Blog

March 18th, 2015

Security_Mar18_AWe all know that it’s important to maintain high security vigilance across whole spectrum of your IT, from changing your email password regularly to locking your work computer when you are away from your desk. But there are few areas where it couldn’t be easier to score an own goal and make life easy for fraudsters than in the realm of financial services. From your online banking system to mobile payment platforms, these are accounts where it’s absolutely vital to be on your guard against possible intruders. Peer-to-peer payment provider Venmo just made it a little easier to do that.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

SocialMedia_Mar16_AWhen taking your business online, it’s crucial you make use of different tools to help boost your online presence. Hashtags are an example of such tools; they are the key to social media buzz and have been added to various social media platforms. Isn’t it time you got a comprehensive view of how different social media sites make use of hashtags, as well as how you can get the most out of them for your business?

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 16th, 2015

HealthcareIT_Mar16_AMedical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks. One of the contributing factors to data breach is digitization. While there are several benefits of converting medical data from paper records into electronic files, there is no denying that it increases the risk of data theft. And since stolen healthcare information can be used to commit identity theft and financial crimes, securing healthcare data has become more important than ever.

According to healthcare security experts, healthcare data breaches are on the rise due to the high prices the data can command on the black market.

From financial information to medical information

In the past few years, cybercriminals’ focus has been on stealing financial data, including credit card numbers and personal information. But things are taking a turn, the result of financial institutions fortifying their database and raising client awareness of the problem. This is making it more difficult for hackers to steal financial data, let alone use them. Banks do their bit to protect their customers, too, by quickly identifying and canceling compromised credit cards.

Stronger data protection measures have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes an individual’s date of birth, medical and physical records and social security number - information that can’t be easily reset, and that is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practice measures to secure healthcare data.
  • Protect the network and Wi-Fi - As hackers use a variety of tools to break into IT systems and obtain medical records, healthcare organizations need to invest in secure firewalls and antivirus software to deploy on their healthcare devices. Network segregation is also a wise move so that, in the event that a breach does occur, the attacker can’t instantly access all of your organization’s information at once.
  • Educate employees - Staff members need to receive lessons about information security, including setting passwords, spam filters, protection against phishing, and other kinds of data breach methods.
  • Data encryption - Encrypting data is one of the safest ways to secure it. Healthcare institutions can encode patients information in such a way that only authorized users can access it. Multi encryption is also an effective way to keep out intruders.
  • Physical security - Most healthcare institutions still retain their patients’ records on paper, stored in cabinets. Ensure that all loopholes are covered by installing surveillance cameras and other physical security controls, such as electronic door locks.
It is of crucial importance for healthcare providers to secure sensitive information, in order to gain and retain the trust of your patients. If you want to know how your organization can better protect your patients information, give us a call.
Published with permission from TechAdvisory.org. Source.

March 11th, 2015

MobileGeneral_Mar06_AIt’s clear that mobile payment platforms represent the future direction of the industry - allowing consumers to break free of traditional cash or card payment methods, and settle bills in ways that are convenient to them. The explosion of mobile payment options and their increased ease of use mean that there has never been a better time for businesses to get on board. And now Google’s shaken things up a bit further, with the announcement of its new Android Pay platform. Here’s what you need to know.

When Google launches Android Pay, it will act as more than just another app like Apple Pay, or Google’s existing Wallet app (which will continue to be in use, and will be powered by Android Pay). This means it will be useful to developers and retailers looking to allow users to make payments for products and services from right within their apps on Android devices.

Apple technology already enables iPhone users to buy goods in real-life stores using near-field communication (NFC), and Google’s Android Pay system will do the same. A similar technology to Apple's is Google’s local storage of bank card information, which takes away the need for you to have a phone signal to make payments. There are also benefits to security - another feature that Android Pay will adopt from its rival is the use of one-time, automatically generated credit card numbers for each transaction. This helps to fight fraud because even if the retailer you shop with subsequently suffers a data breach, any card numbers the fraudsters get hold off would have expired already.

Google ultimately hopes that its Android Pay system will also include support for fingerprint scanning and other security features, further boosting the peace of mind you can have while using it to shop and settle up.

Competition is beefing up in the mobile payment platform arena. While Google Wallet failed to gain much traction when it first launched in 2011 - it was considered by many to be ahead of its time - the recent growth of Apple Pay appears to have revived hope in the Google alternative. What’s more, Samsung recently debuted Samsung Pay, which is big on payment security and will come as default on the latest models of the Galaxy and Edge range of devices. The Samsung system has the potential to quickly achieve far greater reach since, while Apple Pay only works where retailers already have NFC installed, Samsung recently acquired the firm LoopPay, and as a result Samsung Pay will also support the use of conventional magnetic credit card readers.

