Are You Ready for the Future of Business?

Ushering in the Modern Workplace with Microsoft 365

Do you think your team has the liberty to do their best work? Are they engaged and satisfied on a day-to-day basis? Are you providing your team with the tools that enable them to have a digital, adjustable workplace in today’s modern age?

Every business leader wants to be able to provide a work environment in which their team can enjoy secure and reliable platforms. This type of collaboration encourages the exchange of ideas, creative thought, and better workflows. The bottom line is that when you give your teams the tools and resources they need to do their jobs correctly, the whole business just runs better.

That’s the thought process behind Microsoft’s innovative new program.  The tech giant is now making it possible for businesses to provide their employees with the ability to have fluid communication while utilising several different devices at the same time.

When Microsoft Core Services Engineering (CSE) planned a redesign, this is what they envisioned to provide each company that used Microsoft 365:

  • Inspiring employees
  • Engaging customers
  • Optimising operations
  • Changing the nature of the company’s products, services, and business models

They knew that if they incorporated Microsoft technology and products fluidly together, they could provide a valuable and familiar resource for both employees and customers. Microsoft wanted to present the possibility to businesses that Microsoft 365 could be the vehicle that could deliver their products and services to consumers in the modern world.

What is a Modern Workplace?

Employee expectations are always changing and evolving at a rapid pace. Business leaders sense the demand to keep up with a widening skills gap, diversity in their employees, and a need to think globally when assembling their teams. These pressures require a business to provide a reactive, modern workplace to meet the evolving needs of its consumer base. The modern workplace requires continuous communication while using multiple devices and platforms. All this must be accomplished while simultaneously being able to incorporate top-notch security that keeps your data safe.

A Modern Workplace Provides Seamless Collaboration

The modern workplace requires businesses to train their employees to be less static, and more dynamic. They need to assemble groups of people who come together to solve a problem, which shifts the focus from “me-centric” jobs to “we-centric” jobs. When a team can unite quickly, solve a problem, and collaborate with other teams, a business succeeds, and the employees feel empowered.

A Modern Workplace Provides a Multi-Device Experience

Enabling employees to utilise the devices they love is a way of letting personnel know that the company’s bottom line is for the employees and the consumers to come out winning. Microsoft mobile application management and mobile device management solutions decrease complexity and make for a happier environment.  For example, an employee can start a meeting on an iPhone at a coffee shop and seamlessly end the meeting back at the office on a desktop computer. The user experience is no longer bound to a device—it travels with you.

A Modern Workplace Provides Intelligent Security That Protects the Company and the Customer

Having IT that is focused on protecting corporate data is crucial in today’s business. With the turn toward an intelligent cloud, a company can no longer just concern themselves with securing the perimeter. Their security stance must evolve or die.

Microsoft 365 protects both a company’s and consumer’s identity on your apps, data, and devices with comprehensive enterprise security. Also, the emerging cloud causes companies to ensure security for their customers. Microsoft 365 security stack works to proactively defend against malware, phishing, and zero-day attacks. Microsoft 365 security addresses business challenges that deal with intelligent security, such as:

  • Identity, app, data, and device protection using Azure Active Directory, Microsoft Intune, and Windows Information Protection.
  • Innovative protection with Office 365 Advanced Threat Protection and Windows Defender Advanced Threat Protection.
  • Data archiving, control, and detection with Advanced eDiscovery.

Instead of protecting companies by looking at dealing with an asset or device, they incorporate their intelligence systems to counter threats at a fundamental level.

A Modern Workplace Changes the Culture

A company’s culture begins with their values and vision and then translates to their practices, teamwork, and relationship building. Facilitating employees so they can be flexible and not afraid to make mistakes, but learn from them, is what a dynamic and successful company should strive to do.

Modern Workplace

Wrap Up

The modern workplace empowers your personnel to embrace change and be a part of shaping the culture of the company. A culture shift takes place when a team is empowered. Microsoft 365 gives you the tools to make it easier for you to build experiences like this. This makes it possible for teams to be more productive and successful in their jobs. It’s a win-win for both the employer and the employee.

Digital transformation is just as much about people as it is about technology. You will succeed when you show employees that they are vital to your company’s success. With the familiarity and ease of Microsoft 365, your team can place an emphasis on providing excellent goods and services to your customers.  The complexity and challenges brought on by the advancement of rapidly evolving technology shouldn’t be an obstacle to employees. It should be an opportunity for them to display their creativity while adding value to your organisation.

Why Education Should Outsource IT Support

Education IT Support

EdTech has a long history of being misunderstood, underutilized, and of lacking support in every way. It is one of those bugaboos in education that seems like such a wonderful idea, but often falls apart in execution as money fears cause administrators to scale back. Lacking proper follow-through lessens the efficacy of even the best in educational technology – and that’s just a plain old waste of money.

Education IT Support

Educators need support, but it’s nearly impossible – and very expensive – to put together an in-house ed-tech support team. And with 80% of schools now using cloud-based data storage, adequate tech support is crucial. Districts are limited by their budgets and the size of their staff. Any large-scale upgrades or maintenance can take forever and tie up literally every member of the IT support team. When there isn’t anything big going on, layoffs have to come down. Otherwise, there are too many people drawing salary and benefits for almost no work. That’s obviously untenable, so the default is to simply under-staff and makes do (which never works out optimally).

