Law Firms

Incorporate virtual private clouds in a hybrid IT environment

Don’t let the added complexity of VPCs deter you from integrating them with your hybrid cloud. Simply keep these configuration factors in mind to ensure seamless interoperability. With the right configuration, administrators managing a hybrid IT environment can also use virtual private clouds to host workloads. A hybrid cloud enables IT administrators to move workloads…

Read More

HIPAA Tips from the Trenches

Earlier this week, I moderated a panel discussion at an event hosted by the New York chapter of the Health Information and Management Systems Society (HIMSS). The panel was comprised of private sector health information technology and security experts and was tasked with discussing challenges related to the interoperability and security of health information systems.…

Read More

8 Ways to Fight Burnout on IT Teams

Is your team’s morale and well-being at risk? IT leaders share strategies for watching out for the troops – in an era of ever-increasing demands The IT organization has evolved from a back-office department quietly toiling behind the scenes to the department getting requests from every corner of the organization. While the era of digital transformation has…

Read More

Ten Things You Should Know Moving to Office 365

Originally published on TechGenix If you have heard people hailing Office 365 as the “next big thing” or “the software of the future,” chances are you have given some thought about switching over to Microsoft’s popular productivity suite. While it is indeed a revolutionary concept in the world of computing and operating systems, there are…

Read More

CyberThreat Real-time map – you need to see this.

  Kaspersky Lab has launched an interactive cyberthreat map that visualizes cyber security incidents occurring worldwide in real time. The types of threats displayed include malicious objects detected during on-access and on-demand scans, email and web antivirus detections, as well as objects identified by vulnerability and intrusion detection sub-systems.  

Read More

Waah! WannaCry Shifts the Blame Game into High Gear

Every security crisis presents the opportunity to point fingers, but that’s just wasted energy. The criminals are at fault—and we need to work together to stop them. More and more, information security seems to be about finding someone to blame for the latest crisis. The blame game was in full gear within hours of the…

Read More

How to Make Technology Work For You.

In this article celebrating ABA TECHSHOW 2013, we bring you 13 tips from a variety of technology experts—many of whom will be speaking at ABA TECHSHOW! Advice About Ways to Make Technology Work For You. Each of us loves to learn a tip or two about how to do something better. It could be useful…

Read More