Dina Dadian

Violating HIPAA regulations is a Crime that Can Lead to Serious Penalties

Attorney generals and district attorneys around the country, are increasingly taking HIPAA violations seriously. Criminal charges for violating HIPAA are serious. You should know that the federal government can bring criminal charges against companies and company employees under the Health Insurance Portability and Accountability Act (HIPAA). Attorney generals and district attorneys around the country, are […]

Violating HIPAA regulations is a Crime that Can Lead to Serious Penalties read more »

Do you believe in coincidences? Take take a closer look at pi

There are many important numbers in the universal math. Primal, odds, evens, irrational. And then there is one to rule them all. A mathematical constant, the ratio of a circle’s circumference to its diameter… what we all know – or should know – as pi. The Babylonians estimated pi to be roughly 3.125, while the Egyptians estimated it

Do you believe in coincidences? Take take a closer look at pi read more »

Why Use a Corporate VPN when connecting to your network

Most corporate IT networks have various security products on the network providing some level of security – a firewall, Antivirus software, backup, etc. Even with these protections in place, without a VPN, employees are only protected while they are on the corporate network. With a VPN installed, employees can enjoy those same protections at all

Why Use a Corporate VPN when connecting to your network read more »

Rising Business Costs in 2018: Fight Back By Outsourcing Your IT Services

Employers must always look for ways to counteract the ever-increasing costs of running their companies.  2018 won’t be any different. Once again it is rising cost environment for most SMBs. Health Care Costs Increase: Employers with healthy workforces often report a healthy bottom line – as a result of better safety, improved turnover, increased productivity,

Rising Business Costs in 2018: Fight Back By Outsourcing Your IT Services read more »

7 Must-Haves for a Secure Remote Access in Your SMB

Now that cloud technology has made access to information more convenient, with a promise to make your business life easier, the risk of data security has increased. Cloud servers are susceptible to attacks. Insecure or insecurely used remote access technologies – mechanisms that most security teams assume pose little risk – in reality, offer an abundance

7 Must-Haves for a Secure Remote Access in Your SMB read more »

3 Important Rules to Follow for Public Cloud Security and Compliance

When using a public cloud host, you want to make sure your business remains compliant with rules and regulations applicable to your industry, while also keeping your data secure. To ensure the compliance and security, there are a few rules your SMB needs to follow. The cloud is something that has taken our world by

3 Important Rules to Follow for Public Cloud Security and Compliance read more »

How to handle phishing attempts involving email scam [Screenshot]

Cybercrooks use clever schemes to defraud people every day. They often combine sophisticated technology with age-old tricks to get people to share personal information, send money or compromise access to their computer network. They use social engineering methods to convince people into doing things they would normally be smart about not doing. One of the

How to handle phishing attempts involving email scam [Screenshot] read more »

In wake of recent ransomware attacks, importance of HIPAA compliance is vital to providers and business associates

In the wake of two recent global ransomware attacks, Airway Oxygen Inc., a privately held Michigan-based medical equipment provider reported that the mid-April ransomware attack had more than 500,000 patient records compromised. In what is believed to be one of the most severe ransomware attacks on healthcare information in 2017, over half-a-million patient records including

In wake of recent ransomware attacks, importance of HIPAA compliance is vital to providers and business associates read more »

Hardware-as-a-Service (HaaS) model makes leasing computer equipment easier than purchasing

Hardware-as-a-Service (HaaS) is a procurement model that is similar to leasing or licensing. It refers to managed services where computer network equipment is leased through a provider. In other words, users lease provider’s tech assets rather than purchase them. In the HaaS model, hardware belongs to a vendor or Managed Service Provider (MSP). It is

Hardware-as-a-Service (HaaS) model makes leasing computer equipment easier than purchasing read more »

Verizon.net Shutting Down Email – Avoid Direct Migration to Gmail

Over the last couple of months, Verizon.net has been notifying their customers that they are shutting down their email service, impacting millions of customers. Notices issued in recent days indicate a shutdown date of June 24, 2017. Verizon is encouraging Verizon.net users to migrate seamlessly to AOL email, which we recommend, even if you want

Verizon.net Shutting Down Email – Avoid Direct Migration to Gmail read more »

Alarming Pop-ups: how to handle a browser hijacking

When browsing various website on the Internet, you might come across pop-ups – a common occurrence, and frankly, a nuisance. Some pop-ups are the sales chat window, some are advertisements. But there are also other, malicious types: false ads and scareware – the type that announces that “your system is infected” or “missing a critical component”, proclaiming a

Alarming Pop-ups: how to handle a browser hijacking read more »

Is your computer safe from WannaCry Ransomware? 9 tips to apply now.

