Skip to the main content.

Lance Stone

3 min read

Without having to give up entirely on cellphone use, there are ways to ensure that online communication remains safe and efficient.

Apple patched the security vulnerability in its messaging applications shortly after Charlie Miller, a professional hacker, demonstrated how easy it would be to hack into iPhones using a text message. The IT conference last July pointed out...

Read More

7 min read

Detangling the Web of State Data Breach Notification Laws

Although most state statutes share key elements, there are major differences governing each. There is no one-size-fits-all approach that can answer...

Read More

1 min read

Who Has Access To Your Business Network? 72% Of Small Businesses Report Having Their IT Systems Accessed By Those Without Proper Authorization!

Did you know 72% of small businesses report having their IT systems accessed by those without proper authorization? What does this mean for your...

Read More

1 min read

Medical Records Dumped = $800,000 in HIPAA Settlement 

Parkview Health System, Inc., a nonprofit health care system that serves individuals in northeast Indiana and northwest Ohio, must pay $800,000 for...

Read More

1 min read

Who’s Winning In The Battle of Cyber Crime?

According to The 12th Annual Survey of Cybercrime, 500 U.S. business executives, law enforcement experts, and government officials say that the cyber...

Read More

1 min read

Save Time and Headaches With These Office Keyboard Tips and Tricks.

Does it seem like you spend more time than you should preparing documents in Office? You are if you aren’t using these speedy keyboard shortcuts. It...

Read More

1 min read

The Use of Apple Computers and Devices In The Business World Is Rising! Does your business have a Managed IT Services company who can help support your Apple devices?

Apple computers, iPad and iPhones are on the rise in Corporate America. Do you have an IT company who can help support all of your Apple devices...

Read More

1 min read

BEWARE: A New Version of CryptoLocker Is Disguised As a Fax.  It Could Be Lurking In DropBox or Other Cloud-Storage Platforms.

Another version of CryptoLocker has just been released by the criminals who created the Australian Electric Company Bill version earlier this week....

Read More

1 min read

Important Security Warning: Dramatic Increase In CryptoLocker Activity Picked Up By Our IT Security Professionals

Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware...

Read More

1 min read

5 Tips That Will Get Your Business Website Found On Google.

Search Engine Optimization, or SEO, is a collection of tactics that help to rank your business website in the first positions of a Google search....

Read More