It’s an unenviable position to be in as an educational administrator. The solution is third-party tech support services.

Schools Are Already Doing It, And It Works!

Transportation, software support, substitute teaching, accounting…the list of third-party contractors in education keeps growing. Utilizing a third-party support contractor makes even more sense than some of the other contracts your district may have. IT gets highly technical and specialized. The skill set necessary to cater to a school or district’s needs is worth more than most schools can afford – especially in the public school system.

Plus, districts usually have SaaS applications – “software as a service.” These are applications licensed by schools that have native help sections. SaaS as part of licensing contracts gives districts the ability to call for tech support via phone, email, chatbox, or scheduled in-person service calls. Contracting out for IT services in general works in much the same way.

Scalability

Imagine having extra staff available when needed who just disappear when the need is gone. Contracting with a firm gives the school access to additional staff in emergencies or planned maintenance. Jobs with a large scope can be planned ahead with the IT contractor, with funds set aside for the additional hours and workers needed for projects. Having a contractor already on the books makes it easier to plan and bring in more people. It makes communication stress-free because the third-party will already be familiar with the school.

Using a third party allows administrators to:

  • Order staffing as needed.
  • Expect efficient, effective response to emergencies like outages, virus threats, and data breaches.
  • Ensure smooth, quick execution of planned upgrades with minimal disruption.
  • Support staff by offering assistance to individual faculty members.
  • Give faculty and staff immediate remote or in-person assistance.

Cost-Effective Expertise On Speed-Dial, Not On Staff

Even if a district is fortunate enough to have more than a skeleton crew of knowledgeable IT support staff, they likely won’t keep them long enough to become well-acquainted with the ins and outs of the district itself due to the comparatively low pay in school systems.

In Ron Schacter’s “Building An Ed Tech Dream Team” (District Administration March 2012), now six years old, school IT staff might expect to start at about $55,000 for basic support, but staff such as network architects will earn somewhere around $75,000-$80,000. Those IT workers could make a lot more if they went into the private sector, so they’re not going to stay long.

Thus, the supposed benefit of having someone in-house (i.e., their familiarity with the district’s needs) disappears. High turnover rates make for poor planning, disruption of services, and yearly retraining of a person or team upon whom everyone relies. It is poor planning that costs too much.

Moreover, with demands on educational technology growing, having a fully functional team able to respond to small and large-scale emergencies quickly grows too expensive for even larger districts. How can smaller districts or private, parochial, and charter schools possibly keep up? The reality is that many tried-and-true methods and educational tools simply won’t cut it anymore. The world is changing, including the field of education. Districts must find cost-effective ways to keep up.

Third-Party Support Supports Teachers

Teachers are not IT specialists. They are educators and must have the resources to teach. Put the power in their hands to use Ed Tech tools the way they were meant to be used. Stop using tech experts to restart computers and advise teachers to use Internet Explorer rather than Mozilla for their new application. Don’t make a teacher ask a kid from 4th hour to fix a problem with the desktop. Being reactionary rather than planning ahead always costs more. Sound planning that includes using third-party tech support offers flexibility and cost savings that maximize the educational benefits of rapidly evolving educational technology.

Conclusion

Reluctance to change leads to wasted time and money. By hiring less than the bare minimum IT staff and paying professionals well below their value, schools open themselves up to larger scale losses in the long-run, including:

  • High turnover requiring extensive, repeated searches for competent staff
  • Purchasing the wrong tech for a school’s needs
  • Purchasing something that is technically correct, but then cannot be fully utilized because the IT support is not there
  • Inefficient research carried out by non-tech staff
  • Network outages and unreliability cost time and money as well as loss of teaching time
  • Loss of staff and faculty due to frustrations over a poorly maintained infrastructure

When it comes to schools, you simply don’t have the resources to waste.

Security: Focus On The Fundamentals

Healthcare IT Security

Every day, it seems, another security threat is in the news. The latest one involves some flaws in Intel chips that actually introduce a new vulnerability. The patches are out to address this, and hopefully, someone in your IT organization is tracking and applying them. But this is only one of the many ways your company can be vulnerable to cyber-criminals.

Healthcare IT Security

Good Security Is Proactive

Patches have to be applied. That’s good. But it’s also reactive. Doing whatever the news of the day tells you to do in regards to security is not a security plan. So, what is? And what does a good plan look like? Proactive security measures address every potential threat.

Human Factors

The biggest risk to security, by far, is human actors. These include your own employees and bad actors outside the organization. Humans, as the story of former White House Chief of Staff, John Podesta’s hacked email shows, make mistakes. To review, Podesta got an email he found suspicious, asking him to change his Gmail password. He sent a memo to his IT department. The IT staffer involved meant to tell him it was suspicious but made a typo in his reply email and told him it was okay. So, Podesta went ahead and click on the link exposing his database to Russian hackers. What went wrong here?

Facepalm Moment!

