Blog / Reports / Resources

DNS Infrastructure Tampering

DNS Infrastructure Tampering

On January 22, 2019, The U.S. Department of Homeland Security, DHS, Cybersecurity and Infrastructure Security Agency, CISA, issued an emergency directive. This emergency directive was put into place to address ongoing problems and issues associated with global Domain...

read more
How To Add A Contact In Microsoft Outlook

How To Add A Contact In Microsoft Outlook

Adding a new name and email address to your list of Microsoft Outlook contacts is pretty simple. There are two different ways you can do it depending on whether you want to add the contact information from an email or just want to create a brand new contact. How to...

read more
Important Update: North Carolina Data Breach Laws

Important Update: North Carolina Data Breach Laws

What are the Proposed Changes to NC’s Data Breach Laws? North Carolina’s lawmakers will consider legislation first introduced by the Attorney General Josh Stein and Representative Jason Saine. The proposed law would redefine the term “data...

read more
Urgent Tech Tip: Disable Facetime On Your iPhone

Urgent Tech Tip: Disable Facetime On Your iPhone

A major FaceTime bug discovered recently has left Apple device users skittish about yet another privacy concern and forced the tech giant to scramble for a fix for the issue. For users of Macs or iPhones, understanding the FaceTime flaw and knowing how to disable the...

read more
Microsoft Office 365 Business vs. Microsoft 365

Microsoft Office 365 Business vs. Microsoft 365

Two subscription-based software programs available from Microsoft are Office 365 and Microsoft 365, both developed for small to medium-sized businesses and even larger companies. There are some similarities and differences between the two to help you decide which one...

read more
11 Top Questions HIPAA Compliance Officers Need To Know

11 Top Questions HIPAA Compliance Officers Need To Know

HIPAA, an acronym of the Health Insurance Portability and Accountability Act was signed into law by President Bill Clinton back in 1996. Initially, HIPAA has meant to reform the healthcare industry for two reasons. One was to ensure employees that were between jobs...

read more
How To Create Org-Wide Groups in Microsoft Teams

How To Create Org-Wide Groups in Microsoft Teams

As technology improves, so does the way professionals use their programming to increase productivity and efficiency. At one time, emails were the preferred communication between colleagues simply because it was the new form of a written message. Over time, people came...

read more
2018 Was a Record Year for HIPAA Penalties

2018 Was a Record Year for HIPAA Penalties

2018 turned out to be a year of record fines for HIPAA violations. Over $25 million in fines, with the mean fine being just over $2.5 million. Could your medical entity bear that financial burden? Would it suffer irreparable harm from the adverse publicity? And just...

read more

How To Restore Files With Microsoft OneDrive

  Accidentally deleting a file or folder was once something that could ruin your entire day, week, or month even — maybe even your career. All that work put into it. Countless hours put into it. And then: gone. Fortunately for those of you using Microsoft...

read more
Inside The United States Of Cybersecurity

Inside The United States Of Cybersecurity

In March 2018, Alabama and South Dakota passed laws mandating data breach notification for its residents. The passage meant all 50 states, the District of Columbia and several U.S. territories now have legal frameworks that require businesses and other entities to...

read more
Windows 7: Under One Year Until Support Ends

Windows 7: Under One Year Until Support Ends

Use Windows 7? Do you love your Windows 7? Will your need or desire to continue to use Windows 7 surpass this year? If so, you should be aware that in just under one year — January 14, 2020, specifically — Windows 7 Extended Support ends for most users. As...

read more
3 Easy Steps To Secure Word Documents With A Password

3 Easy Steps To Secure Word Documents With A Password

Do you regularly send sensitive documents via email? If so, you are probably careful to double check that you have included the right recipient; you might even go one step further by adding a read receipt to the email. The next step that you could take when sending...

read more
What’s New In Microsoft 365 To Kick Off 2019

What’s New In Microsoft 365 To Kick Off 2019

Microsoft 365 and its suite of office productivity tools, has some new features for 2019. Microsoft 365, formerly Office 365, is the collection of business software for publishing, communication, mail, presentation, and accounting. The suite of programs including...

read more
Happy MacIntosh Computer Day

Happy MacIntosh Computer Day

January 24th is Macintosh Computer Day. On this day we celebrate the innovation, skill and can-do spirit that shaped the future of computing. We recognize the history of Apple. Back in 1984, its creators with Steve Jobs at the helm introduced the first Macintosh...

read more
What Are the 3 Big Changes at Microsoft in 2019?

What Are the 3 Big Changes at Microsoft in 2019?