As WannaCry Ransomware – a computer virus, malicious piece of software that restricts access to user files on a computer and displays demands for ransom payments to unlock access or restore files – claimed over 200,000 victims in 150 countries over this weekend, authorities and cybersecurity professionals warn of a growing fallout in the next

Is your computer safe from WannaCry Ransomware? 9 tips to apply now. read more »

Mana Health Chooses powersolution.com for IT Managed Services

May 12, 2017, New Jersey. Article originally published by NJII – reprinted with permission Two New Jersey Innovation Institute (NJII) cohort participants, Mana Health and powersolution.com, met during CEO roundtable sessions in 2016, as part NJII’s Health IT Connections program. Mana Health, headquartered in New York City, streamlines data access and interoperability in healthcare through its innovative

Mana Health Chooses powersolution.com for IT Managed Services read more »

Press Release: powersolution.com has relocated in Bergen County

Midland Park, NJ.  May 1, 2017   powersolution.com is proud to announce a company relocation to a new location. May 1st has officially marked first day in the new facility. After 21 years in Ho-Ho-Kus, powersolution.com have moved to a much needed and nicer office space in Midland Park, NJ, which allows the company to maintain

Press Release: powersolution.com has relocated in Bergen County read more »

Actionable Guide to Email Security for Small Business

Whether you like it or not, email is commonplace in the business world. With the ubiquity of emails comes a hoard of attacks to gain access to confidential information. According to the Center for Strategic and International Studies, cyber-attacks on organizations with 250 or fewer employees cost, on average, $188,000 per successful attack. The attack

Actionable Guide to Email Security for Small Business read more »

Why does tech support ask you to restart your computer when troubleshooting?

Why does tech support ask you to reboot (or restart) your machine when troubleshooting almost every time you call to troubleshoot the problem with your computer, printer, or any other smart device? “Restart your computer” seems to be a go-to solution for your computer technicians, sort of like “Put Windex on in” for Gus from

Why does tech support ask you to restart your computer when troubleshooting? read more »

How to implement Endpoint Security for Small Business [11 Tips]

In IT, endpoint security refers to a methodology of protecting the business network when accessed through such remote devices. In the last few years, IT industry’s focus had shifted from a perimeter network security to an endpoint and data security solutions. Network security solutions are important but not flawless, and businesses need to start additionally

How to implement Endpoint Security for Small Business [11 Tips] read more »

Yahoo comes clean about a giant breach (AGAIN!) – another 1 billion records compromised

Not too long ago we posted “One of the largest cybersecurity breaches EVER you did NOT know about [Yahoo]” blog, and now it happens again – and this time it’s twice as big, and it goes further back. The Yahoo corporate office disclosed information on breach of more than a billion – over 1,000,000,000 accounts

Yahoo comes clean about a giant breach (AGAIN!) – another 1 billion records compromised read more »

Why you should never use PERSONAL devices to connect to BUSINESS computer

You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers, or applications through personal devices and home PCs that are not properly monitored by your Managed Services provider. Why?

Why you should never use PERSONAL devices to connect to BUSINESS computer read more »

Small business network security: 10 Steps small business must take for cybersecurity

Small business network security is just as critical as any size organization. Protect and secure your data and ensure your business continuity with our proactive methods of business safety, top-graded data backup, network security solutions, and services giving you the reliability, accessibility, and security your business requires. Your organization can benefit from a computer network

Small business network security: 10 Steps small business must take for cybersecurity read more »

5S Method to Improve Productivity with Effective Computer Network

As the next generation is being inspired for greatness, we celebrate the importance of manufacturing to the community and the economy of our great nation. National Manufacturing Day is a U.S. salute to modern manufacturing. Did you know that one of the best approaches to organizing the work space for efficiency and effectiveness takes root

5S Method to Improve Productivity with Effective Computer Network read more »

Spammers Don’t Want You To Know How To Permanently Block Their Malicious emails!

