The Microtime Computers Blog

Follow our blog for industry news and technology advice from our in-house experts.

Blog

Protect your privacy in Windows 10

Since its release in 2015, Windows 10 has gotten a bad rap for supposedly gathering too much personal information from its users. Whether you believe Microsoft’s operating system is invasive or you just want to pull out all the stops to keep your personal information safe, here are some Windows 10 settings you can tweak […]

Social media guidelines to stay HIPAA-compliant

HIPAA was established to protect the privacy of medical providers and their patients. And while there are no specific guidelines when it comes to social media usage in healthcare, every healthcare organization must implement security protocols that adhere to privacy policies. What social media actions violate HIPAA rules? Posting patients’ protected health information on social […]

Security best practices for BYOD policies

Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks. Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, […]

How Workplace Analytics improves your team’s productivity

Microsoft Workplace Analytics is a cloud-based service that allows organizations to assess employee performance using data gathered from Office 365. This enables business leaders to identify inefficiencies in how tasks are carried out, and then come up with a strategy for eliminating these in order to increase productivity. How does Workplace Analytics work? A paid […]

Things you need to know about hosted Exchange

Business email servers such as Microsoft Exchange often need infrastructure investments that may be beyond a small business’s budget. A good way to deal with this issue is by using hosted Exchange services. ​​What is Microsoft Exchange? Microsoft Exchange is a messaging system that offers businesses a number of services, including email, calendaring, task management, […]

Ways to safeguard your company’s data

Some of the most well-known companies in the world, including Sony Pictures, Home Depot, Adobe, and eBay, have been victims of cyberattacks. While major corporations like these are high-profile targets for hackers, small- and medium-sized businesses are not exempt from data breaches. And because it may be difficult or impossible to undo any damage caused […]

The benefits and drawbacks of EHRs

Numerous digital advancements enable healthcare organizations to address several key industry challenges, such as safeguarding medical records and providing better care management for patients. Electronic health records (EHRs), in particular, allow quick access to patient records, helping healthcare organizations diagnose patients more effectively, reduce medical errors, and provide safer care. However, with these valuable benefits […]

What is a Zero-Day Vulnerability?

A zero-day vulnerability (also know as zero-day flaw, zero-day exploit) is at its core, a flaw. It is an exploit in the wild that was previously undiscovered, which exposes a vulnerability in software or hardware. A zero-day vulnerability will often create complicated problems well before anyone realizes there is an issue – a zero-day exploit leaves NO opportunity for detection, at least at first. […]