Technology Advisor Blog



Ann Westerheim

Recent Posts

Meaningful Use Requirements for Electronic Health Records

Posted by Ann Westerheim on 3/2/11 11:39 AM

As part of the American Recovery and Reinvestment act of 2009, the federal government has created substantial financial incentives for medical practices to implement Electronic Health Records (EHRs).  The Medicare and Medicaid EHR incentive programs offer financial reimbursements to eligible professionals, hospitals, and critical access hospitals:

Read More

Tags: electronic health record, american recovery and reinvestment act





Is your password 123456? Time to increase your security!

Posted by Ann Westerheim on 2/17/11 9:00 AM

Well over a year ago there was a major security breach at a site called RockYou.com.   One of the interesting outcomes is that the breach offered the opportunity to analyze password behaviors since over 32 million passwords were revealed.

Read More

Tags: Security, password, 123456, popular passwords





Tech Time Saver - Keybreeze

Posted by Ann Westerheim on 2/7/11 12:53 PM

Here's a cool tech tool we recommend for saving time on your computer - Keybreeze.  Keybreeze is basically a way to create short cuts to access files, applications, and web sites.

Read More

Tags: computer time saver, small business technology advice.





Cool Tech Tool - Join.me for Instant Meetings on-line

Posted by Ann Westerheim on 2/4/11 1:42 PM

Join.me is a great new application from the folks at LogMeIn for screen sharing.  If you're working on a project and you need to collaborate on a document, or if you want to do a presentation over the web, this is a VERY easy to use product.  The free version has a lot of features and its probably all you need to get started.

Read More

Tags: join.me, Internet meeting, file sharing





Small Business Productivity/Security Recommendation - RoboForm

Posted by Ann Westerheim on 2/2/11 9:55 AM

With so many business and personal activities on-line these days, it's impossible to remember all the passwords.  We've all been trained to use "strong" passwords (6 characters or more, not a word in the dictionary, numbers & symbols), but remembering them is a big problem.

Read More

Tags: Security, passwords, small business technology





Create a PDF Document in Office 2010 - It's Easy!

Posted by Ann Westerheim on 1/31/11 3:32 PM

Here's a tip to get more from the small business technology you already have.  One of the helpful features in Office 2010 is the ability to directly create a PDF document by using the "save as PDF" feature.  Instead of relying on a third-party application, the capability is built right in.

Read More

Tags: PDF, small business, Microsoft Office, technology





Computer Security - Use "Sandboxie" to Surf the Web Safely

Posted by Ann Westerheim on 1/26/11 10:06 AM

The creators of viruses and other malicious software have gotten so aggressive recently, that today its possible to get a "drive-by" virus.  You may be at a web site that seems safe, but if there are ads on the site, malicious code can enter your system just by viewing the ads.  Unfortunately, the world of viruses is a "cat and mouse" game where the threats escalate as user protection increases.

Read More

Tags: computer security, Sandboxie, Sand Box





"Deep Freeze" to Protect Your Shared Computers

Posted by Ann Westerheim on 1/18/11 9:54 AM

In this day and age of all sorts of computer viruses and threats, a big problem for businesses is what to do with systems used by multiple people.

Read More

Tags: laptop, small business, computer, security protection





Getting your eMail Through Spam Filters.

Posted by Ann Westerheim on 1/14/11 9:20 AM

A customer contacted us a few days ago with an email dilemma.  They had been receiving a valued daily report through email, and all of a sudden they stopped receiving it and found that it was in their spam filter and wondered why.

Read More

Tags: small business, eMail, spam





Laptop Encryption - Part 2 - Know the Difference Between "Sleep" and "Hibernation"

Posted by Ann Westerheim on 1/11/11 9:28 AM

Good news, you've protected your laptop (and your business and your customers) by encrypting it.  Now, now an encryption key will be needed to access confidential or protected information.

Read More

Tags: laptop, Encryption





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.