SPAM emails are not just a nuisance. In addition to being annoying and time-consuming unwanted email is also becoming more dangerous to the security of your computer, your personal privacy, and the integrity of your sensitive data. Millions of computer users are being neglected, and as a result, getting infected, spoofed, phished, and tricked by

Spammers Don’t Want You To Know How To Permanently Block Their Malicious emails! read more »

What should Small Businesses in New Jersey know about Computer Recycling

“E-cycling” or “e-waste” is an initiative by the United States Environmental Protection Agency (EPA) which refers to donations, reuse, shredding and a common assortment of previously used business and household electronics. Generically, this terminology refers to the methods of gathering, brokering, disassembling, repairing, and recycling the parts or metals contained in used or discarded systems,

What should Small Businesses in New Jersey know about Computer Recycling read more »

Here is how antivirus can protect computer network in 7 ways

The term Antivirus refers to the common means of fighting computer malware. While hackers have become very much skilled and prolific in their spread of malware, conventional antivirus is being augmented with more advanced techniques and features. Antivirus software has become one component of security suites that offer multi-layered protection for computers. Our partner ESET

Here is how antivirus can protect computer network in 7 ways read more »

Top 10 Concerns about Managed Services Models – [Answered]

1I don’t think my business needs Managed Services, we have a computer guy Some businesses often choose to rely upon an internal employee whose primary job description is related to the core business, but she or he is “into computers”; or one of the employees’ self-proclaimed computer-guru-friend who can come sometimes to fix what’s broken.

Top 10 Concerns about Managed Services Models – [Answered] read more »

What makes Managed Services different from “traditional tech support”?

To make a comparison analogy, imagine a bank building a great structure, installing bulletproof safes, watching the assets 24-7, employing security specialists and security guards, and protecting bank customers and their valuables… rather than just calling the police after they get robbed! In a nutshell, Managed Services is a planned, proactive model of support, and

What makes Managed Services different from “traditional tech support”? read more »

2015 demonstrated how vulnerable organizations are to hacking – [Charts]

As most of you know, the HIPAA Breach Notification Rule, 45 CFR §§ 164.400-414, requires HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. Similar rules apply to vendors of personal health records and their third party service providers, pursuant to section 13407 of the HITECH

2015 demonstrated how vulnerable organizations are to hacking – [Charts] read more »

Law Firm’s 11.5 Million Internal Documents Were Hacked and Shared

As reported by USA Today, The Panama law firm Mossack Foneska is at the center of the biggest data leak in history had connections to dozens of firms and individuals on sanctions blacklists by the United States and international organizations. The firm said it “never knowingly” conducted business with sanctioned companies or individuals. However, it admitted it

Law Firm’s 11.5 Million Internal Documents Were Hacked and Shared read more »

HIPAA Breaches and Penalties Proliferate in New Jersey

As a provider of IT managed services to medical practices and other small and medium businesses predominantly in New Jersey, we continue to see numerous examples HIPAA (Health Insurance Portability and Accountability Act) violations that are risking medical practice profitability and viability. We encounter many practices that are not aware the financial and operational risks

HIPAA Breaches and Penalties Proliferate in New Jersey read more »

$750,000 HIPAA settlement emphasizes the importance of risk analysis

In September of 2015 Cancer Care Group, P.C, a radiation oncology private physician practice, with 13 radiation oncologists serving hospitals and clinics throughout Indiana, agreed to pay a $750,000 penalty corresponding to a breach in 2012. In conjunction to the monetary fine, Cancer Care Group, P.C has agreed to adopt an action plan to correct

$750,000 HIPAA settlement emphasizes the importance of risk analysis read more »

How to maintain HIPAA compliance in 7 steps

So, your practice may have achieved the coveted HIPAA compliance. Congratulations – now you must maintain it! Maintaining a consistent HIPAA compliance program is a critical part of ongoing compliance, which includes documentation, proactive risk management, privacy and security operations and periodic self-audits. 7 Steps of HIPAA Compliance Maintenance Promote and nurture culture of compliance

How to maintain HIPAA compliance in 7 steps read more »

For Small Businesses in New Jersey disaster preparedness is vital

As part of its year-long project, “The State of Small Business,” Business News Daily talked to New Jersey’s small businesses, who represent half of New Jersey’s private-sector employment, about the challenges and opportunities of doing business in our state of New Jersey. Running a small business in the most tightly populated state in the US

For Small Businesses in New Jersey disaster preparedness is vital read more »

