Blog / Reports / Resources
How To Protect Your Child From Identity Theft
Depending on the age(s) of your child (ren), your response to this topic may be, “She’s too young – she doesn’t even have an identity yet.” Alas, not so. In our electronic society, kids exist in databases even before they’re born. And they are an attractive target for...
Canada Now Has It’s Own Version Of Required Breach Disclosure
As data breaches echo around the world, Canada now has its own law, paralleling Europe’s General Data Protection Regulation (GDPR) and the USA’s Health Insurance Privacy and Portability Act (HIPAA). These regulations govern disclosure of data breaches to people whose...
Should You Ban Laptops From Meetings?
Efficiency in the workplace is paramount to success. This concept is widely held across office environments everywhere. But while technology plays an increasingly valuable role in the way the world does business, that’s not to say it doesn’t come with its own unique...
Do You Have Good Computer Habits?
We know it’s important to have good habits in many parts of our lives, from our work to our daily hygiene. However, quite a few of us forget that we need to have good computer habits, too. Developing wise practices in connection with our computers and smartphones can...
Google My Business Reviews: The 3 Critical Things You Need to Know
Google My Business is an excellent tool for establishing and tracking your company’s online presence. Included in Google My Business are tools to help you manage customer reviews. However, in order to get the most out of the review tools, you need to know (1) how to...
Section 179 IRS Tax Deduction: What Does It Mean For Your Business?
Today’s business owners carry many burdens, but tax time can cause a headache like no other. Filing taxes is often a cause of stress for small business owners and those just starting their empires, and with an ever-changing set of rules and regulations to follow, it...
Why Should Law Firms Consider Outsourcing Their IT Services?
The phrase, “Technology…you either love it or hate it” is a concept that no longer works in the modern world. In fact, it really is not even relevant. Technology has worked its way into nearly every business. The legal sector is no different. Of course, legal...
10 Easy Steps Implementing Your Successful SOP with SharePoint
Standard Operating Procedures (SOPs) are necessary for every industry. The written procedures keep a company on track. The importance of having them is to guarantee the organization remains compliant with all federally mandated regulations, legislation, and...
What are the Primary Benefits for IT Outsourcing for Law Offices?
Although many long for the simplicity of yesterday, advancements in technology are quickly taking over every industry. This includes the legal field. Technology provides an ability to streamline resources and improve efficiency. Of course, people are required to...
What Is HIPAA, And Why Should I Worry About It?
The Health Insurance Portability and Accountability Act (HIPAA) is a Federal statute, and associated regulations, that, among other things, control what healthcare providers and other “covered entities” do with “protected health information” (PHI). The HIPAA...
8 Foolish IT Security Mistakes Never Get Caught Doing
Everyone makes foolish mistakes. You’ve done, I’ve done it, and it’s all part of being human. But if that mistake affected your IT security, consider the ramifications it could have on your organization for being careless. For instance, a computer hacked or leak of...
PSA Alert! Sleeping While Phone Charges
Read the following alert before charging your phone tonight and from this day forward. According to the Newton, New Hampshire, fire department’s PSA message posted on social media; it seems as though charging a phone in bed poses a serious health risk and lethal...
What IT-Aspects Are Important When Relocating Your Law Office?
Perhaps the space is not large enough for your expanding partnership. Maybe, it’s antiquated and no longer feels appropriate. Whatever reason an office chooses to move to a new building, relocating is a large undertaking. Unfortunately, in many offices, the IT-related...
US Weapon’s Systems: Weak to Cyberattacks?
A recent report has revealed that there are many US weapons systems that are susceptible to hackers. This news is disturbing on many levels, including the attitude exhibited by Department of Defense officials. What does the report reveal, and how serious is the...
Is Your Organization Ready to Comply with PIPEDA?
On November 1, updates to the Personal Information Protection and Electronic Documents Act (PIPEDA) will be in effect. Included in these updates are rules involving mandatory notification of Office of the Privacy Commissioner of Canada (and affected individuals) if...
Happy Spreadsheet Day!!!
What Are You Doing for Spreadsheet Day? Spreadsheets: some people love them, some people hate them, and some people are a little afraid of them. No matter which category you may currently fall into, you probably know that spreadsheets are vital to the inner workings...
Infections That Can Survive The Most Extreme Cleaning
Technology has unlocked a world of potential for businesses everywhere. But with these advances comes a new set of problems, like malware. While it’s common knowledge that computers are susceptible to viruses, today’s breed of hackers are more creative than ever....
Should Manufacturing Firms Invest In Microsoft Technologies?
From the invention of the assembly line to cloud computing for the Discrete, Repetitive, and Process Manufacturing industries, updating to the latest technology is never in question. What does get closer scrutiny, is deciding to invest in Microsoft technologies....
Did Microsoft Just Win the Internet?
Good news for people wanting a new Microsoft Surface Pro 6 2-in-1. It is all grown up. No longer just for schools, video-games, and weekend play, the new Surface Pro is ready for prime-time. It has a sleek new look and a thicker, black non-slip coating on the...
