Dropbox scanning now available in Android

Posted on Tuesday May 02, 2017  |  pdf, dropbox paper, dropbox, doc scanner, android

In the past, “scanning documents” meant using a dedicated scanner to convert the physical document into a PDF or image file. Nowadays, however, you can simply scan documents on your phone. The camera feature has made it incredibly easy to capture an image of your document. But if you want to create a PDF with your smartphone, you're going to want to use Dropbox's doc scanning feature for Android.

 

What celebrities can teach us about HIPAA

Posted on Monday May 01, 2017  |  url filtering, phi, mdm, hipaa, healthcare, employee training, compliance

Two trends have been rising in popularity in tandem: HIPAA compliance audits and social media. Obviously both of these are far too important to be correlated directly, but they do intersect with each other. Social media tends to push people toward oversharing, and that's definitely something you don't want when hosting regulated patient data.

 

What is virtual “sandboxing”?

Posted on Friday April 28, 2017  |  virtualization, sandbox, malware, cybersecurity, containers

Virtualization comes with several benefits for small- and medium-sized businesses. One of the most important is cybersecurity, but even within that subset are several strategies for protecting your organization. One of such strategy is referred to as sandboxing, and it's worth learning about.

 

Five tips to prevent VoIP eavesdropping

Posted on Thursday April 27, 2017  |  voip, threat, sme, smb, prevention, eavesdropping, cybercrime, attacks

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it's not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had their eye on VoIP ever since it was introduced to the market. Here are five tips to combat VoIP eavesdropping:

 

Microsoft Word bug: What you need to know

Posted on Wednesday April 26, 2017  |  word, security training, security, phishing, office, microsoft, malware, dridex

Software developers and hackers are in a constant game of cat and mouse. When cybercriminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information. If you're an avid Microsoft Word user, here's what you need to know about the bug.

 

Best new features in Windows 10

Posted on Tuesday April 25, 2017  |  windows 10, operating system, microsoft, creators update

Creators Update contains the most significant upgrades to Microsoft's Windows 10. Some of the stand-out features include application enhancements, improved user experience, and a few productivity features that may seem too small to be noticed. These upgrades were recently rolled out, giving reason to personal and business users alike to get excited.

 

Page:   1...239240241242243244245246247...314

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016