top of page
Jan 24, 20232 min read
Protecting Your Digital Privacy: Tips, Tricks and Best Practices
Digital privacy is a critical issue in today's digital age, as more and more of our personal information is being shared, stored, and...
Dec 9, 20222 min read
Ensuring Reliability and Security in Senior Living Networks: Choosing the Right Equipment
When selecting enterprise grade network equipment for a senior living facility, it is important to consider compliance with HIPAA and...
Dec 7, 20222 min read
Unleashing the Power of the Cloud with Windows 365 PC
Windows 365 Cloud PC is a new offering from Microsoft that allows users to access a virtual version of the Windows operating system from...
Dec 5, 20222 min read
Internet of Things (IoT) & Senior Living
The internet of things (IoT) is a system of interconnected devices, machines, objects, animals or people that are able to share data and...
Oct 25, 20222 min read
New CISA Warning about Ransomware for Healthcare - 10/2022
An international cybercrime gang known as the Daixin Team has been targeting healthcare providers in the U.S., according to a joint...
Oct 13, 20222 min read
What is “The Cloud” Part 2: Public Cloud
The public cloud is a type of computing where resources, such as applications and data, are delivered over the internet. Public clouds...
Oct 6, 20222 min read
What is Next Gen Anti Virus
The next generation of anti virus software is here, and it's more powerful than ever. With new features and a more robust engine, next...
Oct 4, 20222 min read
Why You Need Endpoint Encryption in Healthcare
As the use of electronic health records (EHRs) has become more widespread, the need for endpoint encryption in senior living facilities...
Sep 29, 20222 min read
Help Desk as an Entry Level IT Job
The information technology (IT) field is growing rapidly and offers many opportunities for those who are interested in pursuing a career...
Sep 26, 20221 min read
What’s This Tech Blog About?
Welcome to Steve on Tech! Welcome to my blog! This is a space where I share my thoughts and experiences on a variety of technology and...
Sep 24, 20221 min read
Data Mining in Healthcare
Data mining is the process of extracting valuable information from large data sets. Security is the practice of protecting information...
Sep 23, 20222 min read
Importance of Conditional Access
The cloud has transformed the way businesses operate and has created new opportunities for security providers. The rise of Office 365 and...
bottom of page