How to keep your Android device secure

How to keep your Android device secure

According to this article, more people are relying on their smartphones for tasks such as surfing the internet, booking a taxi or an airline ticket, playing games, and ordering food. While you cannot predict if your Android device will be stolen or lost, the following tools will protect your personal information and give you peace […]

Want to get rid of your Mac? Not so fast

Want to get rid of your Mac? Not so fast

Buying a secondhand Mac is a popular way to save money on relatively expensive equipment that retains its value. Conversely, selling your used Mac is a great way to expose yourself to potential identity theft. Keep your personal information safe when getting rid of a Mac computer by adhering to these tips. Sign into all […]

How to disable nosy Windows 10 settings

How to disable nosy Windows 10 settings

Windows 10’s Cortana tries to be helpful by displaying accurate, personalized ads based on your online searches and spamming useful suggestions as you type. But this can start to feel invasive after a while. Here are some tips you can use to keep Microsoft’s watchful eye off your computer activity. Turn personalized advertising off For […]

PHI security best practices

PHI security best practices

Healthcare companies and the vast amount of valuable patient information they hold have become a major target of cyberattacks. Hospitals must combat this with a highly trained team of technicians equipped with the following technologies and security tools. Strict access policies To control access to protected health information (PHI), your IT department must introduce access […]

Android mobile security threats today

Android mobile security threats today

As bring your own device (BYOD) policies become common practice for companies today, business owners must keep in mind the possible cybersecurity implications of connecting more devices to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as how […]

Apple and your privacy: What do they know

Apple and your privacy: What do they know

With the recent U.S. Senate inquiry into Facebook’s perceived violations, concerns about online privacy are once again thrust into the spotlight. Apple, Google, Amazon, and other tech companies also gather data on their users, so if you’re using Mac or iPhone, you may wonder: How much information does Apple have about you? What Facebook & […]

HIPAA Requires Careful Social Media Posting

HIPAA Requires Careful Social Media Posting

Healthcare providers that use Social Media can interact with their patients, advertise new services, and quickly communicate urgent announcements or messages. There’s immense potential for it to improve care, but also to expose patient-specific information. On April 14, 2003, the “Health Insurance Portability and Accountability Act” (HIPAA) became law with the goal of protecting the […]

Helpful new features coming to Windows 10

Helpful new features coming to Windows 10

Windows updates are notorious for taking too long to install and providing few tangible benefits. But Microsoft aims to make amends with the forthcoming Spring Creators Update, which takes half as long to set up and introduces several new features. Brush up on what’s coming so you can take full advantage of the update on […]

3 tips to maintain a secure Facebook account

3 tips to maintain a secure Facebook account

In March 2018, disturbing reports circulated on the web that revealed a company named Cambridge Analytica harvested confidential details of 50 million Facebook accounts. If you’re concerned that your private details are being passed around by private companies, consider the following 3 tips to maintain a confidential Facebook profile. Download your Facebook data The thought […]

iOS 11 controls to protect your data

iOS 11 controls to protect your data

Gathering data such as user location is crucial for companies like Apple to provide personalized experiences through their mobile apps. Understandably, many users are not happy about this minor invasion of privacy, so here’s a guide for how to set privacy controls on your iOS 11 device. Location Services controls Apple and other third-party apps […]