How To Ensure A Secure Home Network

Home Network Security

Most homeowners and renters understand the importance of home security. In fact, in today’s world, it’s not uncommon for homeowners to spend hundreds or even thousands of dollars on home protection. But while securing your belongings is considered good common sense, homeowners don’t as often consider the concept of data security. This is understandable, but in reality, it’s just as important to ensure that your data is protected as well.

Home Network Security

Unbeknownst to many, your home’s security system and its surrounding technology may even leave you susceptible to a data breach. These have the potential to wreak havoc from a personal data standpoint. Paying close attention to the technology you are using to protect your home can help you avoid the ever-growing risk of a cyber breach.

Here are a few things homeowners can do to keep their networks protected.

Strengthen Your Wireless Security

Securing your wireless router is paramount to effective data security. Your wireless networking security will depend heavily on the health of your router.

One useful tip?

Don’t leave your Wi-Fi on unless it’s necessary. This means that if you and your family are planning a long trip, don’t forget to turn your network off.

Other precautions include disabling your Wi-Fi Protected Setup, or WPS. The WPS is intended to make it easier for those within your household to join the central Wi-Fi network. However, it can also be used by hackers to gain unauthorized access.

Configuring your Wi-Fi’s signal strength is also important. Casting too wide of a net can leave you susceptible to outside hackers. As a security measure, configure it so Wi-Fi is only accessible to those within your home’s area. You can also disable your network’s remote management, and be on the lookout for any unknown devices or connections showing up on your network.

Update Your Software

Keeping your security systems up-to-date is important in ensuring nothing falls through the cracks. Applying updates and patches ensure you are running the most recent technology available for your device.

Your work doesn’t stop at updates, though. Installing an anti-virus solution built to detect, prevent and clear your system of viruses ensures a strong line of defense against hacking. While antivirus solutions won’t protect your system from, say, zero-day exploits, they can be helpful in preventing malware from entering your devices.

Install A Network Firewall

Firewalls are extremely useful in maintaining the security of your systems. This type of solution blocks unauthorized users from acquiring access to your private data. Installing a firewall is a solid step toward keeping your data safe. These can be installed via software, hardware or a unique combination of both.

Back Up Your Data

Computer users understand the frustration that comes with a hardware failure. In the event that this happens to you, it’s best to be prepared. Keeping a solid backup solution will give you peace of mind in the event of an accident. Test your backups thoroughly and regularly by creating dummy files and deleting them, or scheduling a day to unplug and determine how long it takes to get your system up and running. All this can help you form a legit plan of action to help you recover from a hardware failure.

Maintain Strong Encryption

Configuring your router improperly can pave the way for a data breach. You should use the strongest possible encryption methods for your device. Some of these protocols may include Wi-Fi Protected Access 2 (WPA2), Temporary Key Integrity Protocol (TKIP), and Personal Advanced Encryption Standard (AES).

Here are some tips to help you create a strong line of defense against a breach.

Update Your Router Password

It can be tempting to begin using a new router fresh out of the box, but be cautious. While your router has a set password, it may be easy to guess, or worse, printed right on the router itself. Changing your router’s password to something safe and known only by you is necessary if you’re hoping for optimal protection. The same goes for your Network name. While these typically come standard, you’ll want to change yours, though be careful not to include personal information such as your last name or address.

There are some things you can do to ensure a strong password. First, avoid using the same one for all of your accounts. If your password is stolen from one site, all other accounts for which you use it may be put at risk. You also shouldn’t share passwords with anyone or divulge them to anyone.

Approach Email With Caution

You may have taken all the necessary precautions to keep your home network secure from hackers, but often it’s not the technology that’s to blame for a breach. While it’s true that cyber criminals take advantage of unencrypted data, an inadequate firewall or out-of-date software, they also frequently target individual users. E-mail, for instance, is one of the most frequently used platforms by hackers. And while these attacks can hit suddenly and without warning, there are still things you can do to protect yourself.

If you receive an e-mail from someone you don’t know, don’t answer right away. Always first verify the person’s identity before responding. If you suspect an email from an organization may contain malware, first contact the company directly before replying. One giveaway is a misspelling in the URL of a malicious website. Also be sure to never share personal or financial information via e-mail or telephone.

