Blog / Reports / Resources
What Can A Business Impact Analysis Do For Your Organization?
When a company functions at a high level, productivity and profitability appear seamless. But it’s also incumbent on decision-makers to understand the potential ramifications for business disruption. Without a working knowledge of how a breakdown in one area of an...
You Will Love These Top Apps for Educators
Today’s digital-savvy educators do more than simply lecture their class. They’re creating interactive quizzes and gathering real-time feedback via an app. They’re assigning projects to students, while students complete and submit their homework...
Cyber Security Advice: 6 Crucial Strategies
Cyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophisticated, targeted hacks, and others occur thanks to enterprising hackers taking advantage of security holes in...
What Changes Can We Expect From New Apple Software?
The 2019 Apple Worldwide Developers Conference in California has come to a close, and we’ve learned everything there is to know about the new software updates to expect from one of our favorite technology companies. Say goodbye to the iTunes app. If you’ve ever been...
City Government In Florida Must Pay $600K To Hackers
The small city of Riviera Beach, Florida, north of West Palm Beach is the latest government to be crippled by a ransomware attack. Their data was encrypted by hackers so they couldn’t access it. This has paralyzed the City’s computer systems. In an attempt to retrieve...
Tech Competence and Attorneys: New Changes You Need To Know About
If you are a lawyer or if you are hiring a lawyer, technology competence, often shortened to tech competence, is a term that you should be aware of. Recently, changes have been recommended in regards to tech competence and attorneys. Here is everything that you need...
The #1 Security Threat to Local Small Businesses
There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff members will jump ship for a better offer . . . but are you considering the significant risk that is associated with a...
Spoofing & Hacking: What’s The Difference?
Most people know not to open email attachments from senders that they do not know. Unfortunately, it is not just attachments from strangers that you have to be on the lookout for. It happens quite often that people will get emails that seem to be from known senders...
What Is Technology Competence
According to the LawSites blog, as of this writing, there are 36 states that have adopted the ABA’s updated Model Rule 1.1, which states that lawyers should maintain technology competence. The rule is purposefully vague to allow for the constant changes in technology...
Healthcare Guide to the DTA’s New Secure Cloud Strategy
Creating a secure, usable network of systems is top-of-mind for Australia’s Digital Transformation Agency (DTA). The recent growth of security challenges for organisations of all sizes has caused this government agency to closely examine how businesses are...
How to Make Calls with Amazon Alexa
Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of...
EHR Vendor Consolidation and Its Effects on Ambulatory Health Services
An uptick of vendor consolidation in the Ambulatory electronic health records industry has been a cause for concern for many small and medium practices recently. The main cause for concern lies in the preparation and costs associated with integrating their patient...
Cutting These Two Corners Could Lead to Business Disaster
Cost-cutting measures are not unusual for organizations as they traverse the standard lifecycle of products and services. What you decide to cut during the lean times can have just as much impact as to where investments go when your business is flush with cash. Some...
Google’s New Chrome Extension Gives Your Passwords a Checkup
In early 2019, white-hat security expert Troy Hunt and other researchers shared a massive database of breached passwords and usernames. The stolen data constitutes 25 billion records and 845 gigabytes of stolen data. While many of the collected records are...
Your Windows 7 Checklist
When you’re working hard to grow your business, you can get caught up in things that take your attention away from your technology. Before you know it, your IT system isn’t up to speed because you failed to update an operating system. We don’t want this to...
The CEO/CIO Relationship: A Vital Tie
In its look at the top 10 strategic technology trends for 2019, Gartner notes that businesses need to address an astounding number of technologies that will change the way companies run, their business models and their internal processes. From the rise of artificial...
How CEOs Can Use Their Blog To Communicate With Staff & Customers
As a CEO, you have tremendous influence over your company’s brand, messaging, values and strategies. You also have a personal brand that increasingly today needs its own shaping, nurturing and feeding. One powerful way to improve your personal brand and your...
Important Warning From The FBI
Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that...
What’s New With Apple?
Building a worldwide brand takes an army — that’s an army of independent developers if you’re Apple. The latest WWDC (Worldwide Developers Conference) always includes a few unexpected tidbits that make the tech world salivate, and this year is no...
Burlington, ON Phishing Scam Steals More Than Half A Million Dollars
The City of Burlington is out $503,000 because a staff member fell for a phishing scam. After receiving an email request to change banking information, the staff member was tricked into making a transaction to a false bank account. The email requested that the...
