5 Must Do’s For Microsoft 365

A question our team gets asked frequently is “Office 365 from Microsoft HIPAA compliant? The short answer is yes, it is compliant – BUT a mis-configured system can change that.

Out of the box, with the default settings it is NOT compliant.

Every business doesn’t have to abide by the HIPAA regulations, but they do have great recommendations that every business should follow as they are good practices to have in place.

My Time With a Billionaire – Marcus Lemonis

Recently, I had the unique opportunity to fly down to Miami and meet with a billionaire. Yes, billionaire with a “B”. I am involved with a peer group of other technology service providers just like ComTech around the country. Through the group, ComTech donated to St. Jude and in exchange had the opportunity to talk with Marcus Lemonis about a variety of topics and what he sees for 2022. You may have heard of Marcus Lemonis from his show “The Profit” on CNBC. He is also the owner of Camping World and many other very successful businesses.

Top tips when selecting an MSP for your business


Technology underpins nearly every aspect of modern business processes. Managing it, however, can be complex and tedious. This is where managed IT services providers (MSPs) can help. Whether your company needs software solutions, network infrastructure management services, or cloud technology, MSPs can provide all this and more.

Surefire ways to protect your email account

If you think your email is safe from hackers, think again. A lack of sufficient email security protocols can lead to data theft, unauthorized access to sensitive information, and successful malware attacks. Here are some tips to secure your email account from cyberthreats and the many troubles that come with them.

Safeguard your mobile devices with these tips

Mobile devices are generally less secure than laptop and desktop computers. While there are available anti-malware applications for smartphones and tablets, they aren’t as comprehensive as those for laptops and desktops. Additionally, some mobile devices aren’t compatible with certain security applications or measures implemented by businesses.