Toll-Free: 800-875-5042


  • How to Print an Envelope in Word 2013

    by K Logan | Jul 09, 2015
    Has there ever been a time when printing envelopes in Word was easy? It seems certainly since the dawn of Word printing envelopes has challenged many people and that’s okay – we’re here to help.
    Full story
  • Security Alert: Wire Transfer Schemes on the Rise

    by K Logan | Jul 01, 2015
    more sophisticated wire transfers are striking individuals and businesses of all sizes. Rather than stem from complete strangers, these attacks have become more difficult to spot, as the attackers leverage real email addresses that are known to the target. Quite often, these emails appear to come from executives and are sent to decision makers in the accounting department to process.
    Full story
  • How to Make Copiers and Printers HIPAA Compliant

    by K Logan | Jun 24, 2015
    The Department of Health and Human Services considers copiers, printers and fax machines to be workstations that are required to be secured and maintained according to standards outlined by the Health Insurance Portability and Accessibility Act, or HIPAA. Unfortunately, these devices can present some of the biggest unknown threats to the practice.
    Full story
  • The Truth About Paper - Infographic

    by K Logan | Jun 05, 2015
    Do you know how much each misfiled or misplaced document costs your business or how much knowledge is lost with each employee in a paper-based environment? Check out our infographic and learn the truth about paper.
    Full story
  • Should Medical Practices "BYOD"?

    by K Logan | May 01, 2015
    As technology advances, more medical practices are embracing a bring-your-own-device (BYOD) policy.While using these devices has the ability to enhance the patient experience and quality of care delivered, the security requirements set forth by HITECH and HIPAA laws put unprepared medical practices at a high risk for data breaches and non-compliance fines.
    Full story
  • 5 Reasons Criminals Want Patient Files More than Credit Cards

    by K Logan | Apr 16, 2015
    In 2014, the healthcare industry was overwhelmingly the top sector for security breaches, with 116 breaches in a single year –510% more than the financial sector. Here's why.
    Full story
  • Transitioning and Coordinating Patient Care - Safely

    by K Logan | Mar 19, 2015
    Patients are increasingly mobile, and with an increased turn over in the patient landscape, medical practices are challenged with a new tier of administrative work. When you factor in the adoption of Electronic Health Records (EHR) and the necessary compliance with the HITECH Act and Meaningful Use programs, it becomes even more challenging to send, receive and share patient records and medical information in a secure and compliant manner.
    Full story
  • 24% of Medical Practices Fail Meaningful Use Audits

    by K Logan | Feb 23, 2015
    Upon audit, 24% of practices failed to meet standards for Electronic Health Records (EHR) incentives they'd received. Small practices had to repay the government an average of $16,862. Out of those audit failures, nearly 70% were because the practice did not conduct an annual risk assessment, required by the Health Insurance Portability and Accessibility Act (HIPAA).
    Full story
  • Data, Not Documents

    by K Logan | Feb 05, 2015
    When it comes to document management, the focus is often on just that: managing documents. While this might make documents easier to find, it doesn’t necessarily simplify locating information.
    Full story
  • 5 Ways to Take Control of Your HIPAA Compliance

    by K Logan | Jan 29, 2015
    Few agencies covered under the Health Information Portability and Accessibility Act (HIPAA) feel confident about the Office of Civil Rights (OCR) or Department of Health and Human Services (DHHS) poking around. Despite this, there are a number of ways that this might become the case. Here are 5 tips to take control of your HIPAA compliance.
    Full story
  • The 4 Essential Customer Service Components of Your Phone System

    by K Logan | Jan 20, 2015
    Gone are the days where business telephones are hunks of plastic tied to a wall line. So what does a company need in order to ensure the best customer service available to their clients? Today’s phone systems can multiply the productivity of each employee, enable a more mobile workforce and, most importantly, enhance your customer service.
    Full story
  • The Dangers of The Internet of Things

    by K Logan | Nov 19, 2014
    By now you’ve likely heard of “The Internet of Things.” Perhaps you dismissed it as some expression referring to the amount of things you can get done via digital technology. To some extent, that is true. The “Internet of Things” describes any device linked to the internet that allows for coordinated activities and the exchange of data between the device and a host device. These devices do not need to be of the same type to work together.
    Full story
  • 6 Basic Rules For Preventing Malware Attacks

    by K Logan | Nov 11, 2014
    When it comes to cybersecurity, an ounce of prevention is worth a pound of cure. That is to say, most malware, including ransomware, is easier to prevent than fix. While many organizations have policies about cybersecurity, a lot of these policies have not been updated in a while. Some other organizations simply rely on people to use common sense, which can prove detrimental if the wrong employee encounters a threat they are unfamiliar with.
    Full story
  • Ransomware Attacks Continue to Climb

    by K Logan | Nov 04, 2014
    Ransomware is a type of malware that restricts use of the infected computer or mobile device so that users cannot access applications and files. The malware creator demands a ransom to “unlock” the computer. Considering the lucrativeness of this threat, this type of cybercrime is expected to continue increasing.
    Full story
  • Cybersecurity Infographic

    by K Logan | Oct 24, 2014
    Cybersecurity is an increasingly dangerous threat to businesses and organizations of all sizes, and it spans across websites, emails, mobile devices and other wireless appliances. The damages don't come lightly for those affected. Between loss of reputation, data losses, potential fines and spying, organizations face hefty financial losses that can last several years. Using the most up to date available reports from the leading security analysts, we've put together a handy cybersecurity infographic to help organizations understand the different threats they face and their probability of being attacked.
    Full story
  • Free Document Management Software: The Hidden Costs

    by K Logan | Oct 14, 2014
    As companies increasingly discover the true potential that information provides, demand for document management software continues to grow rapidly. As this trend continues, more software companies are offering free or low-cost document management add-ons to existing software you might be using. The old adage “there’s no such thing as a free lunch” comes to mind, and certainly software is not the exception to this rule – not by a longshot. With vendors offering up these add-on features, it’s important to point some key reasons that a free document management solution may be more hindrance than help.
    Full story
  • Security Alert: A Bad Day for USB Users

    by K Logan | Aug 26, 2014
    A new threat was unveiled at the recent Black Hat 2014 security conference in Las Vegas. The exploit can invade your network using common USB devices, a highly ubiquitous tool with a fatal flaw. They aptly named this vulnerability badUSB.
    Full story
  • 6 Things You Need in Your IT Security Policy

    by K Logan | Aug 21, 2014
    With the right language, your security policy can mitigate threats and reduce the impact of any breaches that do happen. The result is a boost in productivity, a reduction in network downtime, and the ability to provide reassurance to customers that their personal and financial information is safe in your hands. Here are 6 essential things your IT security policy needs to address.
    Full story
  • What is Spear Phishing?

    by K Logan | Aug 21, 2014
    Traditionally, phishing attacks were sent en masse. In response to protective measures, some cyber criminals have changed their tactics to a more targeted approach – spear phishing.
    Full story
  • Why Businesses are Moving to Cloud

    by K Logan | Aug 14, 2014
    By the year 2017, 91 percent of businesses are projected to have integrated the cloud into their organization.When you lay out the benefits to businesses, it is clear to see why so many organizations are expected to transition to cloud in the next three years: competitive advantage. Cloud computing is taking the business world by storm, and it shows no sign of letting up.
    Full story