While cloud based team collaboration tools are rising in popularity, good ole’ fashioned email is still the primary tool for communication within many organizations. It’s familiar and easily shared among customers, vendors, and work teams. Because of its reach, we take the usual steps to keep our email safe and accessible, like implementing backups and archiving old emails so that we can restore deleted or lost messages or access old ones. But, there’s an extra step that many of us miss in our efforts to safeguard company email contents: email journaling.Read More
As you consider where to give your donations today, we'd encourage you to think about donating to some of our nonprofit friends, who we know are doing good work in our community and around the world. Click below to learn more about them!Read More
An internal IT department’s primary responsibility is to make your whole operation run more efficiently. So that means consistently making sure that your company’s systems are up to date, secure, and efficient.
Affinity believes that you should expect the same thing from your outsourced IT provider (sometimes called a ‘Managed Services Provider’ or MSP). But how can you tell if your provider is truly proactive or just telling you want you want to hear? Here are 4 questions to ask.Read More
It’s that time of year again! Time to make your holiday shopping lists and find the best deals on gifts for friends and family. And if you’re shopping for kids and teens, there’s a good chance that a number of those gifts involve technology. From smartphones and tablets to gaming systems, kids and teens love devices that keep them connected.
As fun as these devices are, they carry hidden dangers, such as potential exposure to pornography, sexting, and cyberbullying. So, before you hit the stores on Black Friday, gift yourself peace of mind by putting healthy guardrails around the technology you give your kids this holiday season.Read More
Many practices don’t stop to consider what information, exactly, constitutes EPHI. They assume that EPHI simply means medical records—charts, notes, and prescription information related to patient care. The problem is that, while these kinds of information certainly are EPHI, HIPAA’s definition is much broader.Read More
We're thrilled to announce our sponsorship of "The Bike Thing," an annual bike ride fundraiser for our friends at Daystar Counseling Ministries, a nonprofit organization providing counseling to kids and their families in the Middle Tennessee Area. Daystar provides these services on a sliding scale, allowing them to help kids in need.Read More
National Cyber Security Awareness Month is a great time to take a look at the security of your company’s data. To help you do that, we’ve created a 10-question self-assessment that companies can use to determine their level of data security. So, grab a pen and pad and jot down yes or no to each of the questions below, then tell us how you did:Read More
October is National Cyber Security Awareness Month! It’s a great time for all of us to get serious about cyber security both at work and in our personal lives.
With all that we do online—from social media to shopping and banking—cyber security has become as important for individuals as it is for businesses. The good news is that awareness is half the battle.Read More
Many of the precautions businesses need to protect their data involve sophisticated, high-tech safeguards, such as antivirus software or virtual disaster recovery solutions. While these are important, it’s also critical that businesses don’t forget the actual, physical security of the devices and infrastructure that store and transmit their data. While not as sexy as high-tech safeguards, these low-tech precautions are essential components of any business’s cybersecurity strategy.Read More
Affinity Technology Partners, together with Constangy, Brooks, Smith and Prophete LLP and the Nashville Area Chamber of Commerce’s Business Studio, are looking to change the perception about cyber security and educate small business owners on best practices to protect their businesses. The organizations are hosting two seminars entitled Small Business, BIG Target: How to Protect Your Company from Cyber Attacks, as part of National Cyber Security Awareness Month (NCSAM) on Oct. 18th and Oct. 27th.Read More
Yesterday, Apple released its latest operating system (OS): macOS Sierra. Current Mac users will be able to install an upgrade to High Sierra for free, which many will want to do in order to take advantage of some of the great new features it offers.
As helpful or as fun as the new features may be, though, we strongly recommend that users wait at least 3 to 6 months to upgrade to High Sierra, especially if they use their computers for business. Why, you ask, would a technology company be giving this advice? The short answer is that experience has taught us that upgrading to a new OS too soon can affect users' productivity. There are three reasons why this is the case.Read More
Here we go again. We’ve previously written about the dangers of anonymous social media apps targeted at younger users, such as Yik Yak and After School. Regardless of their developers’ intentions, these apps have earned a reputation for facilitating cyberbullying. And today we add Sarahah to our growing list of app alerts for parents.Read More
Phishing is a type of cyber attack that uses fraudulent means to trick people into giving up sensitive information, from credit card and social security numbers to confidential business data. Unlike with other types of cyberattacks, there are limited technical means of combatting them. While spam filters will help weed out some phishing emails, the best and most effective way to combat phishing attacks is to raise awareness among users.Read More
To what extent does your business rely on a high-speed internet connection? For most of our clients, a fast, reliable connection is ether extremely important or vitally important to their business operations. Almost no one can afford the service slowdowns, let alone outages, that happen far too often even with business-grade service offerings from the major ISPs.Read More
As summer break comes to an end, both parents and kids alike take advantage of back to school sales and tax-free weekends to meet their technology needs for the upcoming school year. For kids, that translates into new tech devices to learn, have fun, and communicate with friends.
But the risks associated with technology—cyberbullying, sexting, exposure to pornography—are real and rampant. With careful planning, parent-child communication, and the right tools, however, parents can put guardrails around their kids and teens’ digital experience.Read More
This summer has been great for Affinity. Because of our growth, we’re excited to announce that we have both added to and promoted from within our team! Kevin Foster joins us as our newest Systems Administrator. Jeremy McNutt has been promoted to Project Manager and Systems Administrator. These personnel changes reflect our continued commitment to providing the best technology service and client experience possible.Read More
Outsourcing IT to a managed services provider (MSP) is becoming a common practice for small and mid-sized businesses. But for many of those companies, the extent of that “outsourced IT” function is support services. Seeking a help desk, they want to be sure that someone is available to address technical issues as they encounter them.Read More