Our Blog

Category:

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now Managing the IT infrastructure of an organization is never a one-person job. As such, businesses develop IT teams to handle all IT services. However, more and more companies, especially (small-to-medium-sized businesses) SM...?

Read More

How to Select a VoIP or Phone Service Provider

Picking VoIP or phone service vendors for your business can be a tedious exercise. There are dozens of options out there, local and national providers, and reviewing costs against pages and pages of terms of service can be a drawn out process. We can all agree, fine print is a foe of clarity and pro...?

Read More

AlphaRidge Acquires Lynx Managed IT Services Business

ALPHARIDGE ACQUIRES LYNX MANGAGED IT SERVICES BUSINESS Lynx Focuses On Security As AlphaRidge Acquires Managed IT Services   FOR IMMEDIATE RELEASE Tuesday July 31, 2018 CONTACT: Krista Kaszycki krista@alpharidge.com   Doug Yarabinetz dyarabinetz@lynxtp.com   New York, NY, ...?

Read More

5 Tips for Remaining HIPAA Compliant

As Amazon’s Alexa becomes increasingly concerned with HIPAA (Health Insurance Portability and Accountability Act) compliance, we thought we’d share 5 quick tips to help keep individual physician practices HIPAA compliant.   Backup & Failover Having a backup of your ...?

Read More

When Should I Replace My Firewall?

We’ve worked with a lot of firewalls here at AlphaRidge. Every now and again we encounter a real dinosaur, firewalls as old and clunky as a cassette player (okay, maybe not that old but you get the picture). While Apple might push you on a yearly upgrade, not all hardware has nor should it hav...?

Read More

Phishing Trip Canceled – How to Identify & Avoid Phishing Attempts

Every single day thousands of phishing attempts hit inboxes around the world. Many of them will be far less obvious than others. But what is phishing, and why is it so harmful? What are some techniques to help you identify and avoid phishing attacks? Phishing is the attempt to access sensitive info...?

Read More
Featured posts

Tips for Digital Transformation

Drive impact at your organization with the latest on IT leadership

View all post

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now

What Is Co-Managed IT Services, And Why You Should Be Thinking About It Now Managing the IT infrastructure of an organization is never a one-person job. As such, businesses develop IT teams to handle all IT services. However, more and more companies, especially (small-to-medium-sized businesses) SM...?

Read More

Best Practices for Managing Software Development Projects

Recent studies have suggested that as much as 85% of software development projects fail. Often an organization will bring on a software developer without an in-depth consideration of the resources – both financial and otherwise – that software development projects demand. Alpha...?

Read More

Best Practices for Managing Software Development Projects

Recent studies have suggested that as much as 85% of software development projects fail. Often an organization will bring on a software developer without an in-depth consideration of the resources – both financial and otherwise – that software development projects demand. Alpha...?

Read More

Why You Should Think Twice About That Free Software

College textbooks are notoriously expensive. Every semester university students near and far scramble for a way to avoid paying for their required reading, even if it means spending 15 hours a semester making copies or trading textbooks in private Facebook groups. Encountering this behavior on a cam...?

Read More

How Law Firms Can Make Cybersecurity a Priority in 2018

Law firms, an obvious target for cybercriminals, have servers holding sensitive data like business’ IP, bank information, medical records, and other personal information. What can they do to make cybersecurity a priority in 2018?   Law firms bear an ethical obligation to keep client dat...?

Read More

7 Office Cybersecurity Tips

7 Cybersecurity tips for the workplace… Employees can be both your greatest asset and your greatest vulnerability. Having an iron-clad security protocol in place will help decrease how susceptible your business is to an cyber-incident.   Make Cyber Awareness a Part of Onboarding Star...?

Read More

AlphaRidge’s Discussion Series Continues… Sign Up for April 10th!

At AlphaRidge, we’re really passionate about community, education, outreach, and support (hey, it’s what we do!). Last year we started hosting a series of events designed with that in mind. Meeting with providers, practice managers, and others at Discussion Series:  Healthcare ...?

Read More
Featured posts

Cybersecurity & Compliance

Champion secure and compliant growth and innovation with advice from our expert leaders

View all post

Top 10 Healthcare Security Breaches of 2015

Security breaches in the healthcare community have endangered the private information of over 1/3 of the American population. They've affected hundreds of New York's medical practices and cost the practitioners tens of thousands of dollars.  Here are a few of the most memorable cas...?

Read More

Your Cloud: Identity and Access Management

Does your cloud solution have a thorough identification and authorization framework? Your cloud solution is the backbone of your organization’s functionality. It involves many resources, belonging to many users, interacting in an intricate manner. It’s critical that you ensure that the ...?

Read More

Stay on top of your it!

Get our helpful IT tips and tricks delivered right to your email PLUS you'll be the first to hear about our events and live webinars!