There are lots of things, but the most fundamental of them is that if security is a real concern, one does not use a free, public email service for email. Whatever else was in place, this episode shows that the DNC’s approach to security was flawed at the most fundamental level. People working at the White House should not use free, public services for sensitive email. It is a safe bet that, if you examine your organization’s security posture closely, there is at least one such facepalm moment lurking somewhere.

People do stupid things. One of the jobs of IT security professionals is to anticipate those things and make sure they don’t happen. Moving from passwords, which can be insecurely stored, to biometric identifiers, is one way to do this. People can’t easily steal your fingerprints or iris.

Portable devices are another issue. Having 24/7 access to a business device is great. But is it necessary? Laptops and smartphones are eminently losable. Ask whether every employee who has remote access needs it. Make sure you can remotely erase your company data from their device if it is lost or stolen.

The boundaries between work and non-work life grow ever thinner. There is no need to deny employees access to personal email. But on the company email server? Have them take personal mail to a browser-based service. Keep work and personal accounts firmly separated. This is a basic step that every company could and should be doing.

Auditing (Gently) The Vendors

There are good reasons to outsource many IT functions. Day-to-day operations rarely require high level IT expertise. It can easily be obtained from IT consultants and managed outsource providers and used as needed. Moreover, using outsourced IT providers who have many clients allows your organization to take advantage of the mistakes that their other customers have made. Most IT professionals have seen and heard it all. Use of consultants is a very inexpensive means of knowledge transfer, far cheaper than developing the same experience with in-house techs.

Make sure the IT provider knows their stuff. You may find a few whose security is really no better than yours. This is where it’s so important to check the company out before hiring them. Check their feedback online. See what their customers are saying about them. Do they really know how to secure your data and records so that you don’t get hit with a ransomware virus? Will, they set up both onsite and offsite backups so you’re never without your data even if disaster strikes?

Needing To Know

Transparency is, in general, good. But when dealing with health information that is protected by regulations like HIPAA, less is more. That is, less access is better insurance against risk. No one should be deprived of the data they need to do their job. But with protected health information, no one without a need to know should have access. Coders may need to see the physician’s notes in order to properly bill for services rendered. Billers do not. All they have to do is charge for the codes that are given to them. They do not need access to clinical data.

Conclusion

These considerations are very basic. They require no esoteric knowledge. But thinking through them will help you arrive at your own conclusions about whether your data is really safe. Remember these basics:

  • Be proactive about security.
  • Never take lightly the human factor.
  • Ensure third-party vendor security.
  • Apply the “need to know” concept.
  • Get help from a professional IT managed services provider if you still feel uneasy about your data’s security.

How Difficult Is Collaboration In Today’s Law Firms?

Law Firm Collaboration

Communication—this is so important for the proper running of any business; however, it is even more essential for law firms where the stakes are arguably much higher. Over the years, communication between attorneys and their clients was a time-consuming process that depended primarily on scheduled face-to-face meetings and paper documents being mailed or hand-delivered for review and revision.

Law Firm Collaboration

As in-office communication has evolved, fax machines, and then e-mailed messages allowed for a quicker turn-around for sharing documents and information. Unfortunately, this did not make collaboration with others, whether in-office or across the country, any easier. E-mail is notoriously inefficient for collaboration, since it is not totally secure, and as an e-mail chain of correspondence grows longer, it can become difficult to keep track of specific information. Important or sensitive info can become misplaced, or even mistakenly deleted.

Although initially costly and complicated, the platforms in the early 2000s made digital collaboration and sharing possible, especially for larger firms willing to invest in them. As technology continues to improve, it becomes increasingly easier to update and advance to the next level of IT solutions for firms of every size.

Modern methods of collaboration provide more security, better organization, and quicker ways to share ideas, as well as documents. Faster speeds, of course, directly correlate to how much one is able to get done in every given billable hour. As the old adage goes, “Time is money.”

What Do Collaboration Platforms Include?

An attorney’s day is often hectic consisting of communicating with new and existing clients, formulating strategies with associates, and managing cases. Add to that such tasks as updating calendars, logging hours, and making case notes. Often, each of these activities occurs using different management tools, requiring busy individuals to log in and out, consuming valuable time better spent on more important business.

With a collaboration platform, law firms are able to keep all billing and calendar systems, document sharing, emails, messaging, and video communications in one location. It should be available to each attorney and staff member affiliated with the firm who needs to view it. Granting access to all employees can be a big security risk.

Available on your desktop, laptop, or mobile device, collaboration platforms keep all communication in one convenient location. They allow users to chat one-on-one or with a team. In addition, they can organize messages and documents, share quick and concise memos, and start or join a video conference. Collaboration software also enables associates to share computer screens and documents, which facilitates ongoing team conversations. This provides a method for each associate to begin and end his or her day on one platform for ultimate efficiency.

How Does New Technology Improve a Law Firm’s Ability to Collaborate?

Modern law firms realize that effective communication and better organization methods improve their ability to serve their clients. This will also increase their productivity and profits. Collaboration involves individuals with different specialties and strengths working together to produce superior outcomes.

Whether participating colleagues are interacting in person or across a distance, everyone needs to be able to share documents, ideas, and information. Video conference capabilities allow collaborators to speak “face-to-face” even though they are communicating remotely.

