Not that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks. Let’s take a closer […]
5 tips for securing your VoIP services
OpenNotes portal initiative gaining steam
A recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes. Since that initial study, the number of healthcare […]
Image uploader security flaw discovered
Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content. […]
4 different types of hackers
Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four […]
Ransomware alert for healthcare practices
Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic […]
New Office 365 feature for more secure email
Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this. Here’s an inside […]
Should you monitor your employees online?
To monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it […]
Office 365 migration security musts
More and more small and medium-sized businesses are making the switch from on-premises SharePoint systems to cloud-hosted Office 365. If you’re one of them, it’s vital to ensure that you put in place adequate protection to counter the security challenges that come with the migration. While many businesses contemplating switching find themselves concerned about the […]
Common cloud computing misunderstandings
Setting up an IT infrastructure for a small business can be an intimidating and costly venture. Fortunately, cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few ways some […]
IT security concerns of the finance sector
The time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas. To optimize safety, […]