Testimonial by: Dr. Frank Kendrick, DMD “In July 2007, I was opening a new dental practice in three days and going all digital. On the test runs for the systems there were operational errors occurring …
Celebrating 20 Years of SolutionStart
October 2020 marked the 20th anniversary of our founding! Over the last 20 years we have grown to become a leading provider of IT services. None of this would be possible without the overwhelming support …
Key Decisions: Things to Consider When Evaluating IT Companies
When evaluating IT companies, there are many things to keep in mind when seeking your ideal technology partner. Below are some concerns you may have along with how SolutionStart addresses them. Do you provide general …
Windows 10 End of Life
On October 14, 2025 Microsoft will no longer provide technical support or security updates for Windows 10. Depending on your computer’s current hardware specifications, it may or may not be possible to upgrade to a …
Phishing Phone Calls
Phishing and spoofed emails, where a malicious sender poses as a close contact or on behalf of one, are quite common these days. Another scam, that has even reached our employees, is phishing or spoofed …
Windows 8 End of Life
As of January 10, 2023, Microsoft no longer provides technical support or security updates for Windows 8.1. Depending on your computer’s current hardware specifications it may or may not be possible to upgrade to a …
How to Keep Your Computer and Network Safe from Harm
With the increasing demand for device integration on computer networks, we’ve seen increased risk of viruses, malware and other malicious attacks. If not proactive with network security, your computer and network are more susceptible to …
How Your Computer’s Components Can Impact Performance
It’s 7 a.m. and you’re the first to arrive at the office. You turn on all the lights, pour yourself a cup of coffee, and power on your computer. As you stare at the screen, …
What is Ransomware?
Ransomware is a type of malicious software designed to prevent or limit users from accessing their system, often by locking the system’s screen or by locking the user’s files unless a ransom is paid. More …
VoIP Phone Service
In recent years, a popular telephony option for business has been Voice over Internet Protocol (VoIP) phone service. It’s an Internet-based telephone service that uses computer networking protocols to transmit calls digitally as opposed to …
How to Recognize & Avoid Phishing Attacks
A phishing attack is a a type of attack often used to steal user data, login credentials, credit card numbers, and more. It usually arrives in your inbox as a fake email that’s designed to …
Virtual Servers
Since introduced, virtual servers have made huge strides of improvement. But what exactly is a virtual server, and why would you consider one over a physical hardware server? For starters, a server is a component …
Cryptography Viruses
The most common way to know you’ve been impacted with a Cryptography Virus (commonly known as “CryptoLocker”) is a pop-up on your computer screen. It warns you that your data has been encrypted, and informs …
What is a Server? Why Do You Need One?
The true definition of a server is “a computer or computer program that manages access to a centralized resource or service in a network.” The server controls who, what and when data is accessed from …
Windows 7 (and Server 2008 R2) End of Life
Windows 7 is currently the most popular release of Windows, although Windows 10 is making serious inroads, especially in the consumer segment of the market. Note that the following information is identical for Windows Server …
Mecklenburg County Government’s Ransomware Attack
Did you hear about last year’s ransomware attack on the government data servers of Mecklenburg County in North Carolina? Article Source: http://www.charlotteobserver.com/news/politics-government/article189428824.html A foreign-based hacker gained access to at least one government employee’s computer network …
Computer Viruses
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Computer viruses are often spread by attachments in email messages or …
Cedars-Sinai Breach Affects 33,000
Cedars-Sinai Health System in Los Angeles says approximately 33,000 patients were affected by a data breach involving the theft of an unencrypted laptop computer from an employee’s home. The laptop, which the employee used for …
Reminder: Update Your “Grandfathered” HIPAA Business Associate Agreements
ARTICLE BY: Emily M. Hord McBrayer, McGinnis, Leslie and Kirkland, PLLC In January 2013, the Department of Health and Human Services (“HHS”) published its Final Rule, which significantly increased the privacy and security responsibilities for the …
Windows XP End of Life
Effective April 8th, 2014 Microsoft will no longer support XP and Office 2003 and effective July 7, 2015 Windows Server 2003. How does this affect your practice? According to HIPAA Security Rule section 164.308(a)(5)(ii)(B), organizations …
- Page 1 of 2
- 1
- 2