Apple’s iPad has become one of the most popular devices used to read eBooks. For avid readers, the iPad offers an extensive variety of eBook reader apps to suit your reading style preference. Here’s the top 5 eBook reader apps available on the App Store: 1.     iBooks iBooks comes pre-installed on the iPad, iPod Touch,

Apple just released a patch for iOS 7 that includes a security fix for Secure Socket Layer (SSL) connection verification. If your phone or iPad has been upgraded to iOS 7, install this update now. Without it your data may be at risk.  The update prevents someone from taking your phone and disabling Apple’s “Find

Urgent Deadline Approaching Security technicians at Microsoft have compiled intelligence from a billion user systems worldwide in an effort to establish an important new metric called The Encounter Rate. The Encounter Rate measures how many Microsoft systems worldwide are receiving messages that contain Malware. From this metric Microsoft has been able to determine how many

Electronic signature methods are becoming increasingly popular. While e-signing services vary from provider to provider, all services allow users to upload documents to an online service and apply special annotations where signatures are necessary. Then, the user sends this file to the recipient who signs the document and sends it back. Are Electronic Signatures Legal?

Multi-factor authentication has been available for administrative roles since June 2013, however, Microsoft recently added multi-factor authentication for all users of its Office 365 suite. “The multifactor authentication increases the security of user logins for cloud services above and beyond just a password,” Microsoft said. The company will also bring multi-factor authentication to Office 2013

When the iPad was released it was used as a content consumption device, suitable for playing games, surfing the web, or watching videos. Now, many attorneys are using the iPad as a productivity tool to take notes, or to review and store case files. However, when using an iPad, data security must be considered. When

Many organizations plan to continue running Windows XP after April 8th, 2014. If you’ve neglected to begin the migration process, it’s important to consider the security threats involved with running an unsupported and unpatched operating system. Most cybercriminals are hoarding Windows XP exploits until April, when Windows XP systems will become vulnerable to malware and

Cloud computing is becoming a popular trend for businesses looking to increase agility and lower costs. There are three categories of cloud computing: Software as a Service (SaaS) Software as a Service is a software distribution model in which applications are hosted and managed by the service provider and end users access the applications over

Dropbox is one of the most popular cloud applications for law firms. As a legal professional, you must consider the ethical obligation to maintain client confidentiality while using the cloud. This means employing reasonable measures to ensure security of data stored in the free, multi-user sync app. Do you enable security features whenever possible? If

As a business owner, the decision between outsourcing vs. in-house IT support can be difficult and time consuming. Ultimately, you want to choose the most effective way to support your IT systems and end-users. But how do you know which option is the most effective for your business? Let’s start by defining the word “outsourcing,”