How IoT and Cloud Adoption is Changing Healthcare
The introduction of electronic health records (EHR) has caused a transformational change in medicine, but there is an even larger movement in the future that caregivers across the world are glimpsing — robots and the Internet of Things (IoT). It took more than...
Does The CMO Have A Role In Technology Decisions?
The role of CMOs has been changing rapidly in recent years with the introduction of numerous technologies. Social media platforms, CRM software and diverse multimedia channels all offer businesses remarkably effective tools for creating and maintaining a brand while...
These 4 Issues are Paralyzing CFOs from Moving to the Cloud
CFOs have long been challenged by the value proposition of capital technology investments, often requiring in-depth analysis and reviews before making the plunge. While the lower monthly costs of cloud-based computing may overcome this inertia in some instances, CFOs...
Which Application Rules Supreme: Outlook or GMail
Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and...
Happy Father’s Day!
June 16th is Father’s Day, a great reason to spend a little quality time with the family doing a few of Dad’s favorite things. Whatever your plans are, take some time this Sunday to let Dad know how much you appreciate everything he’s done for you over the...
Outsourcing IT Makes Sense for Small Businesses: 7 Reasons
If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for most small businesses to outsource their IT needs to a managed service provider (MSP). Here are 7 reasons. 1. Focus on What...
How Much Should A Small Business Spend On Information Technology?
For small businesses, information technology spending is always a balancing act. On the one hand, you need to keep to your budget to maintain financial stability and weather the unexpected. On the other hand, you are well aware of the constant tech advances happening...
How to Install Microsoft Launcher on Android Devices
If you haven’t looked lately at what Microsoft’s mobile offerings, it’s time to look again. Microsoft’s first forays into the iOS and Android mobile spaces (circa 2010) were underwhelming to say the least, but in recent years the company has turned things around in an...
How to Create a Strong Password You’ll Remember
Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and reusing passwords across multiple sites can be dangerous. If one account is compromised in a data breach (and this is...
What Technology Should Small Law Firms Choose
It is questionable whether there is any industry today that has not been forced to adopt new technology to remain competitive. But for small law firms, the need to utilize technology appropriately is necessary for more than just competitiveness—it is actually being...
How to Find the Right IT Services Company
If your business has made the decision to contract with an IT services company for IT support, you’ve made the right choice. However, you’re not done yet. You still need to choose the IT services company that’s best for your business. In most markets, you’ll have...
Critical Update From The NSA
The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by...
4 Strategies For Super Strong Passwords
Some days it seems like everything in our lives requires a password: banks, apps, debit and credit cards, online banking, business applications, healthcare accounts . . . the list is literally endless. Technology professionals recommend that you use a different and...
What Makes a Chromebook Different From a Conventional Laptop?
Chromebooks are a relatively new type of laptop, first hitting the market in 2011. If you’re in the market for a new laptop or are in charge of purchasing laptops for a group, Chromebooks may have caught your eye due to their low prices. Before you jump onto the...
Was Your Photo and License Plate Number Breached?
CBD Reports 100,000 Photo and License Plate Breach The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where...
3 Reasons to Regularly Test Business Systems
Protecting your business requires more time, effort and energy from your technology team than ever before. Business systems are increasingly complex, requiring staff members to continually learn and adapt to changing conditions and new threats as they emerge....
What The CMO Needs To Know About Marketing Technology
Familiarity with marketing technologies is a must for today’s CMO. However, the range of tech knowledge across CMOs varies widely. Even if every CMO can benefit from some technical familiarity, the reality is that some CMOs know very little about technology while...
Size Doesn’t Matter: 7 Ways Small Businesses Should Think Big
You may be a small business, but there’s no reason you have to think or act small. Today’s technology innovations offer small businesses all sorts of powerful tools that just a decade ago weren’t available or were only affordable to large firms. Technology can help...
How Much Should A Company Invest In Information Technology?
The rapid increase in technology use in businesses has affected every industry. Across all businesses, the need to keep up with the competition means paying attention to what technologies are available and incorporating the right tech tools as they become viable....
3 Security Tips For Australian Organisations
More than ever, cybercrime is a reality all businesses in Australia must face. No matter your industry, company size, or level of technology use, it’s up to you to ensure the security of your data and the strength of your security. Together with the Cyber Security...