Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that…
Search Results for:
What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and then there are the fearmongering headlines in the media.…
Phones and Internet Get online and stay connected with Health IT Upgrade your phone system Health IT can supply you world class Yealink phones at much better pricing than traditional telephony.Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs…
Internet in tubes For more tips and how-to’s, visit our tech blog Virtual Private Networks (VPNs) have been talked about a lot lately whenever the topic of internet security comes up. Put simply, a VPN is a private connection between you and a website that can’t be spied on or…
Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the…
A community of 5.3 billion For more tips and how-to’s, visit our tech blog This webpage takes up about 1 megabyte of space on our server.For context, that’s only about 1/8000th of a USB thumbdrive you might have in your pocket. You could save this page a thousand times before reaching…
Customise your Yealink phone For more tips and how-to’s, visit our tech blog If you’re finding the default ringtones on your Yealink phone to be a bit bland, you can spice things up by uploading your own custom ringtone.According to Yealink, the ring tone file must be “PCMU audio format,…
WDF Violation solutions For more tips and how-to’s, visit our tech blog This post is 5 years old. Keep in mind IT is a business of moving targets, and this information may be outdated. Contact Us for more info. Fixing the WDF_VIOLATION on HP computershttps://support.microsoft.com/en-au/help/4468372/hp-devices-may-experience-blue-screen-error-wdf-violation-after-instalTo resolve the WDF_Violation blue screen…
Locate large attachments With one script For more tips and how-to’s, visit our tech blog This post is 5 years old. Keep in mind IT is a business of moving targets, and this information may be outdated. Contact Us for more info. Documents over 50MB are just not cool. They…
If you have a complaint please put it in writing and email it to complaint. Please include as a minimum:Your contact detailsSite nameTicket number if there is an existing ticketYour understanding of the problemThis will generate a Priority 1 job in our system which will be dealt with as soon as…