Bulletproof Office Helping You to Better Enable Your IT

By: Steve | October 23, 2015

Cloud-Computing

The cloud computing model has proven to be a great price performer, given its utility-based, “pay by the drink” economic approach.   You reduce operational costs overall and also continue to see savings with smooth pricing increases, only as you need increased capacity, and decreases, should less compute and storage be suddenly required.

 

Another key benefit is your ability to now focus your IT team on your strategic needs, since your cloud provider is now handling system upgrades, maintenance and support.

 

This economic model enables businesses of all sizes to enjoy the benefits of more current technology more often.   The typical hardware refresh rate for cloud providers is 3-4 years. You may well have some gear you are using right no...

By: Steve | October 09, 2015

Cloud-Data-Center

According to recent surveys, more than 70 percent of businesses are using “cloud computing” platforms in some fashion. Common uses are convenient and value-priced cloud storage like Dropbox and Box, cloud email solutions such as Gmail for Business or Office 365 and automated desktop backup solutions like Mozy and Carbonite. General business applications have also come into common use. Most notable are CRM systems (Salesforce and many others) and HR/Payroll/Accounting systems (QuickBooks, Workday, ADP).

Nervous about Security?

By: Steve | July 31, 2015

iOS-Ransomware

As you likely know by now, Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.  

Now there is a scam targeted at iPhone and iPad users that will appear via a pop up message as you are doing an internet search with Safari.

You will be interrupted by a message that tells you that your device has been locked because a third-party application has crashed your iOS operating system. 

When you call the toll free number provided, the scammer will ask you for your credit card information so they can charge you for removing the third party applicat...

By: Steve | May 18, 2015

HealthIT.gov

Everyone has a role to play in the privacy and security of electronic health information — it is truly a shared responsibility. The Office of the National Coordinator for Health Information Technology (ONC) provides resources to help you succeed in your privacy and security responsibilities. This Guide to Privacy and Security of Electronic Health Information (referred to as “Guide”) is an example of just such a tool.


The intent of the Guide is to help health care providers ― especially Health Insurance Portability and Accountability Act (HIPAA) Covered Entities (CEs) and Medicare Eligible Professionals (EPs) from smaller organizations ― better understand how to integrate federal health information privacy and security requirements into thei...