Don’t leave your data security up to chance. All of these steps combined can help you form a solid plan for preventing a cyber breach.

 

Implementing Data Security For Your Small Business

Small Business Computer Security

Today’s small business owners are tasked with managing operations, employees and a wide range of things pertaining to the modern day business. It’s no surprise, then, that amid the hustle and bustle, some areas of importance are thrown to the wayside. Cybersecurity is often one of them.

Small Business Computer Security

According to studies, the majority of small business owners don’t believe their businesses are at risk of a cyber attack. This mindset is dangerous for business owners because they will not be prepared for a cyber-attack. In the event of an attack, it can wreak havoc on a small business that hasn’t yet armed itself with proper security protocols.

According to the Ponemon Institute, cyber-attacks cost small and medium-sized businesses an average of $2,235,000 in 2017. In order for small businesses to form a strong line of defense against cyber attacks, they’ll first need to evaluate their risk, and what’s at stake. Here are a few things small businesses should consider when preparing to amp up their data security.

Securing Your Data

Implementing solid data security for your business is a complex task that requires manpower. And although it can present quite the conundrum for small business owners, it’s something that, according to the FCC, must be done.

First, you’ll need to evaluate your current system. Which data do you actually need? While keeping customer data is important, it’s just as important to only ask for customer information that will actually be utilized. For instance, don’t ask for a social security number if you don’t need it.

The same notion applies for how long to keep this data. Don’t store your customers’ data longer than needed. The longer you keep it, the longer you are liable in the case of a data breach. And if you don’t have a retention policy in place, it’s time to implement one. Don’t forget that hand-in-hand with a retention policy is a process for how to delete the data. Do keep this in mind.

Strengthening Your Passwords

Implementing a strong password policy can make all the difference in keeping your data protected. Complex, unique passwords are paramount to data security, but how can you be sure those you’re using are really up to par?

You may want to look to the NIST for a list of digital identity guidelines that can help clarify what you should and shouldn’t be doing when setting new passwords. From two-factor authentication to the inclusion of symbols and capital letters, there are plenty of ways to strengthen your passwords to minimize the risk of an attack.

Establishing Network Segmentation

While, yes, one of the main goals of a small business should be to have a reliable network set up for operations, there’s a lot more to be done to ensure adequate data security. If your office frequently has customers traveling through your space, it’s best to implement a separate network that will prevent access to your data by just anyone. Doing this both minimizes the impact on your employees’ network and keeps internal data safe.

Don’t Ignore Updates

A constant bombardment of update notifications is annoying, and can even hinder productivity. And although it’s tempting to ignore these and push on with your work, updates are important in keeping your systems working properly. This is why it’s so important to stop ignoring them. In fact, small businesses should adopt a policy for updates and scheduled maintenance to ensure things aren’t falling through the cracks. A service provider can help you keep all your devices inline with the most current standards, and ensure updates are carried out accurately and within the proper timeframe.

Training For Success

If your business is one that employs mobile workers, data security becomes a bit more complicated. You’ll need to ensure these mobile workers’ devices are as secure as those within your office. Keep in mind that deleting company information in the event of a lost or stolen device is crucial.

A company may have the very best security in place to protect their data, but all it takes is one employee incident to destroy the reputation you’ve built. If your company’s salespeople do not require access to secured customer ddatabases don’t authorize them to use it. Giving access to crucial data only when it’s needed can help you minimize the chance of a cyber-attack.

You may be doing a fantastic job at training your employees for proper data security, but human error will always be an issue. This is not something you can prevent entirely, but you can teach your employees what to look out for. You can also help them understand the negative consequences associated with data breaches and the true impact of failing to be alert.

Data security for your small business is definitely not something you want to ignore. As an entrepreneur, you are likely both excited and weary of what’s to come. Don’t let a data breach put an end your empire before it starts.

Wi-Fi On Planes – Who’s The Best?

WIFI Planes

If you are old enough, you may remember when making phone calls from an airplane was an expensive luxury, with sound quality so bad that conversations at times were impossible. Times have changed. Calls from planes are usually clear and carried over satellite connections. The big electronic question mark in the sky is not whether Wi-Fi is available, it is, how good is it?

