Free Tools:

Hacked Email - Check if you have an account that has been compromised in a data breach.

Lastpass - Security starts with strong passwords. Give IT more control and solve employee frustrations when you manage passwords with LastPass.

Signal - Signal messages and calls are always end-to-end encrypted and painstakingly engineered to keep your communication safe. We can't read your messages or see your calls, and no one else can either.

Sophos Home - Business-grade cybersecurity. Now available for home users.

Speed Test - Test your Internet connection bandwidth to locations around the world with this interactive broadband speed test.

Virus Removal Tool - Infected with a virus? Unsure whether your existing antivirus software has detected and removed it? Still having problems and unsure where to turn to next? Sophos Virus Removal Tool can help.


Tips:

3 Tools for Simplifying Your Company’s Email
Managing your company’s email can be a complex endeavor, due to the sheer volume of messages being sent and received, as well as the need to have a way to prioritize which messages are important. It’s safe to say that all organizations can benefit from email management solutions, such as email archiving and spam protection, and multi-factor authentication... Read More

3 Ways Remote Monitoring Helps Businesses
It’s time to face the fact that those times when your technology acts up, you don’t have the time to spare waiting around for the issue to just go away...you need to react. Many small businesses just don’t have the means to maintain an in-house IT resource to solve their problems. What if we can offer you a different solution... Read More

3 Ways To Improve Your Business’ Data Security
Data security, always an important topic, has been made even more urgent by the Equifax data breach and the fact that 143 million users had their personal information stolen after entrusting it (or not) to Equifax. You need to consider what would happen if your business were on the receiving end of a data breach and prepare to handle this truly unpleasant circumstance... Read More

8 Essential Questions to Ask of Your IT Provider
When was the last time that your organization had an unexpected technology expense blast your IT budget out of the sky? Surprise issues that you don’t plan for could potentially derail your budget for months, or even years, depending on the severity of it. Having a clear idea of what your IT service plan covers is a great way to make sure that you don’t get hit by surprise billing... Read More

Data Protection Accountability Checklist
Keeping up with computer security makes good business sense. The modern practice relies heavily on computer systems for daily operation, and downtime equates to lost production. Unless you're on an "all you can eat" IT support plan, downtime also means additional expenses. You need to minimize downtime. You have compliance obligations operating a covered entity subject to HIPAA regulations (there's plenty written on that). Any responsible practice wants to protect its information. Keeping up is a must in the modern practice to prevent downtime, protect data, and meet compliance obligations... Read More

Don't like email encryption? Try Carrier Pigeons
Email is a vulnerable medium, particularly when emails are sent over unsecured, or public, Wi-Fi networks. Even emails sent within a secure company network can be intercepted by other users, including your login credentials. Encryption renders the content of your emails unreadable as they travel from origin to destination, so even if someone intercepts your messages, they can’t interpret the content... Read More

The Cloud: How to Mitigate the Risk Factors
Most practices are either using cloud services or thinking about it. I want to highlight some questions that are rarely talked about but very important to consider. This article may seem anti-cloud because it focuses on potential problems rather than benefits, but that is not the case. Cloud computing is a great option in many situations. My intent is simply to arm you with important facts so you can understand and mitigate any potential risks if you choose a cloud option... Read More

Wall of Shame
This page lists all breaches reported within the last 24 months that are currently under investigation by the Office for Civil Rights... Read More

Your Computer's Infected... What Do You Do Next?
It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that... Read More


InfoGraphics:

Traditional Backup vs Business Continuity


Other Resources:

Dentaltown - Dentaltown is an interactive healthcare community working to connect dentists to their peers, dental service providers, and manufacturers.

Dental Integrators Association - The DIA is a network of leading independent dental technology integration firms from across the country. It was formed to create and deliver a higher standard of quality and care for dental practice technology integration.