Beware of non-compliant, substandard USB Type-C cables

If you own  Lumia 950, Nexus 5, Nexus 6P, OnePlus 2 or Chromebook Pixel devices, an are looking to replace the charging cables, beware. According to Benson Leung and his team at Google, big proponents and innovators of USB Type-C, not all cables are created equal. “it appears that they completely miswired the cable. The

Beware of non-compliant, substandard USB Type-C cables read more »

Product Recall: replacement for AC power cord overheating (Surface Pro)

If you bought a Surface Pro, Surface Pro 2, or Surface Pro 3 in the U.S. or Canada before March 15, 2015, pay attention: as overheating concerns came to light for a product component, an AC power cord for a Surface Pro, Microsoft has announced a voluntary recall and is offering a free replacement of

Product Recall: replacement for AC power cord overheating (Surface Pro) read more »

20th Anniversary Press Release

Ho-Ho-Kus, NJ  Feb 02, 2015, powersolution.com is proud to announce its twentieth year as the leading New Jersey Based MSP, a milestone Anniversary as a New-Jersey-based IT support company. In 1996 we started out as Sirius Technology, LLC, a New Jersey-based computer system integration and consulting company. In 1998 Sirius Technology purchased power solution –

20th Anniversary Press Release read more »

If you are in the flood prone area, protect your computer network!

According to the Weather channel, as Winter Storm Jonas crept through the East Coast early Saturday morning, parts of New Jersey and Delaware were hit with severe coastal flooding that left roads inundated and beaches eroded. The region can expect the following impacts: Snow is expected to continue Saturday into early Sunday morning. Major coastal

If you are in the flood prone area, protect your computer network! read more »

11 Great Mobile Apps for Doctors and Medical Professionals

Here is a list of 11 mobile apps that can assist medical practitioners in their daily workflow, listed in alphabetical order. AgileMD Platform: iOS, Android Price: ranges from free to individuals to share with up to 20 clinicians, to $75,000+ annual subscription to health systems (2+ departments/sites) with unlimited clinicians. AgileMD is a web, mobile,

11 Great Mobile Apps for Doctors and Medical Professionals read more »

Press Release: powersolution.com Earns CompTIA Security Trustmark™

FOR IMMEDIATE RELEASE powersolution.com Earns CompTIA Security Trustmark™ Validation that powersolution.com uses industry accepted security best practices Ho-Ho-Kus, NJ  Sep 24, 2015 –Managed Service Provider powersolution.com announced today it has received the CompTIA Security Trustmark™ from CompTIA, the non-profit association for world’s information technology (IT) industry. The CompTIA Security Trustmark validates that powersolution.com uses the

Press Release: powersolution.com Earns CompTIA Security Trustmark™ read more »

IT Service Management

The information technology field is improving with time and over the past couple decades it has been growing larger thanks to the contribution of worldwide important experts. Today, a good IT service management is important not only for the largest companies, but also for local small businesses that need to grow. The goal is always

IT Service Management read more »

Virus and scam alert: beware the “Your spouse was found in the Ashley Madison list” subject line

As you may know from the news broadcasts, last week 36 million names, addresses and phone numbers of registered users at the Ashley Madison site (which makes it easy to cheat on your spouse) were posted on the Internet. All these records are now out in the open, exposing highly sensitive personal information. Internet criminals

Virus and scam alert: beware the “Your spouse was found in the Ashley Madison list” subject line read more »

IT Support for small and mid-size businesses in New Jersey

Every small business could probably use a little help. In addition to similar processes used by any small and medium size business, every organization has a unique set of needs. We combine proven method with individual approach every business deserves. Are you Having Network Issues? Can’t find reliable Tech Support for your organization? Sick and

IT Support for small and mid-size businesses in New Jersey read more »

Federal Office data has been breached at OPM

There was a disturbing news brought to light by various sources of Associated Press, including New Jersey’s The Record. It is reported that according to the Homeland Security, Office of Personnel Management and Interior Department data had been cyber-attacked by hackers working for the Chinese state. Link: The Record (Bergen County)  –  “Hackers strike federal

Federal Office data has been breached at OPM read more »

Dropbox joined Microsoft in securing data privacy-focused ISO 27018 standard

Back in February 2015, Microsoft became the first cloud provider to adopt the privacy-focused ISO 27018 standard  a follow-on to ISO 27001), a significant measure of data safeguard, protecting users’ personally identifiable information (PII) by cloud providers. Now the Dropbox, a popular cloud storage solution, achieved the standard to assure users about how Dropbox handles

Dropbox joined Microsoft in securing data privacy-focused ISO 27018 standard read more »

Stop making bad IT choices and get most out of tech support for your business. Here is how:

Small businesses focus on their own practices and their industry and often don’t have the means, the resources, nor the will to keep up with latest computer developments, malicious security threats, or even practical computer tips. In turn, it leads to overlooking effective technology practices. These IT failures can be prevented or corrected: here are

Stop making bad IT choices and get most out of tech support for your business. Here is how: read more »

What is Better – to Lease or to Buy Computer Hardware Equipment?

