top of page

IT Advice & Guidance

4 min read
The Weakest Link in the Chain
Even the most sophisticated cyber solutions are unable to prevent human error. Learn how to minimize the weakest link in cybersecurity.

3 min read
IT for International Travel
Go ahead and plan that trip! Learn more about how to keep your IT laptop, devices and data safe when traveling anywhere in the world.

4 min read
Managing Your Own IT
Managing your own in-house IT can be good, and bad. Learn the pros and cons of establishing in-house IT support.

4 min read
Work Anywhere, Live Differently
Technology is the key to this freedom. I recently took an extended trip to Portugal and enjoyed being able to ‘work anywhere’ and ‘live...

3 min read
Mobile Security
Mobile Security: now, more than ever.

4 min read
Security AwarenessTraining
Preventing your data from being stolen. A very common and significant IT security threat today is the data breach. This is a term used to...


3 min read
Dental Office Embezzlement
Nearly 46% of dental practices have experienced employee theft or embezzlement. This blog discusses how to avoid.

4 min read
Cyber Liability
Know what is driving the costs of cyber liability insurance and what you can do to keep those costs down.

3 min read
Dental Offices Under Cyberattack
Cyber threats and attacks are only increasing in 2022, especially for dental offices, DSOs and healthcare providers.

3 min read
Account Takeovers - another threat on the rise.
Account Takeovers are on the rise by 671%. Find out why this is a cyber attack is such a big threat and how to prevent.

3 min read
Health Care Practices Prepare for Cyber Threat Onslaught.
AUSTIN, Texas (October 8,2021) - With health care organizations facing increasing cybercrime attacks this year, most are having to take a...

4 min read
Protecting Personal Devices in the Workplace
Important steps for managing bring-your-own-devices (BYOD). Raise your hand if you use a personal mobile device at work... If so, you are...

4 min read
Lurking in the 'Shadow IT'
Shadow IT has become increasingly more of a threat to organizations.

4 min read
10 Cybersecurity Practices for Healthcare Industry
These are the 10 cybersecurity practices for the healthcare industry, published in CSA 405(d).


2 min read
Ctl-Alt-Delete - Back to the office!
Take these steps to ensure your IT is ready to come back into the office.


3 min read
Planning for that moment...
That moment, when you realize your network has been locked up with ransomware. Or your office gets flooded and your computer servers are...


4 min read
How Much is Enough?
When it comes to cybersecurity solutions and measures, how much is enough? Especially given today’s cybercrime activities that have been...
bottom of page