Blog

Email 101: PAR structure

Email 101: PAR structure

When first introduced, email was viewed simply as an electronic version of memos and business letters, and were usually formatted thus. Over time, email has become much more informal, leading to a more natural form of communication. While this is great, there can be times when emails come across as unstructured and unclear, leading to frustration and even a loss of productivity.

Facebook working on new network

Facebook working on new network

Social networks have become a large part of modern communications and it is not uncommon for users to log onto sites on a daily basis. Networks like Facebook are so popular that some business owners and managers are concerned about how much valuable work time is spent on the site.

How to deauthorize iPads on iTunes

How to deauthorize iPads on iTunes

This year, as in recent years, one of the hottest gifts for the holiday season is the iPad. If you receive a brand new iPad for the first time then that is truly an awesome present, but you may already have one. If you do, then you may not be able to install apps on your new device at first because your iTunes account already has other devices linked to it.

Is Regin a real threat to your company?

Is Regin a real threat to your company?

While there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it’s tough to deal with and not much is actually known about it.

A hacker’s paradise

A hacker’s paradise

You may not want to rely on the Food & Drug Administration’s (FDA’s) app approval system: Roughly 90 percent of Android health-care apps have been hacked, and 22 percent of them were FDA-approved. That information comes from the latest State of Mobile App Security report from Arxan Technologies, which attributed the high rate to a lack of information, security training and resources in the health-care field.

Health-care predictions for 2015

Health-care predictions for 2015

IDC Health Insights has issued its predictions for health-care in 2015, and just as one might expect, they revolve around cost, technology, and operational efficiency. Here are some of the key takeaways.

Cybersecurity. By 2020, 42% of digital health-care data will be unprotected.

5 Real-world DR tips

5 Real-world DR tips

Regardless of your business’s location and industry, there is always a chance that you may experience a disaster at any time. Be it man-made, or natural, any disaster, if not properly prepared for, could spell trouble for your company. That’s why a Disaster Recovery Plan is essential.

Net Neutrality – what is it?

Net Neutrality – what is it?

Over the past few years there have been a number of issues and rulings made by various courts in the US regarding the overall freedom of the Internet and how it is to be managed. By now, many of us have heard of Net Neutrality, but it may seem like an issue that won’t affect small businesses.

Microsoft license audit emails

Microsoft license audit emails

When it comes to IT, one of the largest expenses for many businesses is software. Some employees require the bare minimum, while others could need thousands of dollars worth of software. Businesses who have purchased licenses for Microsoft software may receive an email asking for a license audit.