Connecting Point Blog

Welcome to the Connecting Point Blog

Blog

Your password may not be secure — update it now

The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letters, numbers, and symbols. However, the NIST has now reversed its stance on good passwords. Here’s why and what they are now recommending.

4 Important details about HIPAA compliance

Getting your practice up to code when it comes to Health Insurance Portability and Accountability Act (HIPAA) regulations can seem challenging upon first glance, but knowing where your IT efforts must be prioritized is the first step. In this article, we’ll zero in on four of the most critical items you must look into to become HIPAA-compliant.

How updated firmware keeps cyberattacks at bay

Your business may have all the latest cybersecurity solutions in place, but if you haven’t updated your computers’ firmware in a while, you may still be at risk of data breaches and other cyberattacks. Here’s how updating firmware can beef up your company’s cyber defenses.

The benefits of BYOD and CYOD

More and more organizations today are seeing the value in implementing bring your own device (BYOD) and choose your own device (CYOD) policies. Aside from increased efficiency and productivity, there are plenty of other benefits that businesses across industries can get from both strategies.

Top website design trends you should use for your business site Improve your customer reach with a well-designed website These website design trends can take your business to the next level

Website design has gone a long way through the years, with many attractive and useful trends becoming fairly ubiquitous and almost “invisible”. Here are some of the newer trends that can help improve brand visibility and customer reach by making website content easy to digest and websites fun to browse.

HIPAA calls for careful social media behavior

Healthcare providers that use social media platforms like Facebook and Twitter can interact with their patients, advertise new services, and communicate urgent announcements. Even though there’s immense potential for social media to improve healthcare, it can also expose patient-specific information when used irresponsibly.

How to strengthen your BYOD security

Many businesses are adopting bring your own device (BYOD) policies as more employees work from home. The problem is, if you’re not careful, BYOD can expose your company to major cybersecurity risks, including the following.

Loss or theft of devices – Employees often bring their personal devices wherever they go.

Save on electricity with these PC tips

When it comes to saving energy, every little effort goes a long way. The more energy-efficient your PC is, the more money you save. In fact, you can save up to $50 a year if you activate your PC’s power-saving feature. Further increase your savings by following these tips:
1. Unplug your computer when not in use
When you’re not using your computer, it’s best to shut it down and unplug it.