Connecting Point Blog

Get the latest company updates, technology news, and expert advice

Blog

Do YOU Know Somebody We Can Help?

Do YOU Know Somebody We Can Help?

Check Out the Newly Updated Connecting Point Referral Program…It’s SIMPLE!
If you bring a lead to Connecting Point, we’ll give you $250.
If that lead turns into a customer, we’ll give you $1,000

Over the last several years, Connecting Point has worked very hard to build an IT services business that provides great value for our customers.

Your password may be poor — update it now

Your password may be poor — update it now

For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why not and how it involves you. The problem The issue isn’t necessarily that […]

How to protect your company mobile devices

How to protect your company mobile devices

While mobile devices cannot equal what desktops and laptops can do, they’re inching pretty close to matching them. That’s why businesses are allowing their employees to use their smartphones and tablets, which help increase productivity and enhance collaboration. But mobile devices have also become the new targets of cybercriminals. Protect your devices with the following […]

It’s time for your business to get SaaS-y

It’s time for your business to get SaaS-y

As technology grows, more solutions are available to help businesses cut costs and improve efficiency. One such solution is software as a service, aka SaaS. To know if this can benefit your business, it’s best to learn what SaaS actually is. Read on for the answers. What is SaaS and what makes it appealing? SaaS […]

Windows virtualization for Mac use

Windows virtualization for Mac use

There are countless reasons to run the Windows operating system (OS) on a Mac computer, but the main one is so you can use apps designed for PC on an Apple machine. However, there are other benefits that make virtualizing Windows on your Mac worth it regardless of your software needs. Configure an entire machine […]

Healthcare IoT: Security risks involved

Healthcare IoT: Security risks involved

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients. Devices that contain a treasure trove of patient data are attractive targets for […]

3 Types of hackers you should know about

3 Types of hackers you should know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history In the […]

Ways to safeguard your IoT devices

Ways to safeguard your IoT devices

Your Internet of Things (IoT) devices — smart TVs, security cameras, smart locks — add a level of convenience to your workplace, but they also make your systems more vulnerable to cyberattacks. That’s because they’re essentially potential entry points for hackers. Here are some ways to secure your IoT devices from a possible cyberattack. Set […]

Six handy Gmail tips for your business

Six handy Gmail tips for your business

Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line. Undo Send We’ve all had […]

Thought Leaders Article: Is your business prepared for a Cyber-Security Attack?

Thought Leaders Article: Is your business prepared for a Cyber-Security Attack?

he reality of our marketplace today is that all businesses must understand the risks/consequences of cybersecurity attacks. Protecting an organization’s data used to be more about recovering from a physical disaster (flood/fire/tornado or internal challenges like malicious behavior/technology failures/end-user errors). And while this process is critical, the technology to prevent and recover from those challenges is better than ever and is more of a standard expectation for business leaders and IT professionals.