WIFI Planes

So How Do We Rate The Quality Factor?

Different flight amenity rating services use various methodologies, so one has to dig to get useful information. Traveloka, a major booking site for Southeast Asia, ranks the top 50 carriers on aspects like speed, quality of signal, availability of USB ports, etc. According to them, the top three airlines for Wi-Fi service are Qatar, Emirates, and Delta, in descending order.

Digging a bit, one finds out that the fastest Wi-Fi available is on British Airways, which has speeds up to 20 Mbps (your mileage may vary.) In contrast, Emirates, Etihad, and Eva offer a top speed of only 2 Mbps. Obviously, this is not going to support streaming from Netflix and video conferencing.

Theoretically, even HD video conferencing should require only 384 Kbps (see here.) But we’ve all had the experience of video conferencing where lagging was an issue, even on connections that are high speed. The devil is in the details; the need for bandwidth goes up with each separate device used for the video conferencing, and for the bridge that ties it all together. The bridge has to have access to adequate bandwidth to provide all the images and sound streams at the same time. Of course, the speed with which it goes to the PC or phone depends on the bandwidth from the Wi-Fi transmitter to the user’s device.

The most important question in choosing an airline for Wi-Fi service is knowing what you need. On airlines though, you may not have much of a choice, especially if looking for low airfares. If you will absolutely need video conferencing during the flight, Qatar is about your only choice. Qatar pledges speeds up to 50 Mbps, but Traveloka rated the average speed as only 8.

(See this article from CNN travel for a summary that is a bit easier to interpret than Traveloka’s. )

What Does It Cost?

Emirates Air offers the first hour free and unlimited usage for the rest of the flight is only $10. Delta offers unlimited access for the entire flight for $16. Surprisingly, JetBlue, known as a discount airline, is now offering Wi-Fi but there are no details yet as to cost.

Singapore Airlines, rated the best in the world, offers only 1.17 Mbps for $8.80, but oddly, does not offer the ability to make phone calls. All-Nippon Airways (ANA) offers only 0.56 Mbps at a cost of $9.43. On Hong Kong Airlines and China Southern the service is free. Emirates does offer 20 Mbps, but it has to be used within two hours.

What’s The Underlying Technology?

In-flight Wi-Fi is provided by satellite. The plane has an antenna that picks up the signal and broadcasts it inside the cabin. Since all airlines get the same quality and speed of the signal from the satellite, the speed, and quality within the cabin depends on the hardware that the airline has installed.

If an airline wants to provide 50 Mbps, which is comparable to home or business internet service from a cable provider (not fiber optics) in the United States, it can do so. It’s just a matter of will. Since the equipment needed to offer 50 Mbps and the equipment needed to offer 0.56 Mbps are similar in price, it is a bit of a mystery why all airlines that provide the service do not offer the higher speeds.

And if some airlines provide it for free, why not all? No immediate answers forthcoming. One item of note is that with satellite Wi-Fi, as with many earthbound internet service providers, uploads are much slower than downloads.

Incidentally, virtually all the reporting on Wi-Fi availability and quality on airlines comes from the 2016 Traveloka report.

What’s The Upshot?

Even if you’re on one of the airlines that Traveloka rated as among the best, your Wi-Fi speed will vary. Some things that are easy to do in the office will be difficult to impossible while in the air. It’s best to plan accordingly. Do not schedule a critical meeting with the chairman of the board while you’re on a flight on Singapore airlines; this is just not going to work. Even email may be dicey in flight.

The moral of the story is that doing serious business that demands strong connectivity is best done on the ground, not while in flight. If it’s absolutely necessary, then plan accordingly before you leave the office and take to the road. People who travel a lot will understand.

October’s Featured Training: The ABCs Of Cyber Security

Cyber Security Training

October Is Cyber Security Awareness Month
Tune In At Any Time To Watch Our 15 Minute On-Demand Training

Cyber Criminals Have A 6 Month Head Start.

Is Your Business Protected?

Find Out.

Tune Into Our October Free Online Training By Clicking Here.

