Catch Sean Wright's 7/14/15 Workshop on Cybersecurity at the Pathway Women's Business Center!

On 7/14 from 8:30 to 10:00 a.m., Sean Wright, 3n1's President & CEO, will be giving a workshop titled "Cybersecurity: The Risks and What You Can Do About Them" hosted by the Pathway Women's Business Center. Joining Sean will be Brian Drury, Commercial Producer at Geny Insurance Agency. Together, Sean and Brian will talk through both high and low-tech ways business owners can protect themselves against threats to cybersecurity, such as hacks and data breaches.

Read More

Financial Professionals: 5 Questions to Ask When Performing a Technology Risk Assessment

As a financial services professional, you've probably heard the term " technology risk assessment" before. Depending on the nature of your work, you may actually be required (or strongly encouraged) to perform one by regulatory rules, such as GLBA or FINRA regulations (see FINRA's recent 'Report on Cybersecurity Practices'). 

Read More

Warning for Mac Users: Do Not Install the Latest Update for Office For Mac 2011

Under normal circumstances, we recommend that you install software patches and updates (software upgrades are a different story) fairly close to when they become available. The reason for this is that most updates and patches help fix bugs and mitigate security vulnerabilities that have been discovered in the software.

Read More

Great News For Nashville: Peace Communications, 365 Data Centers, and Dev Digital Open the Nashville Internet Exchange

Because of our partner Peace Communications, as well as 365 Data Centers and DevDigital, Nashville now has its own internet exchange! All the tech people in the crowd (including us!) just cheered. But some folks out there may be scratching their heads. If that's you, not to worry. Read on to find out why the new Nashville Internet Exchange is a big deal for all of us, techies and non-techies alike.

Read More

4 Ways to Protect Data on Employee Mobile Devices for BYOD and Beyond

For businesses, mobile technology means productive employees who can work in more places and collaborate in new ways. But greater mobility means greater risk of device and data theft and introduces complications regarding the divide between personal and company-owned data, especially when companies have a BYOD (bring your own device) policy.

Read More

Why More Criminals Are Targeting Medical Records and What Small and Mid-Sized Practices Can Do About It

As if folks in the healthcare industry didn't have enough to worry about, it's becoming apparent that medical records are increasingly hot items on the black market. As a result, cyberattacks on healthcare organizations and insurance companies, as evidenced by the recent breach of 78.8 million records from insurance giant Anthem, are on the rise.

Read More

Six Benefits of a Business-Class Backup Strategy, And Three Steps to Making Them Yours

Your business is probably backing up its data to some degree, but do you have an actual, business-class backup strategy? Such a strategy includes a comprehensive approach toward making sure the proper data is backed up, stored in multiple places, and available for an efficient restore in the event of a disaster. A backup strategy is not just another operating cost; it's an investment in two related and ever more crucial asset for your success: your data, and your uptime.

Read More

High Points From Microsoft's Windows 10 Event

In what has become standard operating procedure for major technology vendors, Microsoft held an event yesterday to announce its next generation of products. Leading the pack, of course, was Windows 10, the new operating system that will be released later this year. But there were other intriguing announcements as well. You can view a webcast of all 2 hours and 15 minutes of the keynote here. Or, if brevity is more your thing, read on below for a brief overview of what to look for from Microsoft this year

Read More

What Intel's 5th Generation Processors Mean for You

Most people don't really think about their devices' processors, the increasingly tiny chips that do all of the actual "computing" behind the work they do on their computers, or the apps they use on their smartphones and tablets. And that's why Intel's new 5th generation Core processors will probably fly under the radar for most users.

Read More