
Tech for Non-technical Leaders: Single Sign On
As the number of applications we log in to every day goes up, so to does the frustration of trying to remember a slew
As the number of applications we log in to every day goes up, so to does the frustration of trying to remember a slew
Abrasively offensive? Humorously inept? Out of touch? Which vision do you think of when you think of the “IT guy”? I’ve had countless conversations in
Cleanup continues for NotPetya Many organizations are still rebuilding their server infrastructure after the June 27th attacks that targeted the Ukraine government and soon spread
UPDATED 6/28/2017 14:20 MDT Organizations across the globe -including some in the U.S.- have been struck by the NotPetya ransomware malware. NotPetya initially attacks via
During the BUILD ’17 conference, Microsoft announced some significant changes to the SharePoint admin center within Office 365. From the homepage, you will notice a
Coordinate meetings, access your work contacts, check your to-dos for the day, and use intelligent tools to manage your inbox from anywhere, anytime, quickly and
In a new twist on the traditional email spear-phishing attack, scammers are now using forms on company websites. The information submitted in the form appears to be
HIPAA, Cybersecurity, and Technology: What 2017 means for Healthcare companies. Healthcare organizations are in the precarious position of balancing patient experience, doctor productivity, security,
Peter Melby and Jesse Armstrong founded Greystone in 2001. Since that time we hit some significant milestones. The first was moving out of Jesse’s apartment
Two weeks ago, there was a record-breaking DDoS (distributed denial of service) attack that utilized 145,000 compromised security cameras and DVR’s to take down the
Duo Security, a secure access platform provider, recently found a significant number of devices in the healthcare industry pose a security risk due to running
Even as security standards continue to improve, hackers are always coming up with new ways to exploit users. Let’s talk about how to protect yourself