As a team of attorneys build on the ideas of each other, brainstorming, combining knowledge and perspectives, they are able to create something that is greater than what each could provide individually. At the end of the day, each has a record of all relevant documents, emails, and messages available via a mobile application on their choice of electronic device.

How to Choose the Right Collaboration Platform

Collaboration software continues to influence how law firms view communication in the office but choosing the right one can be daunting. Savvy buyers look for a straightforward, user-friendly option that provides consumer support and training. They should select a platform that includes the ability to integrate some of their key programs with the existing systems, so work continues uninterrupted. Choosing software that is capable of automatic updates is advised. In fact, access to analytics, depositions, legal research, and AI software are not out of the reach for future options.

Consider choices that allow the administration to set the controls for the system and monitor the initial adoption and use of the platform, as well as ensure associates are complying with all data security standards. Piloting the collaboration platform with a small team eases the organization into the new techniques and allows the administrators to work out any issues before releasing it to the entire firm. This can prevent glitches and time-consuming problems.

In Conclusion

Technology continues to advance and online collaboration is no longer considered a new idea. As innovative technology platforms develop, they will increasingly be demanded in the office. The ability to collaborate online benefits both clients and their legal counselors. Clients no longer have to contact the office to request a hard copy of their file. By using an online portal, all parties involved can review, revise, and comment on documents instantly and conveniently on their personal computer.

As the dynamics of the legal workplace change, organizations must adapt and implement the most efficient and modern options available. Collaboration platforms are a logical and integral part of the legal office’s larger IT approach. Clients expect their lawyers to remain relevant, and law firms that fail to update, are not supplying their clients with the best experience or the most successful results.

How Can Workforce Management (WFM) Software Help Me?

Workforce Management

Workforce management (WFM) software is an all-encompassing term for mobile and desktop programs that are created to support a business at managing its staff scheduling. The software began in call centers and other service businesses that have a large number of workers who are normally paid by the hour.

Workforce Management

Helping a company gain insight to utilize business metrics, WFM software gives management the ability to better judge the number of service agents that are needed or the number of people it takes to make a product within a certain amount of time.

According to Gartner Inc., one of the top research firms, workforce management software has five main roles:

Labor scheduling:

Help administer employees’ skills and compliance requirements more effectively.

Time and work data collection:

Capture and give very detailed information about the best use of labor.

Leave management:

Process paid time-off requests with a keen understanding of the staffing and liability implications.

Task and activity management:

Provide a detailed view of labor-management requirements to help with complex decision making required for activity-based management.

Time and attendance:

Receive feedback from other modules and employ rules alongside the reported times, based on the company’s needs.

Let’s break down the benefits of using workforce management software as your company begins to experience the positives and negatives of growing.

Engaged Employees Lead to a Better Customer Experience

A national poll has shown that 51% of workers in the United States do not feel engaged. These employees cost their employers as much as $300 billion each year, according to that same poll.  Forecasting manually may mean your organization is spending too much time scheduling agents at times when they are not needed and not scheduling when they are in high demand. At the same time, it is far easier for you to over- or under-schedule your employees, which then leads to both employee disengagement and, ultimately, customer dissatisfaction.

The use of WFM software for your company has the ability to achieve the following:

  • Administer work scheduling, paid time-off requests and day-to-day business happenings.
  • Collect time and labor data.
  • Evaluate past performance and call volume developments.
  • Accurately predict staffing and scheduling demands.
  • Foresee unexpected events which will help you know when to add incentives or give encouragement to your employees.
  • Add labor flexibility to provide multiple scenarios that simulate future scheduling restraints.

Having accurate quantitative data that WFM software provides will help you assess and understand your employee’s satisfaction and engagement levels. This will ultimately guide you to providing a quality work environment where engaged employees will transfer this positive experience directly to your customers.

The Use of Real-Time Analytics Will Help You Predict the Future More Accurately

As WFM evolves, the next generation of this software will combine real-time, speech, and emotional analytics with agent-enabled workflow engines and computer telephony integration (CTI) applications. What this ultimately means for your business is that it will help managers stay one step ahead of developing situations.

These accurate clarifications allow managers to apply emotional or voice analytics, which can help them better understand what is happening in real-time in the call center. Also, while staying informed about the current work environment, it allows you to include a process that automatically notifies customer agents and gives them suggestions for handling high volumes or escalated customer related issues.

For example, your company has just rolled out a new product that has an unforeseen issue or glitch. The advanced WFM software will be able to detect an issue, alert management, and give up-to-the-minute feedback and advice to the customer service department so they can have ready solutions for the upset customers.

Can Workforce Management Software Help With Compliance?

Having proactive processes that address issues before they emerge, will also allow managers to ensure that the company complies with all call-recording requirements. These requirements include the Payment Card Industry Data Security Standard (PCI DSS), HIPAA, and the General Data Protection Regulation (GDPR). With these requirements and policies always changing, this gives you the peace of mind of avoiding potential penalties in the long-run. The newest workforce management systems guarantee your organization complies with these regulations and has records for all of the calls just in case you get a surprise audit.

