Are Google and Yahoo HIPAA Compliant?

November 20th, 2013

The HIPAA Omnibus Rule expands the definition of HIPAA Business Associates to cloud providers. Some of the most popular cloud providers include Google, Yahoo, AOL, Amazon, Microsoft, and Dropbox. As HIPAA Business Associates, cloud providers are required to sign Business Associate Agreements (BAA) with Covered Entities.

SECURITY ALERT: CryptoLocker Malware Threat

November 12th, 2013

The latest variant is disguised as a voicemail message which contains a zip file. Do not click on attachments from companies you don't know or from which you haven't expressed interest in receiving information.

Learn more >>

7 Reasons Why Getting Rid Of Windows XP Will Likely Exorcise Hidden Gremlins And Goblins Lurking In Your Computer Network

October 8th, 2013

Although many businesses have been getting rid of Windows XP for at least the last 3 years, the fact remains that as of early this year, around 500 million business computers were still running Windows XP. While the witching hour for Windows XP is still a few months away (April 9, 2014), here are 7 of the top reasons running Windows XP should scare any business owner right now.

Windows XP: Do No Resuscitate

August 21st, 2013

written by our friends at I am writing a book and working on a chapter about "Nuking and Paving" desktop computers. That's when you totally flatten a computer and rebuild from scratch. This may be done for a variety of reasons, including some super nasty virus attacks.

An Easy Way to Hack Into Your Web Site

July 17th, 2013

written by our friends at Consultant or Amateur
How vulnerable is is your web site?
You hear news stories all the time about sites being "hacked" - But what does that mean? And are you in danger?

First, let's look at hacking. "Hacking" can mean just about anything that involves breaking into your computer systems.

Are you phish bait?

May 14th, 2013

Despite the tools many email providers have put in place to block malicious email, phishing emails are still very successful in making it into your inbox. Phishing emails generally attempt to acquire sensitive information or to cause damage or disrupt computer systems.

Don't Panic – and Don't Click!

May 7th, 2013

Here's another great insight from our friends at consultantoramateur.comEvery once in awhile, the evil people who run phishing scams and spread viruses figure out a way to get an email past your spam filter and into your InBox. They can be very tricky and scary.

A Dishwasher that "Technically" Works

April 29th, 2013

Here's another great insight from our friends at Have you ever had an appliance that didn't quite work right? I had an experience once with a dishwasher that just didn't clean very well. It seemed to work. It went through all the cycles.