Cyber Security Training

Every 39 seconds, a hacker is attacking someone. 

Are you next on the list?

You can’t afford to miss October’s free online training.  Why?

{company} takes cybersecurity seriously. This is why we have put together this free online training for everyone.  During this online training, our cybersecurity trainers will share how your business can defend itself from becoming another statistic.

During this 15-minute on-demand training we’ll show you many quick and very important tips you and your team must know in order to protect your business from cyber threats and how employees can keep all your confidential and critical information secure.

Google Shutting Down Google+

Google+ Shut Down

Google+ Social Media App Will Soon Move Off Into The Sunset

Google+ has never really been a popular social media network. In fact, most people say they’ve never used it and don’t know how it works. So it’s not too surprising to hear that Google has finally decided to pull the plug.

Google+ Shut Down

Google just announced a ten-month sunsetting period, which begins now and will end in August of 2019.

Besides the site simply not being popular, Google has had serious security issues. Project Strobe discovered a bug in Google+ that may have leaked the personal information of thousands of users. Though Google says the vulnerability was not discovered by hackers and that no profiles were compromised, their senior executives felt that rumors of a breach would likely trigger “immediate regulatory interest.” So they simply didn’t tell anyone.

Other Social Media Data Breaches

For several years, Facebook has been under scrutiny for allowing the data firm Cambridge Analytica to access their user information. This data was in turn used to create targeted social media ads that eventually swayed the presidential election of 2016. Since that incident, Americans have become much more aware of the effects and dangers of data breaches and social media manipulation.

Given the fact that almost no one was using the Google+ app and the high risk for potential data leaks, Google execs said they simply felt that it was best to discontinue Google+. Users will have 10 months to migrate their data before the platform is officially dissolved in August of next year. However, the company has decided to continue supporting the Enterprise version of Google+ so businesses using that app will not be affected.

More About the Google+ Security Breach

Last March, Google discovered a privacy breach, which allowed third-party apps using their programming interface to access the personal data of users. This data includes usernames, addresses, email addresses, birth dates and other bits of personal information.

The Wall Street Journal reported some details about the security breach and said that Google executives had been informed about the breach soon after it occurred. These executives made the decision not to disclose the breach to its users for fear of tarnishing their reputation.

Reporting Security Breaches

In a blog post, Google said that it decides when and if the organization should notify users of data breaches. They take into consideration the type of data that was leaked, whether there’s evidence of misuse and whether there’s anything that users can do about it.

According to security breach laws, any organization that experiences a data breach must inform those affected. And they only have a specific amount of time to do so. This varies by state but there are severe penalties for not correctly reporting a security breach.

Executives at Google say that the gap has been fixed and that users do not need to worry about any further data leaks. However, there is ample evidence that Google did not follow the law once they learned of the data breach. This can result not only in penalties from the federal government but also users can file individual lawsuits if they believe their personal info has been compromised.

How Data Breach Laws Are Changing

With the new European Union GDPR (General Data Protection Regulation), more countries and organizations are implementing stronger security measures. The GDPR affects anyone who does business with an entity that resides within the European Union. This has caused many business owners to revamp the way they collect and store personal information from their users.

Once a company has collected an individual’s personal information, they have a legal responsibility to keep that data as secure as possible. In spite of these advances in data security regulations, hackers seem to be one step ahead. Their tactics change, improve and evolve making it necessary for all organizations to be more cautious.

Senate and House Committees Get Involved

This past year, many social media and technology companies have come under scrutiny due to their data and privacy practices. Executives from Twitter, Facebook and Google have testified before various Senate and House committees. Under fire are their security measures, but also their political biases. The government is considering types of regulations that would prevent these companies from meddling in important things like the elections.

Now that everyone is fully aware of how easy it is to sway voters in one direction or the other, there is a very real fear that future elections may be manipulated by these companies. They not only have the knowledge, but they have the resources to influence the way people vote. And this ability holds within it a great deal of potential power to change our society in ways that can only be speculated about at the moment.

What Should Google+ Users Do?

