Entries by CTSI

Don’t overlook your monitor

used with permission from HP Technology at Work For some, the term “tech innovation” brings to mind new PC form factors and unique printing methods. But high-tech innovation doesn’t stop at hardware—it also includes displays. In recent years, display innovation has produced heightened resolution, connectivity, functionality, and ROI. Displays are sleek, stylish, more robust, and […]

WannaCry worries? Update now.

used with permission from the FTC by Nat Wood You’ve probably heard about the ransomware attack affecting organizations’ computer systems around the world. Here’s the best thing your company can do to avoid it: Update your operating system and other software. Now. The ransomware, known as WannaCry or WannaCrypt, locks you out of your systems […]

WannaCry Ransomware Attack Hits Organizations Globally

On Friday, May 12th, tens of thousands of ransomware attacks struck more than 74 countries, including the United States, within hours. This unprecedented ransomware attack crippled a number of UK hospitals, where staff were unable to access patient records and appointments because their files were taken hostage. The ransomware infection has continued spreading, though by […]

6 steps to securing your email

used with permission from HP Technology at Work Is your company’s email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an entire company’s financial information and gain access to funds and personal information. Email is a […]

Why you need to get serious about Cybersecurity

used with permission from HP Technology at Work More than half of small and midsize businesses in the U.S. have suffered a cyber attack in the past year—but despite this frightening reality, very few businesses are making IT security a priority this year. That’s a big mistake, because small business owners are at a greater […]

How hospitals are keeping patient data secure

used with permission from HP Technology at Work Given the wealth of sensitive personal data healthcare organizations process and store, it’s no surprise that hospitals, medical offices, and other healthcare systems are prime targets for cybercrime. In 2014, an estimated 85 percent of large healthcare organizations faced a data breach, and one in five of […]

Breaking down silos-tools for better communication and collaboration

used with permission from Microsoft Office Blogs Today’s workforce is spread across more locations than ever before: 37 percent of workers telecommuted to some degree in 2015. Companies occupy multiple locations, and business partnerships span the globe. In addition to physical separation, teams in the same company are separated by projects and departments. These barriers […]