No Name, Just A Number: Fixing & Personalizing Your Voicemail

How to fix (or set up) the voicemail on your iPhone. When it comes to making phone calls, nothing can leave one more in the dark than leaving a message on a voice mailbox that hasn’t been set up yet. However, if you happen to be in the dark in regards to setting up your voicemail, we’re going

Read Full Article

Twin Threats: HIPAA Audits and Ransomware

With hackers hovering around to steal medical patients' personal data and the likelihood of a HIPAA audit, these two factors can create the perfect storm for medical practices. The Office of Civil Rights (OCR) in the Department of Health and Human Services (HHS) is responsible for reviewing medical

Read Full Article

Facebook Secret Messages Self-Destruct With New Encrypted Technology

If you're looking for more security in your Facebook messenger conversations, you'll be happy to know that you may soon have more options right in the app itself—meaning you no longer have to switch to a security-oriented service like Telegram to conduct a private, encrypted conversation. Facebook

Read Full Article

Is a Ransomware Attack a HIPAA Violation?

It's the call from your IT manager that you never want to get: "We've had a ransomware attack, and it has encrypted all of our data. We can't access any of our information. It's all there, but we can't use it." "What are our options?" "We can restore from our backup, or we can pay the rans

Read Full Article

How One Mobile Phone Theft Resulted in a $650,000 Fine

The theft of an iPhone belonging to an employee of the Catholic Health Care Services (CHCS) of the Archdiocese of Philadelphia sparked a hot-button breach of protected information case that appears to have been resolved. As of July 7th, 2016, a settlement was reached between the Office for Civil Rig

Read Full Article

Top 7 Uses of Cloud Computing for Businesses

Cloud computing has become one of the newer buzzwords in business circles for small and medium-sized businesses. While not all small businesses have started using cloud computing, many find the cloud offers them additional services or storage space for their projects or files. Most companies are acc

Read Full Article

Malware Evolution: How Cerber Mutates to Avoid Detection

Cerber is a clever piece of technology. If you’re not familiar with the ransomware bug known as Cerber, it’s almost assuredly because neither you nor anyone you know has come into contact with it. Among the many different ransomware variants out in the wild, Cerber makes itself known in a very v

Read Full Article

Do Not Perform Email Migrations In-House

Outsouring will always be cheaper, faster and more efficient than you initially think, because as soon as you relinquish control to a vetted professional with more experience than you, things just get done more quickly. Email migration is a technically intensive process with plenty of repetitive wor

Read Full Article

How Your Employees Are a Threat to Business Security

As a small business owner, you've likely invested a significant amount of money and time into ensuring your business systems are secure. You've hired an effective managed IT team. You have as much cyber security in place as you can. You believe you're safe. However, your employees, sitting at their

Read Full Article

Is Your Healthcare Biz Being Audited?

Recent Onslaught of HIPAA Audits Include Business Associates and Leave Organizations Scrambling To Comply   When the Department of Health and Human Services (HHS) started cranking out that second round of HIPAA audit emails back in April, many health organizations realized for the first time tha

Read Full Article
IT support buffalo