In the meantime, if you are a Google+ user, it’s best to go ahead and make copies of any content you have on the site, then delete your account. Once it has been deleted, you’ll no longer have to worry about losing it to hackers who have found yet another weakness in the site’s security protocols.

What You Need to Know About Secure Messaging Apps

Secure Messaging Applications

You probably use messaging for communications every day, but how secure are your messages? Messaging apps are as susceptible to hackers as any other type of electronic communication, and if you are concerned about privacy then it’s time to learn the basics about secure messaging apps.

Secure Messaging Applications

Why You Need a Secure Messaging App

We use messaging more and more to communicate, but we don’t always realize how many eavesdroppers there may be. Those eavesdroppers may include internet service providers, government agencies, and hackers. If your messaging involves your company, it might be the target of industrial espionage. These are all good reasons to consider using a secure messaging app.

What Makes a Messaging App Secure?

We probably all remember playing around with coded messages as a kid, but never dreamed that coded messages might become important in our day-to-day communications. As it turns out, one of the key aspects of a messaging app is end-to-end encryption.

When your messages are encrypted, that means they are encoded in such a way as to make it extremely difficult for someone to eavesdrop on the information being transferred. The messages are basically scrambled, and in order to unscramble them, you must have the correct key. In the case of an end-to-end encrypted message app, only the sender and the receiver have the decryption keys.

There are messaging apps that offer encryption, but encryption is not the default setting. That means that you would have to navigate to the settings for your messaging app and turn on encryption – if it even offers that feature.

Metadata can still be an issue even with encryption. Metadata includes things like who you talk to based on your contact list, how much time you spend talking to them, your phone number, your IP address, and more. You should avoid messaging apps that collect metadata.

Believe it or not, one of the signs of a secure messaging app’s integrity is making its source code available to the public. Open source code is actually better than proprietary code because it provides experts access to the code for review. Experts who did not develop the code will be far more likely to notice vulnerabilities and bugs that could be exploited. The result is a highly robust source code and a bulletproof app.

Secure Message Apps

There are several messaging apps on the market that qualify as secure messaging apps. What follows are five of the top options that are available for Android and iOS operating systems.

Dust: If you want messages that don’t hang around, then Dust is your app! Messages disappear within 100 seconds of being read or within 24 hours – your choice. You’ll also be notified if any screenshots are taken. It includes end-to-end encryption, no permanent storage, and you can even erase your message off someone else’s phone. The major drawback of Dust is that its source code has never been released.

Signal: The Signal messaging platform uses end-to-end encryption and its source code has been released. There is an option that makes messages disappear after a certain amount of time has passed and it can be password protected. It only stores the metadata it needs to function properly on your device. As far as drawbacks go, there are virtually none associated with Signal.

Telegram: The Telegram app was banned in Russia because they refused to hand over the encryption keys. It offers end-to-end encryption through a feature called “Secret Chat” that must be turned on. It can be locked by a passcode and has a Self-Destruct timer option for Secret Chat messages. The drawback of Telegram is that it lacks transparency about the protocol that it uses.

WhatsApp: With WhatsApp, end-to-end encryption is the default and provides an option for you to verify that encryption is in place. Messages are not stored on your phone, and it makes available a two-step verification feature. WhatsApp’s major drawback is that it does keep track of metadata and backups of messages are not encrypted for Android users.

Wickr : Unlike most messaging apps, Wickr offers both a personal (Wickr Me) and an enterprise edition. It provides end-to-end encryption and a host of additional features that make it one of the best options for businesses that are looking to keep their messages secure. It recently released its cryptographic protocol. And when Wickr deletes things, it “shreds” them so that they cannot be recovered. Wickr doesn’t really have any drawbacks from a security perspective.

Conclusion

Not all secure messaging apps are equally as effective. When selecting one, you should look for end-to-end encryption (and by default is even better) and the storage of little to no metadata. Also, keep in mind that companies that have released the source code behind their app are considered more reliable and their apps more robust. If privacy is important to you, then it’s time to check out secure messaging apps.

Before installing or investing in any messaging app…always consult with your technical support provider.

Happy Thanksgiving Everyone!

Happy Thanksgiving Canada

Happy Thanksgiving From Our Team To Yours!

