What Can Healthcare Providers Do To Make Cloud Adoption Easier?

What Can Healthcare Providers Do To Make Cloud Adoption Easier?

Microsoft’s Azure cloud service recently suffered a major disruption at one of its data centers in Texas. A truly epic lightning storm caused even the backup generators to go offline. Every time the center struggled back to a semblance of normal operations, another round of thunderbolts blew through and the center was offline again. It […]

read more
How Could My Office 365 Be Vulnerable To ‘ZeroFont’ Phishing?

How Could My Office 365 Be Vulnerable To ‘ZeroFont’ Phishing?

What is ‘ZeroFont’ Phishing? ‘Phishing’ is where hackers attempt to get a user to willingly provide personal information, generally through posing to be someone else. It is one of the more threatening forms of hacking, as it is among the most difficult to protect against traditional security measures. Hackers continue to find new ways to […]

read more
CIPA Compliance – What Does It Mean?

CIPA Compliance – What Does It Mean?

Schools and libraries applying for E-rate technology funding discounts must be CIPA Compliant. CIPA stands for the Children’s Internet Protection Act and mandates that if an institution is receiving a discount for network and network-adjacent services, then it must develop a protocol for use of these services by minors. Further, CIPA stipulates that the public […]

read more
Migrating Your Healthcare IT To The Cloud: What’s It Gonna Cost You?

Migrating Your Healthcare IT To The Cloud: What’s It Gonna Cost You?

You may have an EHR system, decision support systems, purchasing, payroll, laboratory, pharmacy, personnel, finance, planning, and a myriad of other systems running on hardware that’s getting very long in the tooth. Many PCs are still running some older version of Windows. These issues can be a constant source of security headaches for the IT […]

read more
What’s So Important About My Out-of-Office Message?

What’s So Important About My Out-of-Office Message?

Vacation and time away from work is a necessity in order to be able to unplug and recharge. As research often tells us, disconnecting from work, talk around the water cooler, office politics, and even checking email can ultimately help us lead a more productive life. Too often we feel the tension of knowing we […]

read more
The Basics of Effectively Scheduling Meetings with Microsoft Teams

The Basics of Effectively Scheduling Meetings with Microsoft Teams

Microsoft Teams is a great way to schedule meetings, especially if the participants don’t all work in the same geographic area. It seamlessly integrates scheduling, invitations, updates, and access to virtual meetings. This might sound a bit complicated, but once you know the basics of scheduling in Microsoft Teams you’ll find it to be, not […]

read more
7 Great Benefits of Using Computer Tablets in Schools

7 Great Benefits of Using Computer Tablets in Schools

Tablets aren’t just digital babysitters for young kids or fancy versions of ereaders. They offer real value as educational tools. Their versatility, portability, and ease-of-use make them an excellent conduit for learning. Below are seven benefits of using tablets in the classroom. Seven Solid Benefits of Tablets in the Classroom 1. Portability Lightweight, easy to […]

read more
Happy Labor Day

Happy Labor Day

Happy Labor Day (Labour Day – International Workers Day –  May Day)! You’ve worked hard all summer. This Labor Day before going back to work and back to school, take some time to relax and enjoy one more backyard barbeque, one more trip to the beach, one more night sleeping under the stars, one more […]

read more
Education: Digital Literacy and Access Are No Longer Optional

Education: Digital Literacy and Access Are No Longer Optional

The debate about whether or not tech should be in schools has largely been put aside, technophobes and Waldorf School Curricula notwithstanding. In its place, education stakeholders must sort out the edtech baggage of privacy concerns, equity & accessibility, protecting children from harmful materials and misuse of technology, and how best to develop and implement […]

read more
Is Human Error the Leading Cause of Data Breaches in the U.S.?

Is Human Error the Leading Cause of Data Breaches in the U.S.?

New Study Shows That the Global Cost of a Data Breach Is Up in 2018 The Ponemon Institute recently released its annual Cost of Data Breach Independent Study that was sponsored by IBM Security. This study included two new factors that impact data-breach costs: Artificial Intelligence (AI) and the all-encompassing use of Internet of Things […]

read more
What Can Companies Do To Prevent Privacy Violations?

What Can Companies Do To Prevent Privacy Violations?

Whether it’s physical, virtual, or in the cloud, discovering and blocking sophisticated threats in the network is at the forefront of every company’s mind. However, businesses are finding that more and more data violations are taking place when network security centers on the edge of the network are not giving equal protection to the network […]

read more

Search Our Tech Insights