Blog

HIPAA Compliance Basics for Healthcare Providers

HIPAA Compliance Basics

Whether you’re a medical practice, a dentist, or a mental health care provider, compliance with HIPAA (Health Insurance Portability and Accountability Act) data security guidelines is likely a requirement that you need to take seriously.  Leaked PHI (Personal Health Information) through a security breach or mismanagement of records can cause serious sanctions and hefty fines.  […]

A World With No Passwords

no passwords

Microsoft reports that “81% of data breaches are the result of weak, default, or stolen passwords.”  They’re recommending that we get rid of them.  There is a strong argument to do so, and some slick alternative authentication methods available and in the works. Why Should We Get Rid Of Them? There are a lot of […]

Patch Your Apple Products Now!

In the last couple of days, it has come to light that Apple products including macOS, iOS, iPadOS, and watchOS have been hit with 4 different zero-day drive by attacks.  This puts users at significant risk, and it’s recommended that they update immediate with the patches that Apple has made available. Nature of the Attacks […]

Cyberthreats in 2021: The Usual Suspects

Through 2020 and the pandemic there has been 4 times as many cases of cybercrime reported to the FBI.  Losses from cybercrime are also at an all-time high, surpassing $1 Trillion dollars.  Remote work and evolving threat surfaces were some leading areas of concern as IT departments try to make security solutions to the new […]

The Business Benefits of IT Consulting

IT Consulting

There seems to be a fair bit of confusion from business owners around the term IT Consulting.  They may be justified, because a lot of folks that work in the space do different things, and they all call their jobs IT Consulting.  I wanted to shed some light on what it is and some of […]

The Chip Shortage – What It Means for Your Business

The Chip Shortage

There is a global shortage of computer chips right now.  It has been caused by a near perfect storm of circumstances for chip manufacturers worldwide.  Since those chips are in almost everything nowadays, from cell phones, to tablets, to laptops, and even appliances, it means you may have some significant delays on getting tech.  You […]

What to Look for In an IT Helpdesk Solution

There are a lot of things to consider when you look for a helpdesk solution.  Depth, response times, structure, escalation paths, service level agreements, first call resolution, and more.  Here are a few keys to selecting an awesome IT helpdesk solution that will help you make the right choice. Depth One thing that you should […]

How to Spot a Phishing Email and What to Do in Case of an Attack

Phishing is one of the oldest tricks in the scammer’s book and it’s growing in popularity each year. According to Phishing Statistics published by Tessian, 75% of organizations faced some sort of phishing attack last year. A Verizon report says that 96% of phishing attacks are conducted through email. With most companies rushing towards a […]

Utah’s Sandbox

Utah's Sandbox

In August, the Utah Supreme Court voted unanimously to create a provisional regulatory body.  The name of the new organization is the Office of Legal Services Innovation.  Their job is to oversee a 2-year experiment that gives law firms the freedom to rethink how they are delivering legal services.  The goal of Utah’s sandbox is […]