Why Not Show Your Thanks By Helping Another Business Use Technology To Succeed?

As the days get shorter, and the nights get cozier, Canadians across the nation turn our minds to gratitude. It’s a season where we take a little time to appreciate the best things in our life.

We’re thankful for family, for friends, for a job we love, and for you, our clients who make it all worthwhile. Thank you for putting your trust in us as your IT service company.

We know that you have options for your IT service. And to show our thanks as your technology service provider, we’d like to offer a complimentary assessment to a local business that you refer.

Why Are IT Assessments Important?

An IT Assessment is a comprehensive view of your business and technology needs. It reveals the health of your IT assets and infrastructure. Routine assessments mitigate the risk of downtime and security breaches. They also ensure your technology is running at peak performance, so your workers can too.

What Do IT Assessments Reveal?

An IT assessment will optimize your system to improve security, mitigate the risk of computer crashes, interruptions and inefficiencies. It also ensures you’re getting the ROI from your technology investments that you expect.

It tells you:

  • If technology is truly supporting your business goals and objectives.
  • If best practices are being employed in when using technology solutions.
  • The strength of your IT security posture and if there are any gaps in your defense.
  • If your business could stay up and running after a disaster like a fire, flooding, accidental data deletion, or malware infections.
  • If you are getting the most value and use from your IT investments.
  • If your IT solutions are integrated properly.
  • What steps to take to improve your IT environment.

Why Are Regular IT Assessments Valuable?

An IT Assessment will tell you what is working and what isn’t. The ever-evolving nature of technology and rapid changes and advancements make IT Assessments more important than ever. You won’t always need the latest applications or solutions, but it’s essential to detect any deficiencies that may be impacting your efficient and secure operations.

The most technically knowledgeable companies continually evaluate the status of their IT operations and whether they match their organizational goals. Assessments provide insight into what you will need for the future as your company grows and changes. It’s like an IT business plan that helps you stay on course and use the tools that will help you succeed.

Are You Wasting Money On Technology Solutions?

Are you getting the most value from your current technology? An IT Assessment will reveal if you’re paying for software and hardware you don’t need. It determines what technology is required to fill gaps without you buying more (or less) than you require. Plus, it helps you better control your IT spending.

Newer technologies like cloud computing can significantly lower your technology costs. Software-as-a-Service and Hardware-as-a-Service and other pay-per-user solutions can provide the technology you need without the upfront costs. They also provide flexibility and scalability as they can be increased as your company grows or decreased in slow times.

Is Your Technology Properly Integrated?

It’s not enough to know what applications you have and how they work, you must understand how well they integrate. With so many types of software and hardware being used today, integrating them correctly can be a challenge. And, if they’re not properly integrated, this can negatively impact your operating efficiencies.

For example, say you purchase a new software application. If it’s not supported by your operating system and web browsers, it won’t work as it should. Or perhaps you’re using a VoIP business phone system. Does it integrate with your data network as it should? It’s essential that all elements of your technology infrastructure work together seamlessly.

What Can You Expect After An IT Assessment?

We’ll provide a written report detailing your current IT standing and any suggestions we have for improvement. If during the course of the Assessment we detect backup failures, security gaps or misconfigurations, we’ll report on these right away and how they can be cost-effectively remediated.

Your leadership team will be apprised of our findings, so they can make decisions and work with us to develop an IT Plan that prioritizes recommendations based on their importance and impact on your business.

An IT Assessment Is The “Gift That Keeps On Giving”

Referring a business associate or other organization for an IT Assessment will not only help them succeed through the best use of technology but it will build goodwill between your companies. And once they realize the value an IT Assessment provides, they’ll refer another business, and so on, and so on.

Happy Thanksgiving Canada

So, give thanks by sharing your knowledge about technology and how it can help others succeed. Contact us, and we’ll get the process going. And thank you again for your business.

Happy Thanksgiving.

Scalable Wi-Fi Is Best Practice For Schools

School Wireless Networking

Everyone has Wi-Fi. We all expect to see it wherever we go, and most of us have more than one Wi-Fi-enabled device. Grocery stores, fast food restaurants – even your mechanic has Wi-Fi. But does that mean you REALLY need it in your school? Isn’t it less secure than wired?

