Our Blog

Service Spotlight: ICC’s Onboarding Process

When your company is bringing in new business, changing procedures or looking to update current IT systems, onboarding can seem like a daunting task. We can help ease the transition through our standard onboarding processes so that you and your customers smoothly adjust to new practices. The first step in onboarding is configuring a new [...]

May 30th, 2017|IT Services|

Disabling Automatic Updates: A Risk Not Worth Taking

The recent ransomware attack has had cybersecurity centers across the globe on high alert. Specifically, the UK described the attack as a “global coordinated ransomware attack” in dozens of countries against public and private sector organizations. WannaCrypt is reason enough to make sure that your PCs and other devices are properly patched and updated regularly. [...]

May 18th, 2017|IT News, Security|

How to Choose the Right Computer to Fit Your Needs

With so many computers on the market, the volume of choices can be overwhelming. Each device is designed to fulfill specific requirements, depending on how you will be using it. When looking into purchasing a new computer, here are a few points to consider: 1. Intended Use First and foremost, make a list of everything [...]

May 1st, 2017|IT Services|

Introducing YipTel: ICC’s New VoIP Service

ICC is excited to present its latest and greatest addition to the business world: YipTel, our new VoIP service. YipTel offers the complete range of phone services, including Cloud service and TeleHealth. Here are 10 things you should know about YipTel to help you decide if it fits your business needs: YipTel Phone Systems features [...]

April 18th, 2017|IT Services, New Technology|

The Issue with Sending Emails in Plain Text

If you were sharing private information with a colleague, you would walk into their office and shut the door, rather than broadcast it in the breakroom where anyone can hear it. Likewise, sending private information via email requires certain safeguards. We all use email to communicate potentially sensitive information, but many people do not realize [...]

March 21st, 2017|IT News, Security|

5 Habits of Your Riskiest Employees

Too often, we only focus on the threat posed by external hackers and cybercriminals. Employees, however, can pose just as much of a risk to your company’s Internet security. If employees are not using the proper practices or lack education, your business’s wellbeing could be in danger. Stop security breaches before they happen by identifying [...]

February 28th, 2017|IT Services, Security|

Are you violating HIPAA without knowing it?

Any profession in the healthcare industry comes with a heightened awareness for online security. If you work in the medical field, being HIPAA compliant is absolutely crucial to maintain patient security and avoid legal penalties. Not only has it become increasingly more difficult to follow HIPAA security guidelines, but you may be violating HIPAA without [...]

February 20th, 2017|IT Services|

IoT Devices and the Security Threat

Security breaches used to be limited to only our computers. Now, and in the years to come, Internet of Things (IoT) devices pose a unique sort of security threat. When it comes to cyber crimes, anything that is connected to the Internet is capable of being hacked, such as appliances (fridges, washer/dryer), smart lightbulbs, security [...]

January 9th, 2017|New Technology, Security|