And even PayPal is moving in on mobile payment territory. Though the company has for some time had its own apps that make it easy to send cash to friends or suppliers, or to make purchases at participating retailers, PayPal is still better known for its web-based payments system. However, PayPal recently acquired Paydiant, a startup due to launch later in 2015 with a competitor to all the other mobile payment platforms, known as CurrentC. It could prove stiff competition indeed, since it’s backed by retailers like Wal-Mart and 7-Eleven.

Don’t be fooled into thinking that your business can ignore the rapid growth of mobile payments. To find out how to leverage them to your benefit, get in touch with us today.


Published with permission from TechAdvisory.org. Source.

March 9th, 2015

BusinessContinuity_Mar09_AYou’ve been putting that business continuity plan off for months now, but you’ve finally decided to go through with it. You start by talking to members of your staff, partners and service providers. And it doesn’t take long to see that everyone has a different opinion about what to recover first when disaster strikes. The head of your IT department demands your servers are top priority, while your Vice President argues that without network security being reestablished pronto, your business is left vulnerable to even further damage. Who’s right? It may be difficult to decide. That’s why we’ve compiled these fundamental ideas to consider when drafting your business continuity plan.

Speak to many members of your organization

And not just your IT department - which may sound like a bit of an oxymoron coming from an IT provider’s blog. However, the reason behind this is simple. Suppose you have an IT staff member called Jane, who is responsible for a series of applications that automate your e-commerce system. If you call a business continuity meeting concerning to identify assets to prioritize during a disaster, what do you think Jane will say? She’ll likely point to her group of applications, since to her this is what she prioritizes and spends her days on. And it’s not just Jane; each staff member will probably voice that their particular job (whether that’s security, server maintenance or something entirely different) needs to be prioritized. It’s human nature to think of your responsibility and role first. We all do it.

The key is to get more than one opinion. It’s not a bad idea to start with the leaders of your company, and then work your way down. Leaders generally think in a broader sense about your organization as a whole, rather than one particular facet of it.

Consider where your business is going

When developing your business continuity plan, it’s easy to fall into the trap of thinking about your business as it is today. While you’ll draft your plan in the present, it needs to be created with the future in mind. For example, if you’re considering joining the Cloud or virtualizing your servers in the next year or so, how is this going to impact your plan? It’s smart to think of this sooner rather than later, as it could cause a major shift in your priorities. If you start deploying your business continuity plan but then have to switch gears further down the line, it’ll likely cost your company a lot of money.

Examine the interdependency of your business

Remember to connect the dots between your IT department and business processes. For instance, if your email system can’t run without the use of a particular IT application, it will do no good for you to have your email system as a priority 1 issue and that IT application as a priority 3. In this scenario, the IT application would need the same priority as the email system - if not higher, or else your email system will simply not work.

The point is to map out the interdepencies of your business processes and IT, so that you know what depends on what. That way you’re not left in a pickle when disaster strikes.

Need help getting started with your business continuity plan? Contact us today to learn how we can help.

Published with permission from TechAdvisory.org. Source.

March 4th, 2015

Sec A 164Most of us know we should make our passwords more difficult (sorry, folks, “1234” or "qwerty" just doesn’t cut it) and use an up-to-date version of antivirus software. But all too often, we opt for an easy life - use familiar passwords and put upgrades on the back burner. But security can be simpler than you think so here are a few not-so obvious tips that will make your online experience a whole lot safer. Here are three to keep in mind.

Embrace two-factor authentication

Also known as two-step verification, most of us have likely dealt with this at one time or another. When you’re logging onto your bank’s website or your email account from a different computer than you normally use, you’re sometimes prompted for a one-time password - sent to you via text message, email or via some other method.

Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much.

Update browsers and devices

Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy - saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch Youtube on last year’s version of Firefox.

Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.

Use HTTPs

When was the last time you typed those letters into a browser? Probably not this decade. It’s no wonder most people are unaware of this tip. So for those who are oblivious, https is the secure version of http - hypertext transfer protocol. Believe it or not, that last “s” actually adds an extra layer of protection. It encrypts information sent, both ways, between a website’s server and you.

You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera.

Looking for more tips to boost your internet security? Get in touch to find out how we can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 3rd, 2015

Financial analysis concept 1Healthcare organizations have an extremely dynamic work environment - doctors, nurses, staff and patients are constantly on the move. In spite of all the stress and pressure, the organization must do its best to lower costs while trying to improve patient satisfaction and safety. This is why healthcare administrators are increasingly relying on wireless technology to facilitate their patients and operate more efficiently. Here are some examples of how wireless technology is providing new solutions to healthcare businesses.

Managing staff workflow

Working in a hospital can be an exhausting experience, in a stressful environment and under time pressure. This can affect staff performance in delivering service to patients. You can track staff movements, to gain a better understanding of workflow, by deploying ID badges with a radio frequency identification (RFID) tag that can be linked up to the hospital’s Internet connection. The badges will then collect data and it can be analyzed for possible improvements to processes.

