Making the change to remote work?
We're happy to help you stay connected

Learn more

channel program

View post: Fighting the toughest battle in Cybercrime: Spear phishing
,

Fighting the toughest battle in Cybercrime: Spear phishing

Posted on April 24, 2015

Introduction:  Just last week CBS ran a 60 Minutes segment about the cyber-attack on Sony Pictures, and it brought to light the dangers of phishing. Specifically, it highlighted a tactic […]

View post: How healthcare firms save big on phone bills with cloud VoIP

How healthcare firms save big on phone bills with cloud VoIP

Posted on January 14, 2015

Davis Technologies is an IT services provider in New Baden, Illinois, that offers a broad range of IT solutions. Davis Tech is a HIPAA-certified provider, and 80% of their customers are in […]

View post: Support: Part III of the hidden costs of Exchange providers
,

Support: Part III of the hidden costs of Exchange providers

Posted on December 1, 2014

In case you missed it: Read Part I and Part II of this series. Here’s what I have to do when I need to call my health insurance company or my cable TV provider: I block an hour on my […]

View post: Migration: Part I of the hidden costs of Exchange providers
, ,

Migration: Part I of the hidden costs of Exchange providers

Posted on November 14, 2014

I hate moving. You have to make sure you have all the appropriate tools to support your move – boxes, packing tape, bubble wrap. You may even have to take time off work. Let’s not […]

View post: Are you prepared for hard drive crashes? Because you should be.

Are you prepared for hard drive crashes? Because you should be.

Posted on October 31, 2014

“Every week,” says Google Labs, “140,000 hard drives will crash in the United States.” That’s a massive number. Terrifying. And it’s all the more […]

View post: HIPAA compliance & the cloud: how do you evaluate a cloud provider?
,

HIPAA compliance & the cloud: how do you evaluate a cloud provider?

Posted on March 17, 2014

The 2013 HIPAA Omnibus Final Rule changed everything for healthcare IT. It declared that any entity that “creates, receives, maintains, or transmits protected health information (PHI) […]

View post: Why Office 365 customers need 3rd-party email archiving
, ,

Why Office 365 customers need 3rd-party email archiving

Posted on January 31, 2014

Think of Office 365 like a Swiss Army Knife. It packs a lot of interesting tools into a single package—but all its tools are miniaturized versions of the real thing. Case in point: email […]

View post: Can you use SecuriSync like an FTP server for content files?
,

Can you use SecuriSync like an FTP server for content files?

Posted on January 23, 2014

  I was talking to a SecuriSync customer the other day. He asked me about embedding SecuriSync links into webpages. Could they use SecuriSync kind of like an FTP server for content […]

View post: Top 10 Email Archiving features you shouldn’t live without
, , , ,

Top 10 Email Archiving features you shouldn’t live without

Posted on January 14, 2014

  For most firms, the incremental cost of not adequately archiving emails can quickly escalate into the tens or even hundreds of thousands of dollars. Email archiving is the solution to […]

View post: Avoiding a “Conflicted Copy” in SecuriSync
,

Avoiding a “Conflicted Copy” in SecuriSync

Posted on January 10, 2014

  SecuriSync is a great tool for allowing multiple people to collaborate on the same files. But sometimes, over the course of collaborating, two people might work on the same file at […]