The hidden costs are all the things that put those businesses out of business. Data breaches within the healthcare industry do not stay under wraps. You are obligated to report a breach to the Department of Health and Human Services (DHS), which becomes public knowledge. If you’re a local practice or have local presence, be assured that people will start to talk about your security breach and be certain that some will lose complete patient trust within a subset of your patients.
First, there’s a technical investigation. These are expensive. Investigations on single computers can cost well over $30,000! Because IT forensics is such a specialized field with very few players and your insurance company requires a technical investigation, you likely will be paying more for an investigation than you would ever paying to have complete security compliance.
A cloudy day in Michigan. With severe weather passing to the east and looming clouds predict the entire day, I thought it only appropriate to head over to Howell and Pick up Nicole from Armor Protective Packaging for a ride up north to Traverse City for lunch.
continue reading
With smarter firewalls and spam filters, much of the malicious traffic targeting your email box can be identified and removed from user’s inboxes (Note: your email is probably not scotch free of phishing scams. You still need to be diligent about identifying scams and skeptical to give out personal or valuable information through email).
continue reading
Did you know that you should never store your password in an Excel file or a Word document? OR A POST-IT NOTE! Did you know that you need to have a different password for all your accounts?
Do the above facts leave you looking for a better way to keep track of all the login names and passwords you use to access information on a regular basis? At Dynamic Edge, we’ve been using password databases for years, which makes our lives simpler because all the passwords we need are stored in one location.
After serious searching, we’re happy to say that we’ve found a free, open source password manager that you can use to manage your passwords in a secure way — just like us!
continue reading
One of the biggest threats to breaches of sensitive data time and time again was rooted in vulnerabilities from printers and copy machines. The problem with these devices is that they are monitored by printing companies that do not have the expertise or training in data and cybersecurity. And another problem is that many managed services providers or IT Support companies fail to assess and secure the entirety of your network—including printers and copiers supported by third party vendors.
Your reality is that all printers need to be routinely checked for security issues
In fact, all copiers, printers and fax machines are required to be secured and maintained according to security standards—especially for businesses with security compliance pressures, such as HIPAA, PCI or NCUA.
continue reading
Hands down, relationship-building is a key to success in any organization. And that includes IT Support! If our team isn’t engaging with users, making them feel comfortable with us, don’t you think their experience with technology at work—specifically in ways they can help keep your business’ network secure—suffer?
If they are in fact concerned about your security, most IT Departments and Managed Services Providers stress out over the nuts and bolts—hardware and software—on your networks. Some may send out impersonal emails warning users of the latest attack (if you’re luck!), but without getting to know users and establishing a healthy working relationship with them, your business may be turning your biggest assets (your team members) into your biggest liabilities (phishing victims, password violators, sensitive data leakers) without even realizing it!
First, what do I mean by a strong relationship?
continue reading