Helping Your Business Launch to a New Level

Workforce Management (WFM) is a strategic asset in advancing your business goals of providing the highest-quality customer service at the best rate. In today’s need for quality customer service, interactions take on ever-evolving shapes and forms. WFM creates forecasts and schedules for agents with various skills who are handling customer and employee interactions in a variety of ways. WFM enables managers to create proposed future schedules, agents to bid on the schedules, and managers to incorporate the bids into final schedules.

Conclusion

Having the ability to maintain employee engagement and customer satisfaction will give you the opportunity to focus on the quality of the product or service that you are creating. Ultimately, it provides the needed tools to move your company to the next level. Experience continued growth and success with today’s innovative workforce management software.

What The Rise In API Data Breaches Means For Your Network

The increasingly digitalized world we live in has a lot of benefits in business and in relationships, but with it also comes a whole new host of problems, including a rise in API data breaches.

API Data Breaches

A number of high-profile companies have been affected by API data breaches in recent years, allowing other businesses to learn from their mistakes in regard to cyber attack prevention. It can be difficult to regain public trust once a breach has occurred, not to mention the legal ramifications of not carefully storing your users’ information properly. Performing a vulnerability test on your system can help identify areas of weakness.

Given the vast variety and differences between potential attacks today, there is no easy solution to data breaches, and the right approach to prevention can depend on numerous factors. API security, in itself, is complex, and before you can come up with a good game plan, you must understand what you’re up against. While today’s cyber attackers are finding new ways to infiltrate networks all over the globe, there are a few common attacks you’ll need to keep an eye out for. Familiarizing yourself with these will help you form an effective plan for prevention.

What Are Some Different Types Of Data Breaches?

Data breaches can be the result of a variety of different attacks. Three of the most common include man-in-the-middle attacks, session cookie tampering, and distributed denial of service attacks. Each of these is unique in the way it is conducted, and which type of information may be at stake. Here, we’ll break down what these are and how you can shield against them.

Man-In-The-Middle Attacks

Man-in-the-middle attacks are common in today’s cyber world. In this scenario, there is the victim, the system they are interacting with, and the “man in the middle”, which refers to a person attempting to intercept a victim’s data. In order for this cyber breach to be successful, the victim must not know about the man in the middle. Some tactics man-in-the-middle attacks utilize include IP spoofing, DNS spoofing, Email hijacking, HTTPS spoofing, Wi-Fi eavesdropping, and stealing browser cookies.

The typical MITM attack requires that the attackers gain access to a poorly secured Wi-Fi router, which is commonplace in public areas that offer free Wi-Fi hotspots for guests. This may also be the case in a person’s home, where a Wi-Fi network may not require a password. Once attackers detect vulnerability in a network, they can intercept a victim’s data using different tools, then insert these tools accordingly to gain access to the different sites a user visits. Once the data is intercepted, the attacker will unencrypt the data to gain access to protected information.

Session Cookie Tampering

Cooking poisoning and cookie tampering are used to describe an attack where cookies, or pieces of data stored in a particular user’s browser to track information from websites, are modified to bypass security in hopes of infiltrating a network. A cyber attacker, who is using cookie tampering, might gain access to a user’s account via false information, such as tricking a particular server into accepting the new version of the intercepted cookie once it’s been modified.

It can be fairly easy to carry out cookie tampering if a web developer of the application didn’t carefully store information prior to the attempted attack. This is especially true when key parameters have been labeled and are therefore simple to identify. A strong web application firewall can help prevent cookie tampering by detecting a cookie’s “set” commands and only accepting them if the information held within is verified.

Distributed Denial Of Service Attacks

DDos, or distributed denial-of-service attacks, are also common in today’s digital realm. This is a type of attack in which more than one compromised system attacks a target, causing the denial of service for other users. This type of attack has been utilized by a variety of groups, including individual hackers, government agencies, and even organized crime rings.

Post-Assessment Tips

Once an assessment of your network and potential vulnerabilities have been conducted, you should take the appropriate steps to alleviate the issues found therein.

To begin, start with the basics. Maintaining a solid inventory of your APIs is the first step you should take to ensure you’re protected against attacks in the future. Once you’ve done this, you can begin to develop and implement an effective set of security policies, which can include authentication and authorization, traffic management, and training on how to detect content threats.

You might even consider an API management gateway to up the ante on protection. It is also a wise idea to evaluate your existing platform vendors. Often, third-party vendors represent a weak security link. Remove sensitive data in your API URL path as well.

As you can see, network security requires a layered approach. There are certain techniques that work better for some businesses. A great IT specialist can help you find the best combination to provide your business with a good line of defense against the wide range of cyber threats.

Third-Party Vendor Breach and Subsequent Delays in Reporting Now Result in Major Problems for an Orlando Healthcare Provider

A recent breach left the protected health information (PHI) of more than 19,000 patients in Orlando, Florida completely exposed online for two months before it was detected. What is more concerning, however, is why it took the group of clinics involved five months to report the breach to the Department of Health and Human Services, and six months to alert the affected patients.

HIPAA Data Breach Orlando

How the Breach Happened

The Orlando Orthopaedic Center in Florida hired a 3rd party vendor to handle their transcriptions, as do many clinics and health centers. When the vendor was updating their software during December 2017, they made a serious mistake that misconfigured access to one of their databases. That configuration issue left their server open to the public and accessible over the internet. Anyone who desired could access the patient data stored on that server, and they could do so without any authorization needed. It was two months before the mistake was discovered.

