Blog

3 Disaster recovery myths, debunked

With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to some DR myths that can safely be disregarded. Here are three of those myths, and the sooner you stop believing them, the better. Myth 1: Tape backups are the best DR solution […]

Your password may not be secure — update it now

The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letter, numbers, and symbols. However, the NIST recently reversed its stance on good passwords. Here’s why and what they are now recommending. The problem The issue isn’t that the NIST advised people to create […]

4 Important details about HIPAA compliance

Getting your practice up to code when it comes to Health Insurance Portability and Accountability Act (HIPAA) regulations can seem challenging upon first glance, but knowing where your IT efforts must be focused is the first step. In this article, we’ll zero in on four of the most critical items you must look into to […]

Outdated firmware: An overlooked threat

If your company is still using computers with outdated firmware, then you have a higher chance of experiencing a data breach. This is because failing to update your firmware exposes your business to major security risks. What is firmware? Firmware is a basic type of software that is embedded into every piece of hardware. It […]