Buy vs lease – this question pops up more and more for small and medium size businesses.  Each business owner’s or organizations’ situation is unique, however, and the decision to buy or lease business equipment can be made in each case, with consideration to organization’s situation. Who can Benefit from Leasing Computer and Network Hardware

What is Better – to Lease or to Buy Computer Hardware Equipment? read more »

10 topics and follow-up questions to ask when looking for an MSP

While technology is getting to be more and more advanced, some small to medium size owners still rely on an old-fashioned “break-fix” model, turning to their “IT Guy” when computers break, under a mistaken perception that they only spend the money when they need the computer support service. While it may have been a valid

10 topics and follow-up questions to ask when looking for an MSP read more »

Penton Technology Names powersolution.com to the MSPmentor 501 Global 2015 Edition

8th Annual Report Identifies World’s Top 501 Managed Service Providers (MSPs) March 26, 2015: powersolution.com has appeared on Penton Technology’s eighth-annual MSPmentor 501 Global Edition, a distinguished list and report identifying the world’s top 501 managed service providers (MSPs). The complete 501 list is currently available on the MSPmentor. Additional lists include: The top ranked

Penton Technology Names powersolution.com to the MSPmentor 501 Global 2015 Edition read more »

9 tips for purchasing computer systems for small business

  Buying a computer for business can be intimidating. What type of equipment or device do you need? Should you buy a certain brand? Should you shoot for a specific price range? What about clearance items?  How does a business owner decide what business computer systems to invest in? Here are 9  tips for purchasing

9 tips for purchasing computer systems for small business read more »

Backup vs Business Continuity: what does your small business need?

Do you need backup? Absolutely! Is backup enough to support your business? Absolutely NOT. Disasters happen, and for various reasons. 45% due to Human Error 45% due to Server Failure 50% due to Network Outage How you prepare can mean the difference between business as usual and costly downtime. Without Intelligent Business Continuity, more than

Backup vs Business Continuity: what does your small business need? read more »

Is Illegal software going to cost you your business?

Possessing illegal software may be the easiest trap into which many organizations fall. The issue is widespread (the Business Software Alliance estimates 22 percent of all North American software is unlicensed), making it our fourth common tech mistake plaguing small businesses. Certainly, licensing issues quickly prove perplexing. The differences between OEM, retail, and open license

Is Illegal software going to cost you your business? read more »

Disaster recovery plan – if a whole country can do it, any business can!

Estonia has a history of being the target of cyber-warfare. In 2007, a denial of service attacks crippled the country’s online banking system and almost disabled the country’s emergency services. As current political instability over the world and military actions cross into informational and digital wars, Estonia, a pioneer in the use of strong digital

Disaster recovery plan – if a whole country can do it, any business can! read more »

Pre-installed software could be a threat to your computer security: Example – Superfish

Anyone who purchases a new computer is familiar with it: pre-installed software. Perhaps it is meant to be useful, to give you “extra bang for your buck”, all those add-ons that make you feel you scored all those freebies with your main purchase, but most of that stuff is rarely useful, and at times is

Pre-installed software could be a threat to your computer security: Example – Superfish read more »

Do you really need a software solution to manage your customer service? Infographics by Deskero Helpdesk

In the sea of techno-offerings for small biz, it is easy to get overwhelmed by too much information. In the spirit of helping SMBs discover new helpful solutions, we are sharing this infographic by Deskero, a creator of innovative solutions for companies with demanding clients, combining traditional help desk features with modern technology, for successful

Do you really need a software solution to manage your customer service? Infographics by Deskero Helpdesk read more »

The impact of data loss on small and medium size business

It is a common belief that unplanned network outages are just IT issues, when on the larger scale they are business issues.  80% of unplanned outages are due to ill-planned changes made by administrators, and 60% of availability and performance errors are due to faulty network configurations. Many businesses take the business continuity for granted.