Better inventory of medical equipment

Sometimes it’s hard to keep track of medical equipment and devices in storage. Wireless RFID technology allows users to track not only the location of the equipment, but also its condition and status. This way it’s easy to tell at a glance whether the equipment is in use or not. RFID also prevents staff from spending hours searching for missing tools, so doctors and nurses can focus on caring for patients. Simply put, you’ll always find the equipment you need, in the right place and at the right time.

Increasing security

Wireless technology can be used in different ways to boost security. For instance, attaching an electronic tag to an infant can help prevent child abduction from hospitals. Another way to implement this is to let staff wear ID badges embedded with a RFID tag. Whenever a member of staff enters a patient’s room, his or her name, photo, and job function will display on the patient’s bedside monitor. This allows the patient to quickly identify the members of the team responsible for their care. The patient’s family will also be able to find out who has visited the patient and when.

Accessing and analyzing data

Healthcare organizations are increasingly turning to cloud-based data storage. And when wireless signal devices are installed around the hospital, the data will be available to all staff in the area. Many healthcare organizations are also adopting analytical software to perform data mining - a process in which data is analyzed to provide new information and deeper insight into operations.

Automating environmental monitoring

There are many cases in hospitals where the environment needs to be monitored closely. For instance, hospitals usually have a number of refrigerators spread across the site that are used to store vaccines, medicines, or even tissue samples, and which must be kept at a carefully controlled temperature. Equally, hospitals often have to maintain appropriate humidity levels within certain rooms. This is where wireless technology can help. By attaching sensors to wireless RFID tags that can send the room’s temperature and humidity information over a Wi-Fi connection, staff can record data at regular intervals and be alerted if the conditions exceed an acceptable range.

Wireless technology not only improves efficiency, but it also saves time and money. Talk to us today about incorporating wireless equipment into your healthcare facility.

Published with permission from TechAdvisory.org. Source.

March 2nd, 2015

HealthcareGeneral_Mar2_ANowadays professionals in healthcare services use Electronic Medical Records (EMR) to gather a patient’s data and record medical information. EMR are more beneficial than paper records because they eliminate the problems of poor handwriting and allow users to organize and store data more efficiently. They are also one of the best tools to ensure a patient’s safety, prescribe medication, and manage chronic illnesses. However, with so many EMR vendors out there, choosing the best EMR to suit your healthcare practice can be overwhelming. Here are some criteria to consider when selecting an EMR system.

Determine your requirements

This is a very important process and should not be something you leave to the vendor with no input yourself. EMR offer a vast selection of functions, and you don’t want to end up choosing one that is irrelevant to your practice. The first thing you must do is to narrow down the features you need. You should make a list of all requirements from the ground up: patient admission, patient scheduling, medication lists, visual reports, and so on. Then you need to prioritize the features that would bring the most value to your practice.

Get the appropriate EMR for your specialty

Most EMR products have a wide range of capabilities while others meet specific needs for medical practices. EMR systems with broad functions may not offer the features that you need. On the other hand, the right EMR will be customized to suit your specialties, which will provide a familiar workflow. For instance, doctors who specialize in midwifery will need a unique EMR platform designed for this type of work. So ensure you have the right tools to do your job!

Simple Usability

For healthcare professionals, dealing with patients and medicines can be time consuming enough, without systems and processes making things more complex. EMR should make the whole treatment process easier, not harder. How do you know whether your EMR solution is easy to use? You can try out the demo version and road test a few common functions that assist in your everyday routine. You should be able to figure out how to use it more or less right away. Simplicity helps a lot, especially when implementing a new system - you need employees to be able to catch up quickly.

Support and upgrades

As with other types of software, you’ll want all the support you can get from your vendor. Reputable sellers will usually provide 24/7 support, which is beneficial as most likely you’ll come across technical problems at some point. You never know when you might need someone ready to answer questions late at night. And when it comes to software, support often includes upgrades with new features and bug fixes. Find out more about your potential vendor’s track record in giving quality care and consistent software updates.

Vendor viability

Take into account your vendor’s plans for the future before buying their EMR product. You’re not just buying from your vendor, but you’re also creating a long-term relationship with them. Remember that technology is always changing, as are medical regulatory standards. So you’ll want to make sure that your vendor will be in business in the long run, and that they have the ability to invest in future development. After all, EMR implementation can be costly and you don’t want to be making major changes to your EMR system every few months.

If you want to adopt EMR in your healthcare business, get in touch with us today and see how we can help.

Published with permission from TechAdvisory.org. Source.

