Ransomware Attacks in Healthcare: Security Tips to Secure Your Organization’s Data
The outbreak of COVID-19 has put cyberattacks on healthcare providers into hyperdrive. Factors contributing to such attacks include, but aren’t limited to: Decentralized business...
Secure Your Accounts Using App-Based Authentications
Today, I want to do what I can to convince you that it’s time to start your move away from the SMS and voice Multi-Factor...
How To Create Quick Parts and Distribution Lists in Microsoft Outlook
It’s easy to get started with Microsoft Outlook. However, it is important to explore software deeper to take advantage of the productivity features that...
Digital Transformation – New Technologies to Improve Processes
There is no refuting, the internet has forever changed the way we live, work and conduct business. This means conducting business in significantly different...
The IT Sourcing Model Considerations
Strategic decisions for the IT service portfolio must include how the services will be executed operationally. This will lead to a discussion and ultimate...
Microsoft on the counter-attack! Trickbot malware network takes a hit
In theory, this takedown will greatly reduce the ability of the crooks to get malware onto your computer, and also limit their ability to...
8 tips to tighten up your work from home network
We’ve come up with eight questions you can ask yourself about devices on your home network, about the setup of your network, to help...
Every Business is a Technology Business
Alaska Air’s CIO, Varesh Sita, was quoted, “Alaska views itself as a tech company with wings.” Why did Ron van Kemenade, CIO of ING...
Top Benefits of Microsoft Outlook
Microsoft Outlook is an information and email manager, available as part of the Microsoft 365 suite. Though primarily an email client, Outlook also includes...
Phishing tricks – the Top Ten Treacheries of 2020
Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your...