The impact of data loss on small and medium size business read more »

Anthem Insurance hack puts up to 80 million records of personally identifiable information at risk

In a historic data breach hackers have stolen information on tens of millions records of the insurance company Anthem Inc.. The information hacked from Anthem, Inc. includes patient’s birthdays, medical IDs, social security numbers, mailing and e-mail addresses. Even employment information, and, possibly, individual’s income data was stolen. While Anthem puts accent on the statement

Anthem Insurance hack puts up to 80 million records of personally identifiable information at risk read more »

Annual Data Privacy Day – 7 Tips for Information Safety

Data Privacy Day, established in 2009 by National Cyber Security Alliance (NCSA) to be celebrated each year on January 28, is dedicated to raising awareness and promoting data privacy education. What started 16 years ago as an initiative on personal information safety awareness among teens and young adults has now evolved into an initiative that

Annual Data Privacy Day – 7 Tips for Information Safety read more »

Business Continuity, Data Backup and Disaster Recovery Services in NJ

Protecting and securing your business data can help ensuring your business continuity.  We practice proactive methods of business safety and best in class network security solutions and services to give your business the best advantage in backup and data recovery. We provide local SMBs with Intelligent Business Continuity services, delivering Data Backup Disaster Recovery solutions

Business Continuity, Data Backup and Disaster Recovery Services in NJ read more »

When Will a Hacker Attack a Small Business in New Jersey?

How Small Businesses can Prevent Data, Password, and Credit Card Theft, Computer Viruses, E-mail Scams, and Phishing. Some fishermen hunt giant whales or go for a prized oversized tuna, while most go after a bounty of small fish and crabs with their nets and cages… So if you are a small or medium size company,

When Will a Hacker Attack a Small Business in New Jersey? read more »

Top 6 Advantages of Hiring an External IT Consulting Company

If your business has ever survived a business process realignment, from addressing the regulatory requirements to systems integration and new software implementations, you know what a huge time and budget consuming production this can be. Bringing in an external IT consulting company can help your organization to navigate and get through a transition most effectively,

Top 6 Advantages of Hiring an External IT Consulting Company read more »

What is Managed IT Service?

Managed Services is the practice of outsourcing day-to-day IT management and Computer Network Tech Support and  responsibilities as a cost-effective, strategic method for improving your business operations. Managed Services is a proactive, rather then reactive, method of handling your IT operations, with emphasis on overall stable, properly maintained and healthy computer network, instead of a

What is Managed IT Service? read more »

7 Benefits of Managed Services – from a trusted MSP

Managed Services is the practice of outsourcing day-to-day IT management and computer network technical support as a cost-effective method for improving business operations, instead of having a full-time on-staff IT personnel. A company like ourselves, that provides such services are called Managed Services Provider (MSP). Many of New Jersey and New York SMBs have turned

7 Benefits of Managed Services – from a trusted MSP read more »

With limited IT budget, combining in-house IT staff and MSP Service may be the right move for SMBs.

Small businesses frequently need to adopt new technologies in order to expand operations and improve the customer experience and productivity. Doing so often presents challenges. Keeping your technology up and running securely takes requires expertise. You must maintain your computer network, but may be challenged by a small biz budget. To balance in-house IT and

With limited IT budget, combining in-house IT staff and MSP Service may be the right move for SMBs. read more »

HIPAA Security and Privacy Training

HIPAA Final Rule The HIPAA Final Rule, released January 17, 2013, taking effect March 26, 2013, must be implemented by Covered Entities and Business Associates by September 23, 2013, which has already passed. One requirement is to train all workforce members. Even those familiar with HIPAA policies will need retraining, according to HHS Office of

HIPAA Security and Privacy Training read more »

Top 5 IT Infrastructure Management Concerns

1. Emerging Trends New and evolving technologies such as virtualized servers, cloud-based systems, web-based interfaces, and mobile infrastructure are growing. Hybrid operating systems are still a thing. Adopting emerging technologies and modernizing them while keeping up with data security and dependability is not easy. Innovation and modifications often take time and call for an additional

Top 5 IT Infrastructure Management Concerns read more »

powersolution.com Launches psWorkplace Cloud Solution for SMBs

powersolution.com, a New Jersey-based IT support and managed services provider, has launched psWorkplace Cloud Solution, effectively adding a hosted desktop service as part of their cloud solution offerings to local SMBs. Ho-Ho-Kus, New Jersey (PRWEB) July 09, 2014 powersolution.com, a New Jersey-based IT support and managed services provider, has launched psWorkplace Cloud Solution, effectively adding

powersolution.com Launches psWorkplace Cloud Solution for SMBs read more »

HIPAA Compliance: Am I A Business Associate (BA)?

