Summer is upon us; our mood changes and we begin thinking about playing hooky from work. That’s okay, indulge yourself a little; you’ve earned it. Whether you are going on a trip, or just swinging the golf clubs for an afternoon, we will be here to take care of business. To assure that you have… Read More


A somewhat newer buzzword being used is “Silo-mentality”. The silo is that pattern we see when each department within a company operates as a stand-alone unit. Often each department has their own goals and boundaries, sees the company only from their perspective. This territorial attitude makes it difficult for employees to understand your customer’s experience with your… Read More


Bitcoin is being described as cyber money, virtual currency and cryptocurrency. It is a method of using technology to speed up financial transactions and reporting. Transactions are made with no middle men – meaning, no banks – and no transaction fees! The system works without a central repository or single administrator, they are not tied… Read More


What? EMV Card?? EMV (the original name for this technology) stands for “Europay, MasterCard and Visa” (the three companies that developed this card with the chip). It is a global standard for cards equipped with computer chips and the technology used to authenticate chip-card transactions. These cards have a small metallic square containing an integrated circuit (computer… Read More


It probably began in the early 1970’s with the gas shortage – when we learned to pump our own gas – “for our convenience”. Today we do SO much more ourselves from self-service checkouts at stores to making appointments online. We are always told it is for our convenience – and perhaps for a growing majority it truly… Read More


Tis the season of organization! For the past month, store ads have been touting racks, bins, boxes and software that will help us eliminate clutter and accomplish more – rather than spending time looking for things. We know it is not always easy to make sure things stay organized. Finding information easily is one reason we suggest… Read More


Every once in a while we get a call that doesn’t quite fit the protocol for your account profile. You have given us the circumstances in which we are to reach out to you, either by phone, text or e-mail, to deliver a message from a caller. You may have very explicit directions regarding when… Read More


IoT or the “Internet of Things”, has become part of our lexicon. It is all about connectivity -as our devices and appliances and all our “things” have learned to communicate. Most of these “things” are synchronized through sensors and machines. The IoT functions through cloud-based applications and interprets and transmits the data coming from a… Read More


T Ransomware Attacks Increasing here has been a steady climb in internet piracy over the past decade, and ransomware – barely heard of a year ago is now a serious threat. Here is the way it works – you click on an on-line ad or e-mail attachment and instantly malware attacks and blocks your files.… Read More


Encryption is the process of encoding a message or information so that only authorized parties can read it. In our industry we handle Personal Health Information (PHI) which is protected under the HIPAA-HITECH laws, and also credit card information. We are required to protect the messages we send to be delivered via the internet (texting,… Read More