Impact of the Breach

This breach left 19,101 patient records seriously exposed, which was not only a major HIPAA violation, but a situation that could easily result in identity theft. Once the breach was recognized, investigators discovered that a great deal of information had inadvertently been made publicly available. This included names, insurance details, dates of birth, medical treatments, employers, and, in a limited number of cases, social security numbers. Fortunately, no financial information (debit card numbers, credit card numbers, bank account numbers, or other financial records) were exposed during the breach.

All patients that received treatment from any Orlando Orthopaedic clinic prior to January 2018 would have been affected by the breach. Investigators were not able to determine if anyone had gained access to what should have been PHI, and none of the affected individuals have, as of yet, reported identity theft or misuse of their PHI. However, the investigators were still unable to rule out the possibility of information theft or unauthorized access to patient information.

Aftermath of the Breach

Orlando Orthopaedic did not find out about the breach until February 2018, two months after it occurred. However, it would be almost six months before the affected patients were notified by mail. The clinics involved have yet to provide a reason for the delay in notification.

As a result of the security breach, Orlando Orthopaedic Center employees are receiving cybersecurity training even though they were not directly responsible for the problem. In addition, the affected clinics are taking additional security measures to ensure that PHI stored both on their own servers, as well as accessible through endpoints, are all secured.

The transcription vendor responsible for the breach has offered all the affected patients one year of free credit monitoring and identity theft protection and restoration services. The vendor has also made changes to their security to ensure that information on their servers remains protected from prying eyes.

In addition, all patients involved have been advised to closely monitor their insurance Explanation of Benefits statements, as well as their other accounts for any signs that their PHI is being used fraudulently. In the event that a patient sees unusual activity, they should notify their insurance provider immediately.

Who Is Responsible?

Even if a 3rd party vendor or business partner is responsible for causing the breach, the healthcare provider is still held legally responsible. In this case, Orlando Orthopaedic is the responsible party even though it was the security of the vendor that was lax, a situation over which they had no direct control. This reinforces the fact that healthcare providers must be thorough in vetting potential vendors.

Concerns about Delays

As already mentioned, it took Orlando Orthopaedic six months to notify their patients of the PHI breach and five months to notify the Department of Health and Human Services Office of Civil Rights (OCR). The OCR should have been notified 60 days after discovery of the breach, according to HIPAA guidelines, not five months. The same deadline applies to notifying patients.

No doubt a fine is to be expected. Presence Health delayed reporting a breach to the affected patients and OCR 40 days past the 60-day deadline. Their fine amounted to $475,000, and was the first case of a HIPAA breach fine for the untimely reporting of a breach of unsecured PHI.

Conclusion

Even if the breach of PHI is caused by the carelessness of a business partner (including 3rd party vendors), the healthcare clinic is still the entity held legally responsible. There is a 60-day deadline for notifying OCR and the affected patients, and failure to meet this deadline will most likely result in a punitive fine. Failure to notify the patients right away can damage the reputation of the healthcare provider. Even offers of credit monitoring and identity theft restoration cannot undo the negative effects of the breach.

Girls in Tech: Girl Scouts of the USA Adds New Badges

Girl Scouts of the USA recently announced the addition of 30 new badges now available for Girl Scouts aged 5-18. The new badges were created to address a number of today’s most important social issues, including environmental advocacy, cybersecurity, robotics, computer science, and space exploration, among others.

Girl Scouts New Tech Badge

Girl Scouts of the USA has long served as a means for young girls to acquire life experience and develop a number of important soft skills, which include perseverance and confidence. The benefits of participating in Girl Scouts are proven. According to one study, Girl Scouts are over twice as likely to demonstrate community problem-solving skills compared to those who do not participate.

The Cybersecurity badge, funded by Palo Alto Networks, will introduce the girls to a variety of age-appropriate internet safety and privacy principles. They will first learn how the internet works, then learn techniques to spot, report, and further investigate cybercrime.

Cybercrime is on the rise, and the Girl Scouts are in a unique position to influence young girls all over the nation. According to the FBI’s 2017 Internet Crime Report, cybercrime resulted in more than 300,000 complaints last year with losses reaching upwards of $1.4 billion. Raising awareness about cybercrime is just one step toward combatting the problem, and with the help of their sponsors, the Girl Scouts are on their way toward arming a new generation of young people with the tools they’ll need to make a difference in internet security.

New Leadership Journeys

In addition to the cybersecurity badge, the new badges include two additional Girl Scout Leadership Journeys to help girls on their path to growth. Girl Scout Leadership Journeys involve hands-on activities to help girls utilize their new skills to tackle problems within their respective communities. These programs prepare girls to achieve success in fields like computer science, robotics, and cybersecurity.

Funded by Raytheon, “Think Like a Programmer” offers girls a valuable foundation in computational thinking, which will serve as the basis for next year’s Cyber Challenge, a first for the organization. The Think Like an Engineer Journey will help girls further understand how engineers approach and solve problems.

Phase one of the national computer science program for middle school and high school-aged girls has been run as a pilot in a small group of geographies since earlier this year. The program is expected to expand nationwide in the fall of this year, with select groups of Girl Scout councils piloting the upcoming Cyber Challenge next year in 2019.