HIPAA or the Health Insurance Portability and Accountability Act is a set of rules and regulations that has historically applied to Covered Entities (CEs) such as health care providers that engage in standard electronic transactions, health plans, and health care clearinghouses to help protect patient’s medical information typically known as Protected Health Information (PHI). As

HIPAA Compliance: Am I A Business Associate (BA)? read more »

Crypto Ransomware Family grows: what you need to know about CryptoWall trojan

CryptoWall is the new an improved version of ransomware such as CryptoBit, Cryptolocker, and CryptoDefense. Read previously posted “Beware of Cryptolocker Trojan Ransomware” for more screenshots and tips on how to identify and rid of the ransomware. Ransomware is a type of a malicious software that takes over your computer system and restricts access to

Crypto Ransomware Family grows: what you need to know about CryptoWall trojan read more »

How a simple fax can cost you a HIPAA Violation – and 3 easy steps to protect yourself.

As you should know, HIPAA security and privacy practices must be followed without exception. In a recent article posted in Renal & Urology News fax containing medical information was sent to the patient’s employer instead of his doctor. The patient had HIV and now his employer knew. The patient was very upset and notified the

How a simple fax can cost you a HIPAA Violation – and 3 easy steps to protect yourself. read more »

3 Types of Cloud – Which one is good for your business?

We love cloud. When considering cloud applications, businesses now have various options, and understanding the differences between different types of cloud can help you make a right decision when it comes to choosing the cloud solution for your company. There are three types of cloud services: public, private, and hybrid. Public Cloud The public cloud

3 Types of Cloud – Which one is good for your business? read more »

12-year run ended for Windows XP and Small Business Server – Cloud to the rescue!

Not only end-of-life for Windows XP support means the end of helpdesk support, but also the end of automatic updates that protect your PCs and server, and end of Microsoft Security Essentials for XP. If you continue to use Windows XP, your computer will still work but it might become more vulnerable to new security

12-year run ended for Windows XP and Small Business Server – Cloud to the rescue! read more »

ESET is to end support of product on Microsoft Windows XP

After 8 April 2014, Microsoft will no longer provide system updates for Windows XP users  and some vendors whose products run in Windows environment are starting to announce the end of support for their product within Microsoft Windows XP environment. ESET announced their commitment to a support period of the Microsoft Windows XP operating system

ESET is to end support of product on Microsoft Windows XP read more »

How to Solve 6 Biggest Small Business Problems With Cloud

There are many articles written on issues small and medium-sized businesses face, from the excitement of the startup to the tipping point of success. The subjects vary from innovation stalls to Top 25 Small-Business Challenges Solutions Playbook published in Entrepreneur magazine (presented by FedEx), that essentially comes down to 6 major disciplines of business: getting

How to Solve 6 Biggest Small Business Problems With Cloud read more »

Bill Gates Resigned as Chairman; Satya Nadella is Microsoft’s new CEO

After Bill Gate’s long-anticipated stepping down as Microsoft Chairman, one of Microsoft’s current board members, John Thompson is simultaneously taking on the role of Microsoft board chairman, while a new, third CEO is named for and by Microsoft – Satya Nadella, a Microsoft veteran of 22 years. Mr. Gates will now focus on the charitable

Bill Gates Resigned as Chairman; Satya Nadella is Microsoft’s new CEO read more »

7 reasons to worry about Trojan viruses, and 1 more reason to worry right now

I am typically busy during my day, sending and receiving tons of email and browsing multiple resources on the web during my research hours.  I feel my computer is safe while I am at it – I have a killer anti-virus protection on my computer network (Thanks to our partner ESET for keeping it safe,

7 reasons to worry about Trojan viruses, and 1 more reason to worry right now read more »

Beware of CryptoLocker Trojan Ransomware

CryptoLocker, detected by Sophos as Troj/Ransom-ACP, a malicious program known as ransomware, is making rounds hitting computers via email attachments or via botnets. Infecting your computer via Email Trojan Infection through email may happen when you open an attachment containing the trojan. You have to take special care opening attachments, even if they look innocent

Beware of CryptoLocker Trojan Ransomware read more »