Ever since Microsoft incorporated as a company in April 1975, it has led the way in releasing innovative computing products for home and business users. From the release of its first operating system to the computer mouse to Microsoft Office, the company has always...

read more
14 Amazing Benefits To Outsourcing Your Help Desk

14 Amazing Benefits To Outsourcing Your Help Desk

With organizations working increasingly advanced technology into most aspects of their daily operation, it only follows that employees and customers may occasionally need help using those technologies and fixing problems they encounter. Help desks have emerged as the...

read more
Happy Martin Luther King Jr. Day

Happy Martin Luther King Jr. Day

Remembered mostly for his “I Have a Dream” speech, Martin Luther King Jr. was a man who fought to end segregation in this country. On this day, we remember someone who devoted their life to achieving racial equality. Martin Luther King Jr. was born in Georgia in 1929....

read more
FBI Warms Businesses Of Cyber Attack From China

FBI Warms Businesses Of Cyber Attack From China

Who Has Been Impacted by Chinese Cyber Attacks? At the beginning of the year, the FBI warned businesses to protect themselves from cyber attacks by foreign entities, saying activity has spiked in the past 18 months. Hewlett Packard and IBM are among the businesses...

read more
How Can I Tell If My Business Needs Managed IT Services?

How Can I Tell If My Business Needs Managed IT Services?

Most of us, when asked if we would prefer to pay for something we could theoretically do ourselves, will opt to take care of the task personally – even if it’s not our strong suit, or indeed, if we lack all experience entirely. This is often the case with managed IT...

read more
How To Open A Shared Mailbox Using Microsoft Outlook 2016

How To Open A Shared Mailbox Using Microsoft Outlook 2016

A shared mailbox in Microsoft Outlook will prove invaluable if your team is collaborating on a project, as they can exchange messages from a central platform. A communal email center is also an asset if your employees are responsible for responding to customer...

read more
How Does Outsourcing IT Help Fuel Business Growth?

How Does Outsourcing IT Help Fuel Business Growth?

You already know what IT stands for: information technology. What you might not know is that most companies have a pretty poor grasp of how best to put IT to work for them. Why? For the simple reason, that too few businesses take the time to consider the best approach...

read more
The Hidden Costs of Your Next Data Breach

The Hidden Costs of Your Next Data Breach

Ask any small or medium-sized business owner and they’ll tell you the same thing: They’re terrified of a data breach. Sure, their fears might not exist on the same plane as, say, a Target or a Wells Fargo, but that doesn’t mean they’re not real and quantifiable. The...

read more
How Can Managed Services Benefit Local Businesses?

How Can Managed Services Benefit Local Businesses?

Using Managed Services is really about smartly growing your local business, especially if that business relies on technology to any degree. A Managed Service Provider (MSP) is a third-party contractor that partners with your company to do exactly what its name...

read more

How To Add A Column From an Example In Microsoft Excel

Microsoft Excel has been around for ages. However, did you know that there are a whole host of functionality features to simplify your workflow and help you save time? One of the most commonly used tools is the Add Column from Example option. Here’s what you need to...

read more
The 2019 Guide To Securing Microsoft Office 365

The 2019 Guide To Securing Microsoft Office 365

The importance of fully securing Microsoft Office 365 cannot be overstated. Recent statistics show that a hacker attack occurs every 39 seconds. Government agencies and retail, technology and healthcare industries are among the most popular targets, but the truth is...

read more
What Should Be In Your 2019 Technology Strategic Plan

What Should Be In Your 2019 Technology Strategic Plan

Making an Ultimate Technology Plan for the New Year Times are changing. Apparently, this is the case considering we’re about to head into 2019. How is your current technology holding up at your company? If you feel like there are certain things that you need to...

read more
8 Amazing Tips To Take Awesome Photos With Your iPhone

8 Amazing Tips To Take Awesome Photos With Your iPhone

Smartphone technology and the internet have made it possible for us to share ideas—and do business—with people all over the world. Learning to use the powerful tools we have at our fingertips more effectively is one of the most significant challenges of our time....

read more
Will Cybercriminals Shutter Your Business In 2019?

Will Cybercriminals Shutter Your Business In 2019?

If the frightening headlines about massive data breaches were not warning enough, upwards of 60 percent of all small and mid-sized businesses, reportedly shutter within six months of a systems hack. The leading causes of nefarious systems incursions are reportedly...

read more
Here’s How Cybercriminals Con Businesses In 2019

Here’s How Cybercriminals Con Businesses In 2019

Is someone out there pretending to represent your business to make money? Don’t laugh. It happens. Business identity theft is a growing concern for many companies across the US. According to a recent study by Dun & Bradstreet, business identity theft, also...

read more
2019 Best Practices For Keeping Your Password Secure

2019 Best Practices For Keeping Your Password Secure

Every account you have is protected by a password or a PIN of some kind. A PIN is a personal identification number that is unique to the account it is attached to. In some cases, you are allowed to choose your own PIN. For other accounts, you must use the PIN or...

read more

9 New Game-Changing Additions To Microsoft Office 365

Microsoft recently announced several new updates to Office 365. These updates and additions will help organizations who want to streamline efficiencies and remain compliant with new regulations across numerous industries. The nine key additions and updates to Office...

read more
Top 8 Cybersecurity Concerns For Local Businesses

Top 8 Cybersecurity Concerns For Local Businesses

As businesses add more layers of cybersecurity to their arsenals, cybercriminals are finding new ways to attack system, networks and devices. There is a constant stream of emerging threats that can mean trouble for companies of any size. Why Is Data Security a Major...

read more