Do we still need passwords?

Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the largest data breaches in recent…

5G and what it means for medical practices

faster, more reliable connections For more tips and how-to’s, visit our tech blog 5G is the next step in mobile internet. Similar to how you may already use 4G mobile data, business WiFi, or ethernet cables to get your internet, 5G aims to outclass other methods of internet connection by offering faster, more reliable bandwidth. Not…

Yealink custom ringtones

We need your help to protect your data. For more tips and how-to’s, visit our tech blog If you’re finding the default ringtones on your Yealink phone to be a bit bland, you can spice things up by uploading your own ring tone. According to Yealink, the ring tone file must be “PCMU audio format,…

Fixing HP keyboard BSOD issue

WDF Violation solutions For more tips and how-to’s, visit our tech blog Fixing the WDF_VIOLATION on HP computers https://support.microsoft.com/en-au/help/4468372/hp-devices-may-experience-blue-screen-error-wdf-violation-after-instal To resolve the WDF_Violation blue screen crash you need to rename or delete the HpqKbFiltr.sys driver. The problem is that this conflict causes Windows 10 to crash before you can get into the operating system to…

SSH Primer

Secure Shell clients & connections For more tips and how-to’s, visit our tech blog Secure SHell is a simple but secure way of accessing a computer remotely over the command line. SSH has two parts, a server and a client. The server by default listens on TCP port 22. To use SSH from Windows you’ll…