[img src="/wp-content/uploads/2020/12/img-blog-8-tips-improving-video-conferences.jpg" class="aligncenter"] Video conferencing has proven essential in today’s remote work environments for maintaining a corporate culture of strong teamwork and connectedness. That said,...
jbartolomeo@onlinecomputers.com
How becoming a software minimalist enhances efficiency
A couple of decades ago, business computing infrastructures were relatively simple. Most only consisted of an internal network and a preapproved selection of programs. Today, the situation is very different, with the typical business having hundreds of off-the-shelf...
Ensure HIPAA compliance with these simple tips
Given that it was enshrined in law 24 years ago, HIPAA lacks clarity on precisely which measures you need to take to secure electronic protected health information (ePHI). After all, today’s IT environments look very different to how they did in 1996. HIPAA applies to...
OCR publishes new HIPAA resources for mobile health app developers
In the old days, things like privacy, security, and compliance rarely played a central role in the development of mobile apps and other software. Instead, they were normally tacked on later. Today, however, software developers need to incorporate these features by...
Why businesses need to rethink how they deal with end-of-life equipment
In the world of technology, the only constant is change. Businesses face ongoing pressure to keep ahead of the curve by regularly upgrading their systems and continuously improving their efficiency. But this need is also fueling the rapid rise of electronic waste, or...
5 Tips to secure your Microsoft 365 environment
Migrating to a cloud-based Microsoft 365 deployment brings many business benefits, such as better remote working conditions, centralized management, and streamlined updates. But as with any cloud migration, it also introduces a host of new security challenges. While...
4 Tips for protecting your employees from phishing scams
Phishing scams, which use fraudulent emails to distribute malware and trick victims into giving away information, are the most common tactics used by cybercriminals today. After all, it’s much easier to exploit human ignorance and unpreparedness than the cutting-edge...
How to stop a business email compromise attack
Business email compromise (BEC) attacks are exploits where cybercriminals get unauthorized access to a business email account to steal the owner’s identity. The compromised accounts are then used for carrying out highly convincing social engineering scams against...
5 Telltale signs of a ransomware attack
Ransomware attacks are widespread and usually take victims by complete surprise. Then, they’re left struggling to make the choice between paying the ransom or risk losing their data for good. Fortunately, there are several warning signs that cybercriminals are already...
10 Tech tools that education experts can’t live without
[img src="/wp-content/uploads/2020/09/10-Tech-tools-that-education-experts-banner.jpg" class="aligncenter"] With education institutions facing enormous pressure to support remote and hybrid learning, it has never been more important to take advantage of technological...
How colleges are using technology to enable hybrid classroom environments
[img src="/wp-content/uploads/2020/09/How-colleges-are-using-technology-banner.jpg" class="aligncenter"] The ongoing COVID-19 pandemic has placed enormous pressure on the educational sector to adopt flexible learning environments that ensure students continue to...
6 Exciting new technologies educators can use
[img src="/wp-content/uploads/2020/09/6-Exciting-new-technologies-banner.jpg" class="aligncenter"] It’s an exciting but also uncertain time for the education sector. As schools and universities continue to grapple with the restrictions introduced to reduce the spread...