School Wireless Networking

To answer the first question: “Don’t be coy.” You know how backward wired-only connections look. You’re either a Luddite or unbelievably cheap trying to avoid the expense and work of building a new network. You are now out of time. The government itself says you need Wi-Fi, and in this 2017 report plainly states that a reliable, fast wireless connection is a necessity on par with other utilities such as gas, electricity, or water.

As to the second question: Well, no. Not so much anymore. With advances in encryption, Wi-Fi networks that are properly safeguarded offer security comparable to that of wired set-ups. If you still prefer to use wired internet for select devices, such as a handful of desktops and a designated copier/printer/fax machine, you can enjoy the advantages of a wireless network. Wired is a bit faster and more reliable than Wi-Fi, but this is more because of how easy it is to ensure that only a handful of users are on that hard-wired data line. Employees must literally be plugged into a wired network, so there is no issue of people overloading it by all signing on and demanding bandwidth at once.

So the advantages of wired over wireless can really be solved by properly planning out the wireless network. From there, advantage is all wireless: portability, ease-of-use, and, if you plan for it, scalability.

Why use a scalable wireless network?

Setting up a scalable wireless network means looking at the present with an eye to the future. You know that you’ll potentially have more students or employees, or even more devices per person, or more demanding apps. If you’ve built scalability into the network in the first place, you’ll easily adapt to the increased demand on your connectivity. Re-wiring not only costs money, it’s disruptive. Contractors can come out when school is not in session, but off-hour calls often cost more. To do everything more or less at once, having access points ready for later expansion allows for a nearly seamless expansion when it becomes necessary.

Adding people in will not be a matter of climbing around above the ceiling tiles, drilling holes in walls, but just a matter of entering a new user and password and updating the server. Oftentimes, it won’t even cost anything to do it.

Scalable Wi-Fi Saves Budgets In Situations Where:

  • Schools are growing
  • Private or charter schools with variable populations
  • Schools under construction, adding more devices as they go
  • Anyone in the current technological climate where new innovations increase user numbers every year
  • Variable income
  • BYOD programs

Factoring in the potential for future expansion will pay off in the long run when the entire network doesn’t require a re-design within a couple of years. By planning for scalability, using multi-purpose devices that can handle increased connectivity and streaming demands, you are ensuring that the initial investment pays off. The more manageable maintenance budget will be easier to get approved, and you can plan for a complete overhaul when it becomes truly necessary, rather than prematurely, due to an initial refusal to plan for growth.

Devices Are Everywhere

Smartphones have risen in popularity at a pace that’s nearly alarming for its potential ramifications. In fact, the amount of active mobile phone subscriptions in the US is 349.9 million – more than the total US population of 325.3 million. These consumers are using their phones for far more than phones. They’re on apps that often require data usage, which allows for less memory and storage use on their phones. Even apps that do not apparently require internet connection often do for this reason. People have grown to rely on their phones as a connection to their families, coworkers, and also as a means of keeping themselves organized, of keeping their emotional well-being up through habit-changing apps, diaries, and more.

As the mobile devices, we use speed towards true ubiquity, it will not do to simply watch as the tide rises. Plan for the eventuality of increasing connectivity needs by designing a scalable wireless network. This direction offers better services for the future, along with lower overall budgetary requirements. It removes some of the stress of growing. All school administrators understand the need to reduce stress and lower the budget.

What’s Inside Health IT?

Healthcare Technology

Health information technology is more talked about than really understood. Part of the reason for this is that providers and their staffs usually interact with a restricted subset of health IT – the Electronic Health Record (EHR), the radiology imaging system, the billing system, and so forth. Only the organization’s IT staff and Chief Technology Officer (CTO) are in a position to see the big picture. Even they may not see all of it. This blog post tries to cover at least the larger components of Health IT.

Healthcare Technology

What’s The Most Important Piece?

The EHR is arguably the central component. In an ideal system, all the information a provider or patient wants, from demographic information to lab results to radiological images to records of office visits should be there. Making the EHR the centerpiece is one way to avoid “siloing” of information that makes research and analysis difficult or impossible. If the EHR is complete, every other component—statistical reporting, radiology, billing, appointment scheduling, and lab results are present, and can be used to drive other systems.

