Does Your Medical Office Have a Disaster Recovery Plan?

HIPAA Disaster Recovery PlanElectronic storage of medical records has proven to be beneficial for patients, doctors, and the environment, but it does come with potential security issues. Patient records must remain HIPAA compliant, even in a disaster. Patient records can be compromised by a natural disaster like a hurricane or flood, a system failure, or even human intrusion. It happens.

A HIPAA Disaster Recovery Plan is a Compliance Requirement!

A HIPAA disaster recovery plan is not an option, but a requirement, as defined within the HIPAA Contingency Plan standard in the Administrative Safeguards section of the HIPAA Security RuleHere is what is expected in a standard HIPAA disaster recovery plan:

  • A HIPAA-compliant disaster recovery plan must state how operations will be conducted in an emergency and which workforce members are responsible for carrying out those operations. The plan must also explain how data will be moved without violating HIPAA standards for privacy and security.
  • It must also explain how confidential data and safeguards for that data will be restored. Although HIPAA doesn’t specify exactly how to do this, it does note that failure to adequately recover from a disaster could lead to noncompliance. Failure to comply exposes officers of the organization to repercussions, such as fines or jail time.
  • Organizations must have an administrative authority in charge of managing and enforcing HIPAA compliance rules, regulations and efforts. There should be a clear set of guidelines in place regulating who is and isn’t permitted to access patient information. All access to sensitive data and systems should be monitored.

shutterstock_357282071Meeting all these HIPAA Disaster Recovery plan requirements may seem overwhelming, but mPowered IT can help with different options to help your practice mitigate risks and have a recovery plan.

Why risk noncompliance in a disaster, when you can prevent it? Call mPowered IT. We fully understand HIPAA compliance and ensure your medical office stays within it.

Call 678-389-6200, contact us online, or text IT911 to 72727

Is Your Small Business Vulnerable to Cyber Crime?

YES. In fact, your small business may be targeted specifically because it is small.ransomware-guy

Cybercrime targeting small businesses is on the rise. You may not suspect that your business is a target for cybercrime. It is. Hackers are not picky from who they steal from and your business is no exception.

The most common method hackers use is ransomware.

Here are three known ways hackers execute a ransomware attack:

1. After you discover you cannot open a file, you receive an email ransom note demanding a relatively small amount of money in exchange for a private key. The attacker warns that if the ransom is not paid by a certain date, the private key will be destroyed and the data will be lost forever.

2. You get duped into believing you are the subject of a police inquiry. After being informed that unlicensed software or illegal web content has been found on your company’s computer, you are given instructions for how to pay an electronic fine.

3. The malware surreptitiously encrypts the your data but does nothing else. In this approach, the data-napper anticipates that you will look on the Internet for how to fix the problem. The crooks make money by you selling anti-ransomware software on legitimate websites.

Luckily, we are well equipped to prevent ransomware and other cyber attacks. Enforce Managed Security protects your entire network against any type of threat, attack, shutdown or outage — saving you downtime, loss of revenue, lawsuits, and possible collapse.

Call 678-389-6200, contact us online, or text IT911 to 72727

Is Your Backup Method Working for You?

shutterstock_419539471We have all been there.
The moment of sheer panic, followed by dread. An important document goes missing for inexplicable reasons, or your computer shuts down taking your file with it. You remember saving, but as hard as you search, you can’t seem to recover it.

Defeated, you find yourself forced to scramble, push back important deadlines, and explain to your supervisor or client why the meeting, product, or service is going to be late. Everyone loses.

Having a secure backup method for your small business is essential.

Secure offsite cloud backupSpecifically, offsite data backup. A USB drive can easily be damaged or broken and takes time to load each file. CDs are simply outdated. Even automatic once-daily onsite backups are not enough – you could lose a whole day’s worth of data. Having quick access to most recent copies of your files saves time and money.

The best data backup solutions enable you to recover lost data fast, without disturbing your workflow. When there is a crisis, a data backup isn’t a luxury – it’s a necessity.

So what is your network relying on?

Most small business’s backup systems are inadequate, don’t address the most basic backup needs (restore time and restore points) and ignore some of the most common threats to your data.

The mPowered IT Ensure Program provides complete Backup & Disaster Recovery (BUDR) services so whatever disaster occurs to your network, your data is safe and available.

Call mPowered IT BEFORE You Lose Data!

Call 678-389-6200, contact us online, or text BackUsUp to 72727

Most Phishing Emails are Pretending to be from Your Own IT Department

As you probably know, phishing is an evil attempt to gain access to your private information – or to destroy your computer network – by sending an email that appears to be from a legitimate source. Often, these appear to be from a business with whom you already have an account, such as a credit card company, and the email requests that you update your information, and provide a link to do so. Clicking that link is like stepping on a land mine.

But the phishing trend for businesses is to send an email regarding a security threat – to play on your fears of dealing with a breach. As of 2015, 78% of known phishing emails were security related, and they posed as the company’s IT department, or its anti-virus vendor. And, of course, opening the link in that email causes the very breach you were trying to avoid.

Please be aware of this, and remind your employees never to open an email, nor click on a link in an email, without knowing the source. They should always check the sender’s email address – that’s usually a dead giveaway. Instruct you employees, that any email regarding a security issue should be forwarded, unopened, to a designated person in the company who is in charge of network security.

For more information about keeping your business secure against phishing, hackers, outages, and all other threats to your computer network, call us at 678-389-6200 or contact us online.

Businesses Robbed Blind

mPoweredIT Ensure Backup & Disaster Recovery_Man on computerWe ran across this disturbing security trend and wanted to make sure all businesses, especially smaller ones, are aware of it. Most business owners or managers assume that if they have a security breach, they’re going to know about it. They imagine systems failing or some other obvious calamity.

But what’s now happening is, on average, businesses are being “robbed blind” for six months before they become aware of the breach. And, 69% of those businesses only found out because an outsider informed them of it, such as law enforcement or a business partner.

The easiest way to prevent being robbed blind, or becoming a victim of any security threat, is to make sure you have real security measures in place, and those measures are constantly updated and monitored to stay on top of evolving threats. This is hard for small businesses, because it can be expensive to devote resources to network security. But, that’s why we’re here! mPowered IT is designed and priced to support small business. Take a look at how we can secure your business for a fraction of the cost of hiring IT staff.

For more information about keeping your business secure against threats to your computer network, call us at 678-389-6200 or contact us online.

Web Analytics