HIPPA Compliance and Google Apps

HIPPA Compliance and Google Apps

Google Apps supports the implementation of an extremely secure HIPPA Compliant environment with minimal implementation and support cost. There's no service in the world that can offer the same level of ongoing security per dollar invested. 

Read More

Google Apps and your privacy

Google Apps and your privacy

Today Google announced that Google Apps for Work has adopted the ISO 27018 cloud privacy standard. ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in a public cloud computing environment. 

Read More

Mobile Device Management in Google Apps

Mobile Device Management in Google Apps

MDM for Android has been available for sometime and now Google has added iOS Sync for Google Apps. iOS Sync for Google Apps helps deliver the 'increased security' needed to protect files, emails, documents and more on an iPhone or iPad. 

Read More

Protecting your Gmail and Google Apps data

Protecting your Gmail and Google Apps data

There's been a great deal of talk this week about the security of the "cloud". iCloud is the current focus of cloud security as the service seems to be the source of leaked, private data of several high profile celebrities. 

We think this is a great time to revisit the security of your Gmail and Google Apps accounts. 

Read More

Is Dropbox for Business secure?

Is Dropbox for Business secure?

Is security the most important attribute of a technology solution? No, it's not. Otherwise no one would be using Microsoft Windows. Security is not a fixed state of being. Security is a constant battle of good guys vs bad guys and it's always in flux. Great security last week could be terrible security this week if an issue was discovered in server software you're running. Cloud computing offers your organization the best security you have ever had access to and it's affordable! 

Read More

Sophisticated Amazon phishing attack making the rounds

Sophisticated Amazon phishing attack making the rounds

Phishing attacks are typically looking for one thing, email addresses. Once an account is compromised, the attacker has full access to the victim's contacts. 

Frequent attacks against Yahoo! and a massive attack against AOL, along with ongoing attacks against individual consumers, has placed A LOT of email addresses in the wrong hands. Do you have a friend who still has an AOL or Yahoo! account? The bad guys probably have your email address too, even if you've been keeping up to date on your security practices. 

While email addresses are often the target, sometimes there are larger stakes. 

Read More

Should I buy a new server?

Should I buy a new server?

It's easier than ever to figure out if you need to buy a new server and, more importantly, how much you should invest. Ask yourself some business school 101 questions. 

What new value is the server creating? If the new server is purchased, what new capabilities will your firm have? What competitive advantage will you gain? How does the new server increase productivity? How will the new server help you beat the pants off the competition? How will your customers benefit from this investment in a plastic and metal box? 

Read More

Why you should never give up your registration or your DNS

Why you should never give up your registration or your DNS

Frequently we receive a frantic call from a client that email is “down.” In 2013, Gmail was up 99.978% of the year. So email is not “down”, the problem is specific to this client. When a Google Apps clients goes “down,” with a 0.022% exception, someone has messed up the domain’s email routing records. These records are part of the Domain Name System, DNS.

Read More

I think my Gmail was hacked?!?

I think my Gmail was hacked?!?

The Attack

It usually starts the same way each time, you get an email from one of your contacts, "Hey, I got this weird email from you?" 

You immediately know you didn't send them anything weird or otherwise. You check your sent items for clues. Sometimes clues are right there, sometimes the bad guys have covered their tracks. What do you do now?

Read More

How Google and Dropbox protect your data.

The EFF has released a report detailing how companies are protecting our data. Google and Dropbox have followed all 5 encryption best practices, check out this infographic to see how others are doing. Regardless if you are a business of 1 or 1,000's - your data deserves to be protected. 

Read More

Securing Dropbox and working with Dropbox security

The Dropbox service is used in 95% of Fortune 500 companies and by 2 million businesses worldwide. Businesses save over 600 million files to Dropbox every week. The challenge for IT teams comes from the fact that most of this use inside of businesses is being done with disjointed and often shared consumer accounts. These consumer accounts run outside the purview of company policy and procedure practices as well as security practices.

 

Read More

Profiles in Excellence: Aspire Business Development

Our Profiles in Excellence posts feature great organizations doing great work. These firms run their operations on Google Apps and other tools from the Google Apps Marketplace. Aspire's products are Focus, Clarity and Momentum which they deliver in Kansas City through a variety of 
services.

Read More