Blogs

Browse inrsITe’s latest tech advice, company news, and industry recognitions

New Gmail features you need to use now

New Gmail features you need to use now

The first thing you’ll notice in the new Gmail for web is its uncluttered look, but there’s plenty more to be excited about. Greater security, easy-to-use sidebar apps and inline buttons, and more have been added to improve Gmail users’ experience. Here’s a quick rundown of all the features you need to start using now. […]

How to get virtualization working

How to get virtualization working

Virtualization is available in every modern computer. It allows you to create additional virtual environments that run on your actual hardware. Sometimes, though, it won’t work right and results in errors. Here are steps to get it working properly. #1 Enable Virtualization in Your BIOS In most cases, virtualization won’t work because it’s disabled in […]

How HIPAA Impacts Social Media Usage

How HIPAA Impacts Social Media Usage

Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization. On April 14, 2003, the “Health Insurance Portability and Accountability Act” (HIPAA) became law with the goal […]

Are you subject to Data Protection laws?

Are you subject to Data Protection laws?

This blog introduces a new topic that many may be unaware of: Data Protection laws. These are laws that define fully, or in part, what type of data is covered by government regulations, proscribe general standards for the securing of covered data, and may also require notification of victims and governmental authorities in the event of a breach. Small businesses, no matter what product or service they provide, are likely subject to some manner of regulations regarding the storage and use of digital data. For instance, any medical office or organization that handles medical records is subject to HIPAA, the federal law regarding health data privacy.

Smaller firms less likely to keep up to date on the basics that protect them

Smaller firms less likely to keep up to date on the basics that protect them

On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure their software is consistently updated to reflect any patches released by the product’s maker. This simple oversight, deliberate or not, is a major source of data breaches and ransomware attacks.

Cyberattacks and the vulnerability of the small business

Cyberattacks and the vulnerability of the small business

You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring.

Limited investment capital and planning for trouble

Limited investment capital and planning for trouble

Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware. Unfortunately, smaller and younger firms often fail to address these issues because they lack the necessary capital to invest in additional or supplemental equipment.

Data Protection Laws and PIIs

Data Protection Laws and PIIs

Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.”

Ransomware Part II

Ransomware Part II

Ransomware Part II

In our last blog, we explained what ransomware is, and why it can be an especially troublesome virus. Today, let’s look at what you can do to avoid falling victim.

Prevention is the best cure. Follow standard “data hygiene” principles that you probably hear about all of the time.

We just released a free eBook, Demystifying the Cloud: What it is and why you should careDOWNLOAD
+