Technology is historically a male-dominated industry. While women in the United States hold 57 percent of workforce occupations, they only hold 26 percent of professional computing occupations. Further, only 20…
In a world facing daily cyberattacks and security vulnerabilities, do you know how secure your practice is? The scary fact is that many practices don’t know if they have the…
Security Risk Assessments (SRA) have been a required (and sometimes dreaded) guideline since 2009. They’re enforced as a part of the HIPAA Security Rule and are required to be completed…
It’s hard to believe we’re a month in to 2018! We want to take a few minutes to reflect on 2017 – a year of growth, evolution and continuing to…
Process is learned and developed over time and through years of experience. Process requires theories, tests and failures. It’s my personal motto, and certainly applicable to my work in marketing.…
What’s going on?A security vulnerability, known as “Meltdown” or “Spectre,” depending on the variant, has been identified that affects several CPU chipsets. More specifically, this vulnerability could be exploited to…
While the future of cloud computing is certainly bright, the understanding of cloud computing terminology seems to be, well, cloudy. We’ve collected the most misunderstood cloud computing terms in hopes…
The holiday season is here and if you’re like us, you haven’t yet finished your holiday shopping and you’re stuck on just a few, hard-to-buy-for people. We’ve found that tech…
When a practice begins evaluating cloud providers like Netgain, we’ve found that often times they haven’t yet identified their total cost of IT ownership. This makes it difficult to accurately…