Mobile payment systems have been making great strides in recent years, and are quickly becoming the norm for consumers looking to quickly settle bills for small amounts. While Google Wallet and Apple Pay may be leading the movement to disrupt the payments industry and make the most of NFC technologies, Samsung's own mobile payment solution is also beginning to make inroads. The latest news that Samsung Pay has added support for eight more credit and debit card issuers will take progress up a notch.
While HIPPA's implementation in relation to technology has been problematic to say the least, things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn't necessarily through negligence on your part, but rather simply a lack of understanding as to the requirements. We look at four facts your practice should know about HIPAA and your IT.
Posted on Monday November 16, 2015
You have finally decided your small or medium-sized business is ready to utilize Business Intelligence (BI) software. This is a big step for your company and one that must be approached with diligence. If you are not careful the cost of BI software, not to mention training, could far outweigh the actual benefits you end up receiving. However, with thoughtful BI planning, you are likely to see results you would have never thought possible.
Posted on Tuesday November 10, 2015 | security alerts
Revision Note: V1.0 (November 10, 2015): Advisory published.
Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security update to protect customers. The update prevents guests on a Hyper-V system from triggering a weakness in the CPU that could allow instructions from a Hyper-V guest to place its Hyper-V host's CPU into an unresponsive state, leading to a denial of service condition for the guest operating systems running on the affected host. Successful exploitation of the CPU weakness would require kernel-mode code execution privileges on the guest operating system.
Posted on Monday November 09, 2015
For many business owners who have dabbled in social media, they may think their efforts have been in vain and growing a large social media presence is impossible. They may go as far to believe that social media simply doesn't work, especially when you don't have an exciting brand like Nike or Google. The truth is you can succeed with social media, even if you have a boring brand. And here is one company that is doing just that.
Posted on Monday November 02, 2015
As it is only a matter of time before the first winter storms hit in many places, you might want to consider taking a look at your company's business continuity plan. Each year heavy snowfall and other weather-related incidents interrupt services and cost businesses money. One way to prevent this from happening is by communicating with clients and staff before a storm hits, in order to ensure everyone is prepared.