Raytheon & The Girl Scouts: A Partnership

Raytheon Company, headquartered in Waltham, Massachusetts, is a leader in technology and innovation in civil government, defense, and cybersecurity solutions. With a history spanning nearly a century, Raytheon operates in more than 80 countries. The company has a long history of partnership with several Girl Scout Councils. It is the inaugural sponsor of the Girl Scouts’ computational thinking program, which will expose the girls to age-appropriate content across areas such as science, engineering, technology, and math.

Although women made up half of the current college-educated workforce, only 29% work in occupations dealing with science and engineering. The new partnership with Raytheon seeks to increase the number of female STEM leaders by encouraging girls to explore an interest in these fields early on. In fact, the Girl Scout Research Institute, GSRI, compiled a report, the Generation STEM report, which determined that 74% of teen girls demonstrate an interest in STEM fields; however, this interest fades as they get older and move on through middle school and high school. The decreased interest is thought to be the result of a lack of exposure to STEM fields in ways that pique their further interest and inspire ambition.

In 2017, the Millennial Cyber Security Survey, conducted by the National Cyber Security Alliance, NSCA, found that the majority of female Millennials said that more exposure to STEM information, training, and classes during their middle school and high school years would have had an impact on their interest in cybersecurity careers. These new badges will strive to empower young girls to achieve their goals across all industries, particularly those currently dominated by males.

History Of Girl Scouts

The Girl Scouts of the US have been making a difference across the nation for nearly a century. The first Girl Scout troop was established in 1912 in Savannah, Georgia by Juliette Gordon “Daisy” Low. Since then, the organization has grown exponentially, culminating into a membership of more than 2.6 million. Today, they continue to operate under the principles of courage, character, and confidence in hopes of making the world a better place.

 

Email Scam: Sage and Clare Homewares Business in Victoria, Australia Loses $10,000

How Can I Keep My Business Safe From an Email Scam?

Recently, small business owner, Phoebe Bell of Sage and Clare, a popular homeware designer business in Australia, opened up about her company falling prey to email scammers. Sage and Clare lost $10,000 from the hi-tech thieves who Bell says were most likely tracking the company’s emails for months.

Email Scam Warning

As they have done countless times before, Sage and Clare placed a routine stock order with an unnamed supplier. In fact, Bell handled the order herself, emailing back and forth with the supplier about the order for several weeks.

In the midst of negotiating the order, the supplier informed Bell they had a new bank account to pay the money into for the order. Again, this was nothing out of the ordinary, Bell says because suppliers often change bank accounts.

After paying the $10,000 into the supplier’s “new account,” Sage and Clare discovered that their business was the victim of a scam, where a third party posed as the initial supplier. The scammers most likely hacked emails and read through the correspondence between Sage and Clare and the supplier, intercepted the specifics, and then redirected the payment funds.

Fortunately for Sage and Clare, they have the capital to recover from this loss. For some small businesses, losing $10,000 would cripple them.

Ms. Bell said that she was both embarrassed and distressed that this sort of thing could happen to her. She thought that she was smart enough to spot a dirty trick like this. When she opened up about the incident online, she found that many others had gone through a similar experience. She says that if someone had broken into her shop and stolen $10,000, the local police would come out and do a full investigation. But since the incident happened online, there’s nothing the police can do. She did report the theft to her bank, the Australian Federal Police, and the Australian Cybercrime Reporting Network (ACORN).

How Can I Train My Team to Spot Hackers?

How can you keep your business safe from these types of email scams? What kind of safeguards can you put in place to ensure that your business does not fall prey to thieves prowling for businesses who practice naive online transactions?

5 Effective Tools to Keep Your Australian Business Safe from Hackers in 2018

Routinely Train Your Employees

Almost 90% of Cyber Attacks are Caused by an employee’s human error or an honest mistake, according to a cyber consultant, Willis Towers Watson. These circumstances are commonly a result of employees giving sensitive information to hackers who pretend to be clients in need of information.

Routinely scheduling an online security awareness training for all your team will keep your company updated and vigilant to fend off hackers.

 Improve Your Technology

Having anti-virus software in place to protect your company’s site from viruses and malware is the first step in good cybersecurity.

It is essential to have the software updated on a regular basis. We all get the update software notices, and it’s easy to ignore or delay the update to the next day, week or month. Make sure your IT department stays on top of all updates and patches. This will ensure that each computer is up-to-date.

Here are some questions to ask yourself and your team to ensure you are protected from viruses and malware:

  • Do we have firewall protection?
  • Are our passwords strong?
  • Do we use two-factor authentication?

Being able to confidently answer these questions will give you peace of mind that you are doing your best to keep your business safe from cyber-attacks.

Keep a Tight Rein on Internet Access

This key step is often overlooked by employers but is so important. Your IT department can set up your computers so that they cannot access risky sites. Make sure that important company information can only be accessed by a chosen few.

Another good tip is to make it a practice to stay informed about current online data breach scams. Routinely making a habit of following a blog that reports the latest hacking news will help you stay vigilant.

