Vacation auto-replies seem like a great idea. They keep clients in the loop and provide alternate points of contact. But they also provide hackers with opportunity. Learn how this scam targets healthcare practices and other businesses, and how you can protect yourself.
7 Questions NJ Healthcare Practices Should Ask Their IT Provider Every Quarter (But Probably Aren’t)
If you’re only hearing from your IT provider when a system crashes or a contract is up for renewal, it’s time to re-evaluate that relationship. Here are 7 questions you should ask your IT provider every quarter (if they don’t bring it up first).
Out of Office, Out of Luck: What If Your IT Breaks While Everyone’s at the Beach?
Summer is a dangerous time for healthcare technology breakdowns. What will you do when your IT breaks and your IT support is at the beach?
Shadow IT: The Hidden Risks Your Team Might Be Bringing Through the Back Door
Shadow IT is one of the quietest, fastest-growing risks in healthcare practices and other businesses. Well-meaning team members use unapproved apps and tools to do their jobs better. But if IT doesn’t know about them, they can’t protect them. Or your practice.
The Silent Threat Sitting in Your Hallway
To many, cybersecurity means ransomware and phishing scams. Threats that come from the outside. In truth, your own network could put you at risk. Something as simple as your office printer might represent one of the most overlooked threats in your environment.
The “Vacation Confirmation” That Could Infect Your Entire Practice
Phishing scams are showing up everywhere – at home and at work. As summer approaches, a travel phishing scam is becoming popular. Let’s break down how it works, and how you can protect yourself.
“It Won’t Happen to Us” — And Other IT Myths That Could Cost You
You make decisions every day. None of them feel like mistakes – until something breaks. When you’re running a busy healthcare practice, you need things to work. Here are four IT habits that quietly put practices at risk.
The Dark Side Of Chatbots: Who’s Really Listening To Your Conversations?
Chatbots like ChatGPT, Gemini, Microsoft Copilot and the recently released DeepSeek have revolutionized how we interact with technology, offering assistance with almost every task imaginable – from drafting e-mails and generating content to writing your grocery list...
How It All Began
Before founding Advanced Computer Technologies (ACT) in 1999, Frank Riina envisioned a very different future – a career in law enforcement. A series of choices would lead him down a different path. Now, he’s taking down the bad guys, but now he focuses on cybercriminals.
Hackers Might Not Ransom You Anymore – They’ll Just Extort You Instead!
If you thought ransomware was scary, pay attention to the newest threat: Data Extortion. Hackers steal your data and threaten to leak it if you don’t pay. Here’s what you need to know about it.