How to Roll a “Lucky-7”: Play and Win the IT Outsourcing Game

How to Roll a “Lucky-7”: Play and Win the IT Outsourcing Game

These are the Top 7 reasons (not in any particular order) why companies outsource their critical applications and infrastructure to a proven managed service provider (MSP): Cost reduction – By leveraging the economies of scale of the MSP’s technical support team, companies can reduce their internal staffing budgets and shift current IT team resources towards forward-looking, business-driving projects. Technical support and consulting services are contracted at an hourly rate reducing the need for expansion of permanent IT

Ransomware: Healthcare is in the cybercriminals’ cross-hairs

Ransomware: Healthcare is in the cybercriminals’ cross-hairs

We all receive numerous emails warning us of the dangers associated with clicking on links within emails from parties we are not familiar with. Unfortunately, many of those links are shrouded within advertisements or other seemingly beneficial statements which entice us to view that great promotional offer or track that Amazon product shipment we know we had ordered a few days back. International scammers are sending millions of emails every day that look like courtesy messages from

New York State Cybersecurity Regulations

New York State Cybersecurity Regulations

NYS DFS 23 NYCRR 500 Regulations (Effective March 1, 2017) New York State Department of Financial Services, Governor Cuomo Announces Proposal of First-in-the-Nation Cybersecurity Regulation to Protect Consumers and Financial Institutions. Insurance companies and other organizations regulated by the New York State Department of Financial Services (NYDFS),effective March 1, 2017, are subject to strict and specific cybersecurity regulations as outlined below. The following table summarizes each section of the cybersecurity regulations, which requires a DFS

Should You Hire or Outsource to an External IT Service Provider?

Should You Hire or Outsource to an External IT Service Provider?

Most small business owners handle all aspects of their businesses, including acting as the Information Technology department. This will work for as long as you remain a small business without employees. When you grow and start hiring staff, will it make more sense to use your business-building time on handling IT issues or outsource to an external IT Service Provider? Unless you are an Information Technology Service Provider yourself, chances are your time will be

Proactive, Managed IT Services Save Small and Medium Businesses Thousands of Dollars Yearly

Proactive, Managed IT Services Save Small and Medium Businesses Thousands of Dollars Yearly

Every dollar a small business spends needs to have an immediate and quantifiable return. This is especially true for critical services such as I.T. support. If you are one of the millions of small businesses that depend upon your technology to keep your business running, proactive Managed IT Services will save you money, improve your efficiencies and reduce your downtime. The Solution With the advent of new monitoring tools and the ability to remotely deliver

Password Strength is Key in Business and Personal Information Security

Password Strength is Key in Business and Personal Information Security

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords is to leave the door wide open to identity theft and corporate piracy. Your passwords must be a robust combination

Small Office or Home Network Connectivity Troubleshooting – Part Two

Small Office or Home Network Connectivity Troubleshooting – Part Two

This is part two in our series for network connectivity troubleshooting. Confirming the connectivity with the Internet was the focus of the first four steps in our process. We now continue with the remaining steps to help you discover what the problem with your Internet connection might be. 5. Check functionality. Once the network cable has been confirmed to be working correctly, we need to see if the router is working correctly. Since you have

Small Office or Home Network Connectivity Troubleshooting – Part One

Small Office or Home Network Connectivity Troubleshooting – Part One

To most computer support persons, having problems connecting to the Internet via a router and a high-speed connection is not a major issue. However, for those who do not understand some basic technology concepts, solving connectivity problems will be a struggle. The following will give you some tips of where to look for network connectivity problems and how to perform some basic network connectivity troubleshooting tasks. Most of the initial steps of this process are

Maintaining HIPAA Compliance with Online Data Storage

Maintaining HIPAA Compliance with Online Data Storage

Keeping patient records secure and private is the concern of every hospital and health care provider, yet most organizations are often overwhelmed with years and years of patient information and the lack of adequate network or file server storage space. Destroying these health records in order to make room for more storage is often not an option. Patients and staff want access to all these health care records, and physicians require them in order to

Computer Backup Solutions – Are All Systems a Go?

Computer Backup Solutions – Are All Systems a Go?

The subject of computer backup solutions has always been a topic of importance when it comes to preserving critical data on your workstations and server computers. These days there are more options available to you in this arena, which can be both a help and a hindrance. On one hand, having more options is helpful because better solutions have been brought to the marketplace from which you can now choose to fit your needs. A