Your Portland & Vancouver IT Information Source

Speak With Your Vancouver/Portland IT Specialists

Are You Using an iPhone? Critical iPhone Security Alert!—Install Your Apple iOS iPhone/iPad 7.0.6 Update ASAP!

February 25th, 2014

Apple just released a patch for iOS 7 that includes a security fix for Secure Socket Layer (SSL) connection verification. If your phone or iPad has been upgraded to iOS 7, install this update now.

Without it your data may be at risk.  The update prevents someone from taking your phone and disabling Apple’s “Find My iPhone” service.

Where & What Are Your Employees Doing Online When You Are Not Watching?

February 24th, 2014

Keep Your Business and Employees Safe with an Internet Usage Policy

An Internet usage policy provides guidelines regarding the appropriate use of company equipment, Internet, and network access. The Internet is a powerful tool for employees, however, a single moment of inattention or inappropriate use can transform the Internet into a huge security threat against your business.

Everything You Need to Know About E-Signatures

February 19th, 2014

Electronic signature methods are becoming increasingly popular. While e-signing services vary from provider to provider, all services allow users to upload documents to an online service and apply special annotations where signatures are necessary. Then, the user sends this file to the recipient who signs the document and sends it back.

Make Sure Your IT Department Safeguards Your Technology to Avoid HIPAA Security Breaches

February 12th, 2014

The HIPAA Security Rule was enacted in 1996, designed to establish national standards to protect individuals’ electronic personal health information (PHI) used and/or stored by a covered entity.

Many healthcare organizations have complex technology environments, thus making it difficult for healthcare providers and business associates to comply with the HIPAA Security Rule policies and procedures.

Claim of Privacy Infraction Leads To Another Lawsuit For Facebook

February 11th, 2014

Do you share personal information via private Facebook messages? If so, it’s time to consider what you’ve written before you hit the send button. A complaint filed in California claims that:

“Facebook misleads users into believing they have a secure, private mechanism for communication, when in fact, Facebook mines user data, and profits from this data by sharing it with third parties.

The Top 4 Benefits of Upgrading From Windows XP to Windows 7

February 11th, 2014

Many organizations plan to continue running Windows XP after April 8th, 2014. If you’ve neglected to begin the migration process, it’s important to consider the security threats involved with running an unsupported and unpatched operating system. Most cybercriminals are hoarding Windows XP exploits until April, when Windows XP systems will become vulnerable to malware and hacking attacks.

ATM Operators Must Migrate Away from Windows XP As Soon As Possible

February 10th, 2014

Automated teller machines, commonly known as ATMs, are essentially computers. While they’re not traditional PCs, there’s a user interface, a screen, a processor, various hardware, and an operating system. Did you know most financial institutions are running Windows XP on their ATMs? This is a recipe for disaster when it comes to the end of support for Windows XP on April 8th, 2014.

Many banks, credit unions, and other ATM operators are scrambling to upgrade their systems to Windows 7 in order to maintain compliance with industry security standards, however, versions of Windows XP power roughly 95% of the world’s ATMs.

After April 8th, 2014, ATMs running Windows XP will no longer receive regular security patches.

Developing an Enterprise Cloud Strategy? Here’s What You Need to Know

February 7th, 2014

Cloud computing is becoming a popular trend for businesses looking to increase agility and lower costs. There are three categories of cloud computing:

Software as a Service (SaaS)

Software as a Service is a software distribution model in which applications are hosted and managed by the service provider and end users access the applications over a network.