As your Managed Services Provider, we like to educate all our clients on best practices for keeping your business safe from hackers. One of the easiest ways for a hacker to wreak havoc on your computers, is for you or your employees to click a link in an email – without first questioning where it came from. You may think you already know not to open a link that looks suspicious, but the criminals who do this for a living have evolved their tactics, so many malicious links do to appear at all suspicious.
Here’s is an excellent article in USA today that really lays out what to look for, and how to avoid devastating your network with one bad click: Don’t click any link before asking these questions
John Mamon, CEO of mPowered IT on Atlanta Business Radio
by CW Hall, Business Radio X
Click to hear the podcast
This week I sat down with experts from the healthcare IT sector. John Mamon is the CEO of mPoweredIT, an outsourced IT company that devotes expertise to the small to mid-sized medical practice, helping them manage their computer hardware, infrastructure, and software needs for far less than it typically costs to employ someone dedicated to these functions within the practice.
John talked about how often, in an effort to save money, small practices place responsibility for managing these facets on a practice manager, a clinician within the office, or even the doctors themselves. Clearly this can take away from the core function of the office—taking care of more patients.
He shared a number of important concerns that can expose these offices to risk such as HIPAA requirements, downtime of equipment, ACA compliance, and others. Each of these can create significant cost or loss of productivity when small offices attempt to handle things on their own.
mPoweredIT is able to scale their services to the needs of the practice, providing the full suite of IT management or taking over particular elements on behalf of the practice. The company also partners with several other health experts who can provide additional support in areas such as billing/revenue cycle management, EMR selection, and others, to allow their clients to maximize productivity and profitability at the same time.
John introduced us to Harvey Shuster, of Emergence, a Georgia Medical Accelerator. Harvey, a multiple-time entrepreneur, was one of the founders of Peachtree Software among others. He and his team work with emerging healthcare technology companies, helping them to commercialize and bring to market their devices/technologies more quickly.
Harvey brought along Osama Hashmi, CEO/Founder of VitaminC. This company adds an additional layer of automation and engagement to EMR systems. Their software allows providers to contact patients and encourage follow-up visits where appropriate to facilitate care/outcomes while at the same time helping the practice to maximize its potential for seeing patients in need.
VitaminC integrates well with numerous EMR systems and has proven valuable to primary care doctors and specialists such as dermatologists, plastic surgeons, and others.
Technical support and security updates from Microsoft for Windows Server 2003 will end on July 14th.
This means your server will be at a heightened risk for potential attacks and brings in to focus a number of important issues. Check out these three:
Important Issue #1
The hacker community will likely view unsupported systems as compelling targets. The more Windows Server 2003 users that remain after July 14, the greater the risks. Currently, there are millions of businesses running Windows Server 2003. Even the department of homeland security is concerned. Check out what they have to say here.
Important Issue #2
Compliance violations for businesses on version 2003 are imminent. Companies that process regulated data – such as credit card payments or patient medical records – may be out of compliance. This could result in fines, or worse, being cut off from key partners.
Important Issue #3
If you have a security breach, you’re required to report it. A security breach occurs when there is a loss, theft, or other unauthorized access to sensitive information. 47 states now have security breach notification laws, meaning that businesses must immediately disclose a data breach to their customers. If you are breached, how will this impact the trust and integrity of your company? See state laws here.
Let us help you keep your business protected and think through your options. Network security, cloud services, and IT support are our specialties.
Learn more about Network Security for: