Healthcare software: a healthy development

Some healthcare companies see HIPAA and other compliance regulations as a bane to their business, mainly because of the lengthy and complicated requirements. Poring over authorities’ regulations and ensuring that all areas of operations remain compliant call for a high level of expertise, something that small- and medium-sized businesses may lack.

Russian hackers target Mac OS X users

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced malware for Macs and iOS backups.

New smart search engine for G Suite users

The newest tool launched for business customers is Google Cloud Search, which allows users to search across G Suite products such as Drive, Gmail, Sites, Calendar, Docs, Contacts and more with ease and efficiency. It was previously known as Springboard and was compared to something like Google Now for enterprise workers.

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise.

The new face of e-marketing: IG stories

Scroll, double-tap, repeat, might have been the original Instagram-ing routine, but not anymore. After partnering with global advertising giants, IG is introducing its latest feature: Stories. With it, you can share short videos, or even personally decorated snapshots of your daily life.