more

How To Ensure A Secure Home Network

Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense, homeowners don’t as often consider the concept of data security. This is understandable, but […]

read more

Wi-Fi On Planes – Who’s The Best?

If you are old enough, you may remember when making phone calls from an airplane was an expensive luxury, with sound quality so bad that conversations at times were impossible. Times have changed. Calls from planes are usually clear and carried over satellite connections. The big electronic question mark in the sky is not whether […]

read more

Google Shutting Down Google+

Google+ Social Media App Will Soon Move Off Into The Sunset Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to pull the plug. Google just announced […]

read more

What’s Inside Health IT?

Health information technology is more talked about than really understood. Part of the reason for this is that providers and their staffs usually interact with a restricted subset of health IT – the Electronic Health Record (EHR), the radiology imaging system, the billing system, and so forth. Only the organization’s IT staff and Chief Technology […]

read more

Playing in the Digital Highway: Improperly Secured Data Puts Students At Risk

When you think of cybersecurity, protecting credit card numbers or government files might come to mind, but your students’ PII (Personally Identifying Information) is a target for hackers, too. Young people make great targets because they’re a clean slate. They’re not using their identities to get a mortgage or credit card or anything, so no […]

read more

Steps To Avoid HIPAA Compliance Violations And Data Breaches

Federal regulations are usually complex and can have unintended consequences. If you are a lawyer, they are a goldmine both for prosecutors and consultants for clients. When it comes to the Health Insurance Portability and Accountability Act (HIPAA), there are, however, just a few (relatively) simple steps you can take to avoid violations, fines, and […]

read more

HIPAA Violations Are Not Limited To Data Disclosure

Four hospitals – Boston Medical Center, Brigham and Women’s Hospital, Massachusetts General (both teaching hospitals affiliated with the Harvard Medical School), and New York Presbyterian – have been fined by HHS’ Office of Civil Rights (OCR) for breaches of patient privacy. The takeaway here is that under HIPAA, protected health information extends to photos and […]

read more

Search Our Tech Insights