 Don’t Keep Unnecessary Data

It isn’t necessary to store old data or customer information that is outdated or no longer useful for the company. Too often, though, companies don’t take the time to purge old records. Instead, they end up keeping information such as credit card numbers and other sensitive information in their system for customers who are long gone.

When the information is of no further use to your company, have a system in place where it is deleted. This will ensure that you avoid the risk of revealing unnecessary customer information if you are breached.

Adhere to a Phishing Awareness Checklist

Sticking to a protocol of routinely checking off safety practices will keep you aware of potential phishing attacks.

Here are some suggestions of important checklist questions you may want to include:

  • Do you recognise who’s sending the email?

If not, hover your mouse over the “From:” field to check for the right domain (i.e., an email from Yum Dog Treats should have a domain name of yumdogtreats.com).

  • Can you identify the sender’s email address?

Don’t open anything when their name is not matched up with the email address. If “Katie Jones” from “Yum Dog Treats” sends you an email, her email address should most likely say something like kjones@yumdogtreats.com, not kjones1989@gmail.com.

  • Is there an attachment the sender wants you to open?

Be suspicious of all attachments, but especially ones that have two extensions (i.e., file.doc.scr) or small files that are zipped.

  • Is there a link from the sender?

If so, does the URL convey the message of the email? You can simply hover your mouse over the link to check the URL to read it.

Conclusion

With the current situation, cyber-attacks are increasing dramatically in Australia and around the world. No one is safe. It’s every person’s duty to remain informed and aware of these scams. Ms. Bell learned her lesson the hard way and it cost her $10,000 to do so. You may not be financially able to learn such an expensive lesson.

Do You Know How to Spot Fake Software and Updates? Learn the 7 Red Flags!

If you are connected to the internet, then you are a target for malware, viruses, and hackers. Every day, 350,000 new malware programs come to the surface. Your firewall and anti-virus protection can only provide so much security. That is why it is very important that you know how to spot fraudulent software and fake updates. Fortunately, there are several common red flags that you and your colleagues can learn to watch out for.

Software Updatest

Red Flag #1: An Offer to Scan Your System Pops Up on Your Screen

Be very wary of software pop-up ads! If an ad (often disguised as an alert) pops up unexpectedly on your screen and offers to scan your computer for malware or viruses, do not click on it. There is an extremely high probability that the real malware or virus is the downloadable software itself. For example, many of these fake software pop-ups will install a keylogger that records your keystrokes, including logins and passwords – which compromise your system and any accounts that you access through the infected computer. Anti-virus and anti-malware software should only be purchased and installed from well-known, reputable sites.

Red Flag #2: You Receive an Alert That Your Device is Full of Viruses

If an ad is warning you that it has already discovered multiple viruses on your computer, this is another red flag that the software is fake. If you click on the ad, then it will offer to install software to clean up your computer — but the truth is, this program will infect your computer with viruses or malware. This is not how real antivirus software actually warns users.

Red Flag #3: Software Suddenly Demands Your Information

The sneakiest of software scams are often introduced to your computer through an infected email that provides a way for malware to be installed on your system. This malware will provide you with an alert that looks very much like a legitimate anti-virus software alert. If you click on the alert, it will eventually request your credit card information or your personal information. Real anti-virus software never does this.

Red Flag #4: You Receive an Email with an Update Link

If you receive an email with a link to update, beware. The vast majority of modern software and apps will alert you through the software itself or via the system tray when an update is imminent, not with an email. Chances are that the update link in that email will install malware or result in a drive-by download. Beware of emails like this. They should not be opened; much less should any links inside them be followed.

Red Flag #5: A Pop-up Appears That Informs You That You Need to Update A Plug-In

Many of us have problems browsing the web when a pop-up appears via our web browser and tells us that a particular plug-in, say Adobe Flash, needs to be updated or we cannot view the page. These pop-ups can be incredibly convincing, with authentic looking logos. But do not be deceived. This is malware. That is not how a reputable software company will let you know that an update is needed. Never update your software through a browser pop-up.

Red Flag #6: You Receive an Alert from Software You Don’t Own

This one might seem a bit obvious, but many people don’t keep track of what software is on their system, especially if it is a work computer. Because of that, it can be easy to fall for a serious looking alert and click on it before making sure that software in question is something that is actually installed on the system. This trap is more common in businesses than on personal computers, but equally dangerous for both.

Red Flag #7: You get a Pop-up Alert That Your Browser is Outdated

Once again, this is not how modern browsers let you know that you are running an outdated version. This particular scam started making the rounds in February of this year. It detects what type of browser you are using and tailors the pop-up to that browser, with pretty convincing graphics.

Being Smart

Make sure you know what software you actually have installed on your system, especially when it comes to anti-virus software. Be familiar with how that software alerts you that an update is needed, and whether or not it automatically updates. Do not trust updates by email, or any browser pop-ups that try to get you to install something. Be careful about letting a program have access to your computer, or update your browser. Legitimate companies do not use those methods!

Conclusion

A little awareness and common sense can go a long way in helping you and your colleagues to avoid falling for scams that can compromise cybersecurity. In an age of ever-evolving cyber threats, a healthy dose of suspicion can go a long way toward protecting your computer from malicious software and internet scams!