Jan 24, 20232 minProtecting Your Digital Privacy: Tips, Tricks and Best PracticesDigital privacy is a critical issue in today's digital age, as more and more of our personal information is being shared, stored, and...
Dec 9, 20222 minEnsuring Reliability and Security in Senior Living Networks: Choosing the Right EquipmentWhen selecting enterprise grade network equipment for a senior living facility, it is important to consider compliance with HIPAA and...
Dec 7, 20222 minUnleashing the Power of the Cloud with Windows 365 PCWindows 365 Cloud PC is a new offering from Microsoft that allows users to access a virtual version of the Windows operating system from...
Dec 5, 20222 minInternet of Things (IoT) & Senior LivingThe internet of things (IoT) is a system of interconnected devices, machines, objects, animals or people that are able to share data and...
Oct 25, 20222 minNew CISA Warning about Ransomware for Healthcare - 10/2022An international cybercrime gang known as the Daixin Team has been targeting healthcare providers in the U.S., according to a joint...
Oct 13, 20222 minWhat is “The Cloud” Part 2: Public CloudThe public cloud is a type of computing where resources, such as applications and data, are delivered over the internet. Public clouds...
Oct 6, 20222 minWhat is Next Gen Anti VirusThe next generation of anti virus software is here, and it's more powerful than ever. With new features and a more robust engine, next...
Oct 4, 20222 minWhy You Need Endpoint Encryption in HealthcareAs the use of electronic health records (EHRs) has become more widespread, the need for endpoint encryption in senior living facilities...
Sep 29, 20222 minHelp Desk as an Entry Level IT JobThe information technology (IT) field is growing rapidly and offers many opportunities for those who are interested in pursuing a career...
Sep 26, 20221 minWhat’s This Tech Blog About?Welcome to Steve on Tech! Welcome to my blog! This is a space where I share my thoughts and experiences on a variety of technology and...
Sep 24, 20221 minData Mining in HealthcareData mining is the process of extracting valuable information from large data sets. Security is the practice of protecting information...
Sep 23, 20222 minImportance of Conditional AccessThe cloud has transformed the way businesses operate and has created new opportunities for security providers. The rise of Office 365 and...