Blog

Think your password is secure? Think again

The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letters, numbers, and symbols. However, the NIST has now reversed its stance on good passwords. Here’s why and what they are now recommending.

4 Important factors about HIPAA and your IT

Getting your practice up to code when it comes to Health Insurance Portability and Accountability Act (HIPAA) regulations can seem challenging upon first glance, but knowing where your IT efforts must be prioritized is the first step. In this article, we’ll zero in on four of the most critical items you must look into to become HIPAA-compliant.

Why call recording is advantageous for businesses

If you own and operate a small- or medium-sized business that relies on positive word of mouth, you probably need to make sure the quality of your customer service is top-notch. It definitely pays to have excellent products and/or services in the first place, but it wouldn’t hurt to leverage other tools at your disposal.

What are BYOD and CYOD?

More and more organizations today are seeing the value in implementing bring your own device (BYOD) and choose your own device (CYOD) policies. Aside from increased efficiency and productivity, there are plenty of other benefits that businesses across industries can get from both strategies.