Blog

21 Questions Your IT Consultant Should Be Able To Say “Yes” To

21 Questions Your IT Consultant Should Be Able To Say “Yes” To

     Choosing a computer support company isn’t easy. There is no shortage of horror stories about incompetent computer repair “gurus” bungling jobs and causing MORE problems as a result of their loose morals or gross incompetence. I’m sure if you talk to your own friends and colleagues you will get an earful of the unfortunate experiences they have encountered in this area.

Leave no room for hackers to operate

Leave no room for hackers to operate

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy.

How to make social media marketing work for you

How to make social media marketing work for you

Regardless of your company’s size, social media marketing is a valuable tool you can’t afford to ignore, especially if your business is brand new to the marketing world. Here are some tips you can take away to start making some noise in the social media stratosphere.

How to Create the Best Passwords: 2-Tiered Approach for Password Security and Data Protection

How to Create the Best Passwords: 2-Tiered Approach for Password Security and Data Protection

Passwords are a touchy subject.  Everyone knows they need to be stronger but what does a good password policy look like?  What is a good password?  How often should I change them?  Do I need separate passwords for everything?  Where do I store all those passwords?
2 Tips for Password Security and Insuring Your Private Data is Safe
Maybe it would be good to start at the beginning.

Best new features in the updated Gmail

Best new features in the updated Gmail

Aside from a new look, Google introduced substantial improvements to Gmail, including functions that let you enable confidential mode, snooze emails, unsubscribe faster, and enjoy greater protection from spam. Here are the most notable ones.

Confidential Mode

This feature lets you set an expiration date for your email after which it self-destructs.

Celebrating Mother’s Day with DPC Technology

Celebrating Mother’s Day with DPC Technology

Happy Mother's Day to all the moms on our DPC Technology Team!
Wishing you, all our clients and vendor partners a Happy Mother's Day.
Catherine

 

 

 

 

 

 

 

 

 

 

 

 

 

Catherine has been with the DPC team for 6 years! Her experience includes procurement, accounting, marketing and service coordination.

Social Media and HIPAA Compliance

Social Media and HIPAA Compliance

Before Social Media platforms like Facebook went live, HIPAA was established to protect the privacy of medical providers and their patients. And although there are no specific rules for Social Media use, every healthcare organization must implement security protocols that adhere to privacy policies.

What is theft of service in VoIP?

What is theft of service in VoIP?

Despite often going undetected, theft of service is the most common type of fraud for phone systems that use the internet to make calls. How does it really affect an organization’s VoIP network and what are the ways that businesses can prevent or minimize the risk of this type of fraud? Let’s take a closer look.

Lucky Enough to Avoid A Cyber Attack?

Lucky Enough to Avoid A Cyber Attack?

Just Because You’ve Been LUCKY Enough To Avoid A Cyber-Attack Doesn’t Mean You’re Not At Risk
Free Cyber-Security Audit Will Reveal Where Your Computer Network Is Exposed And How To Protect Your Practice Now.
Imagine walking into your office one morning to discover your computer network was breached by a hacker, exposing not only YOUR practice's data, but also all of your patient records and private communications.