October 16th Is Steve Jobs Day
Steve Jobs Day Sheds Light On Apple Founder’s Legacy In today’s modern world, the name “Apple” has become synonymous with technology. It’s no wonder then that Steve Jobs, the company’s late co-founder, has become such an influential figure in American history. His...
Does Power BI Make Sense For Your Business?
If you could draw insights from your data within five minutes flat, would that get your attention? Microsoft’s Power BI is an online service, with a connection to other Software-as-a-Service (SaaS) applications, that lets you analyze, visualize and transform data...
What Are The New Changes in Microsoft Outlook?
New Calendar, Mail, and mobile Outlook features help you get things done, was the title of the April 30th, 2018 blog from Microsoft’s Outlook team, about the newest features. Since then, Outlook has received more modern additions, from mobile management to enterprise...
Cyber Express Interviewed: Protecting Your Kids From Identity Theft
If you have a child, and they have a mobile phone, their chances of identity theft are at a remarkably higher risk of being stolen, than most adults. But thanks to the new United States federal law, the Economic Growth, Regulatory Relief, and Consumer Protection Act,...
Apple iOS 12: Top Features You Need to Know About
Apple iOS 12 has so many different new features available it’s almost overwhelming. From better password management options to the introduction of the Memoji, users will appreciate some of these more than others. This article will highlight some of the most...
How Is Using Artificial Intelligence Transforming the Legal Profession?
Recently considered outside the realm of possibility, artificial intelligence (AI) has become more commonplace in modern businesses. As technology evolves, applications and tools with these capabilities will continue to transform various industries, including the...
Another Uber Data Breach – It’s Never The Crime, It’s The Cover-up
In 2016, Uber suffered a data breach that exposed the personal information (names, email addresses, and phone numbers) of 57 million users. In the same breach, some 600,000 driver’s license numbers of Uber drivers were exposed. So, What Was The Response? The Federal...
6 Reasons Why Companies Are Moving Away from BYOD
Last year, Markets and Markets Research released a report that revealed that 50% of companies were considering the use of BYOD (bring your own device) policies. IT departments were tasked with developing a policy that allowed employees to use their personal devices...
Digital Transformation: Is Your Business Ready?
“Digital transformation” is a term likely circulating around IT departments everywhere. The vast majority of businesses today, no matter how big or small, will likely need to further digitalize their operations in order to keep up with competitive markets and an...
How To Ensure A Secure Home Network
Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense,...
Implementing Data Security For Your Small Business
Today’s small business owners are tasked with managing operations, employees and a wide range of things pertaining to the modern day business. It’s no surprise, then, that amid the hustle and bustle, some areas of importance are thrown to the wayside. Cybersecurity is...
Wi-Fi On Planes – Who’s The Best?
If you are old enough, you may remember when making phone calls from an airplane was an expensive luxury, with sound quality so bad that conversations at times were impossible. Times have changed. Calls from planes are usually clear and carried over satellite...
October’s Featured Training: The ABCs Of Cyber Security
October Is Cyber Security Awareness Month Tune In At Any Time To Watch Our 15 Minute On-Demand Training Cyber Criminals Have A 6th Month Head Start. Is Your Business Protected? Find Out. Tune Into Our October Free Online Training By Clicking Here. Every 39 seconds, a...
Google Shutting Down Google+
Google+ Social Media App Will Soon Move Off Into The Sunset Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to...
What You Need to Know About Secure Messaging Apps
You probably use messaging for communications every day, but how secure are your messages? Messaging apps are as susceptible to hackers as any other type of electronic communication, and if you are concerned about privacy then it’s time to learn the basics about...
Happy Thanksgiving Everyone!
Happy Thanksgiving From Our Team To Yours! Why Not Show Your Thanks By Helping Another Business Use Technology To Succeed? As the days get shorter, and the nights get cozier, Canadians across the nation turn our minds to gratitude. It’s a season where we take a...
Scalable Wi-Fi Is Best Practice For Schools
Everyone has Wi-Fi. We all expect to see it wherever we go, and most of us have more than one Wi-Fi-enabled device. Grocery stores, fast food restaurants – even your mechanic has Wi-Fi. But does that mean you REALLY need it in your school? Isn’t it less secure...
What’s Inside Health IT?
Health information technology is more talked about than really understood. Part of the reason for this is that providers and their staffs usually interact with a restricted subset of health IT – the Electronic Health Record (EHR), the radiology imaging system, the...
Facebook Data Breach
Are you aware of a potentially serious data breach involving Facebook? According to many top news outlets, 50 million users accounts may have been impacted and Facebook now faces potential huge fines in the EU. Read more...
Playing in the Digital Highway: Improperly Secured Data Puts Students At Risk
When you think of cybersecurity, protecting credit card numbers or government files might come to mind, but your students’ PII (Personally Identifying Information) is a target for hackers, too. Young people make great targets because they’re a clean slate. They’re not...
Steps To Avoid HIPAA Compliance Violations And Data Breaches
Federal regulations are usually complex and can have unintended consequences. If you are a lawyer, they are a goldmine both for prosecutors and consultants for clients. When it comes to the Health Insurance Portability and Accountability Act (HIPAA), there are,...