This, of course, is an ideal situation. One barrier to accomplishing this is money. Putting in a new EHR system can cost a lot. Recent figures for installation are around $33,000 per full-time physician. Maintenance runs $1,500 per month per full-time physician. A hospital system with 500 physicians is looking at a minimum of around $17 million for initial installation and around $9 million for annual maintenance.

If the system is hosted in the cloud, storage, input, and “egress” fees (sending data to the providers for use from data stored in the cloud) have to be considered. Cloud hosting can run around $165 per “seat” per month, where “seat” is a computer linked to the cloud. Assuming an employment of 3,000, this will run around six million dollars per year. But cloud hosting may well be cheaper than buying and maintaining hardware and paying a large IT staff. Cloud hosting offers better security and offloading a lot of IT headaches as well.

What Are Some Other Components?

There will be radiology and lab subsystems, at least, plus billing and accounting. How tightly these are integrated into the EHR system and the cloud will vary. Analytical systems may include big data handling and artificial intelligence. Of course, if a physician is a hospital employee or a member of an affiliated group, it makes sense for their in-office IT systems to be integrated with, or be part of, the hospital IT operation.

What’s So Great About AI?

Artificial intelligence (AI) is still in its infancy. Studies have shown that AI systems are better at reading radiology imagery than human radiologists, and of course better at catching prescription errors and medication conflicts. But many legal questions, particularly about liability, remain unanswered. In addition, AI is intelligent only within a limited sphere. It will be far into the future before AI is able to display the kind of general intelligence that a human physician can bring to a patient.

What AI is good for now is dealing with well-defined tasks and helping to narrow down the “unknown unknowns” – interactions, sources of error, and opportunities for improvement that humans would never have suspected. Their principal role in the near term most likely will be relieving the “cognitive overload” that all physicians, no matter how narrow their specialty, have to deal with.

What Are Patient Portals?

Patient portals – interfaces, usually web-based, are systems that allow patients to see their lab results, talk to their providers, make appointments online, find providers, and do other things that patients would normally do over the phone. If properly designed and implemented, they can have a major impact on operational efficiency and patient satisfaction. On the other hand, a patient portal that is too complex and too clunky to be easily used can drive patients away.

What Are The Incentives For Using All This Stuff?

The Affordable Care Act (ACA) and the Health Information for Economic and Clinical Health Act (HITECH) provide billions of dollars for providers who implement EHR and other health IT systems and “meaningfully” use them. They are a de facto requirement for any provider which receives Federal funds, which is virtually all of them.

What Are The Downsides?

The biggest one, of course, is the expense. Even though it is large, it may well be cheaper than maintaining one’s own equipment and IT staff. It also permits renting out a lot of headaches. The downside is that, for HIPAA purposes, one has to devote as much attention to the vendor’s security practices as to one’s own. Also, system modifications and customizations necessarily involve the vendor’s staff and consulting services, which may be very extensive.

And, of course, there is training. This is not so much expensive as extensive. The example of one Pennsylvania health system that changed EHR systems three times in one year probably represents an extreme outlier, and training the entire staff three times in one year was no doubt a task worthy of being avoided if at all possible.

Finally, if the organization is moving from primarily paper-based systems to health IT, the organization’s culture needs to be adjusted, and the transition may be wrenching. Still, the advantages of health IT outweigh the disadvantages, and all providers should be making the switch as soon as possible.

Facebook Data Breach

Facebook Data Breach

Are you aware of a potentially serious data breach involving Facebook? 

According to many top news outlets, 50 million users accounts may have been impacted and Facebook now faces potential huge fines in the EU.

Read more at https://www.theguardian.com/technology/2018/oct/03/facebook-data-breach-latest-fine-investigation.

Facebook Data Breach

Need steps to protect your Facebook account? Here’s an interesting article containing steps to protect your personal information and security. https://www.experian.com/blogs/ask-experian/facebook-data-breach-how-to-protect-yourself/

We are continuing to follow this news and will update more on our blog as we learn more.