March 2nd, 2015

Trouble aheadBusinesses are exposed to disasters all the time, including IT system failures, power outages, or even natural disasters. These causes will cripple your business unless you have a business continuity plan (BCP) ready. A good BCP allows your business to continue on running everyday operations seamlessly. It makes sure that you can service your customers in a satisfactory manner, even when you’re facing technical issues. Therefore it’s very important to come up with a continuity plan, if you don’t already have one.

Relevant factors such as your business’s resources, location, suppliers, customers, and employees must be carefully analyzed before a business continuity plan can be formed. It is also necessary to test the plan and check whether it’s working or not. Here are some proven methods to test your continuity plan’s efficiency.

Review the BCP

You have a business continuity plan ready with all the necessary information, contingency locations, personnel, contacts and service companies. The question is can you really pull it off? Have the plan reviewed regularly, or at least quarterly. Gather a team of individuals, heads of departments and managers to discuss the plan. Focus on the business continuity plan’s feasibility and pinpoint any areas where it might be strengthened.

Determine time and duration to test the plan

You should decide how often you test your business continuity plan, and for how long. Even if you have a solid plan in place, it’s still wise to review it again after a few months. Come up with a schedule for testing the plan and share it with employees. Testing time may take anywhere from one day to two weeks. However it can also take as little as three hours to determine the effectiveness of the plan by monitoring employees’ responses and decision-making abilities, based on the guidelines of the business continuity plan.

Outline objectives to employees

Most business continuity plans fail because they have never been properly relayed to employees. Emphasizing the plan’s importance to your business and demonstrating it to employees is crucial. You need to outline objectives for the business continuity test to your employees, informing them how you plan to measure its success and failure, so that they get a general idea of their roles and your expectations.

Create a scenario

Create a fake scenario that affects your business - whether it’s setting off fire alarms or announcing another disaster. Employees should act as though the scenario is genuine, and refer to their duties in the business continuity plan, going through it step by step. Monitor the time it takes to get everything under control, from contacting customers to checking business resources and temporary meeting locations.

Evaluation

After the business continuity plan is put to test, gather your employees to discuss the plan’s overall performance. Identify where it needs improvement and encourage the parts that worked best. Make changes to key persons and actions where necessary, to ensure that the continuity plan is working at its best.

Having a business continuity plan is good, but testing it regularly is equally important. Contact us today and see how we can help you cope with unexpected disasters.

Published with permission from TechAdvisory.org. Source.

February 27th, 2015

Happy  Mature Man Using CellphoneWindows Phones may not have the biggest market share in the smartphone industry, but they have a number of useful features for business people. Whether you're seeking the ability to do business presentations, increase productivity or manage devices remotely, Windows Phones have the capability for this and more. So if you’re using a Windows Phone, you can improve business performance by taking advantage of these features.

Data Sense

Nowadays, telecommunication service providers restrict your Internet usage to a few gigabytes of data on a monthly basis. When you’ve exceeded this data limit, your Internet speed goes down drastically, and you might even have to pay extra to maintain speed. Data Sense allows business users to stay productive while on the go by monitoring their data usage. You can set a monthly data limit and Data Sense will help you control background applications and save certain downloads for when you’re connected to a Wi-Fi network. This way, you can save your precious connection speed for when you need it most.

‘Running late’ notification

At important business meetings, you don’t want to be the one seen as unprofessional for turning up late, especially if you haven’t been able to let people know what's happening. But even if you strive to be on time for every appointment, sometimes things are beyond your control. The ‘running late’ notification in the Windows Phone calendar app lets you send a quick message to your colleagues, to alert them to the fact that you’ll be late for a meeting. Simply do this by setting a default message, then choose a meeting in your calendar. The notification feature will pull contact information from your address book and send an email to attendees of your choice. Just make sure you have a good excuse when you do turn up!

Office Remote

This powerful application turns your Windows Phone device into a remote control for Microsoft Word, PowerPoint, and Excel documents. Business presentations are easier with Office Remote, which you can use to jump between PowerPoint slides and control a laser pointer to draw your audience’s attention. You can also use it to store your speech notes, and you can glance down to monitor your presentation time on the screen. Office Remote is simple to implement, requiring only Bluetooth and a small piece of add-in software that allows you to connect your Windows Phone and PC.

TeamViewer

What happens when you’re out of the office, and a client calls to request information stored on your computer? Well, the good news is you don’t need to rush to your desk. With TeamViewer, you can access your PC’s desktop right from your Windows Pphone device, as long as the computer is turned on and running the TeamViewer program. This can save you a lot of time when you’re outside and need to check a file or run a program on the go.

Mobile device management

If your business deals with confidential client information, then deploying Windows Phones to your employees can be risky. Microsoft has come up with Windows Intune, an application to centrally manage and secure your employee’s Windows Phone devices. Windows Intune allows the administrator to manage updates, control which applications can be installed, and protect the devices from viruses and malware.

If you want to integrate Windows Phones into your business, contact us today to get started.

Published with permission from TechAdvisory.org. Source.