Anthem Reveals More About Data Breach and Warns of Phishing Scam

Data Breach

Anthem Data Breach

Data breaches and phishing scams are becoming more popular among cybercriminals. There have been so many data breaches, in fact, that the chances that some of your private information has been discovered by online scammers and sold to other ones are pretty high. One of the most significant data breaches in recent years (that has been discovered….many large ones haven’t been discovered yet) was at Anthem Blue Cross/Blue Shield. If you are concerned you may have been a victim of that particular data breach, there are some things you should know, as well as things you can do to minimize the damage to your credit and identity you may have experienced.

Anyone who has been a customer of Anthem Blue Cross/Blue Shield in the past decade is a potential victim of this data breach, and should thus take some steps to do damage control, whether they have noticed anything odd in their credit report or use of personal information. Potential victims also include those who used the Blue Card in any area affiliated with Anthem during that period.

It is not only a data breach at Anthem that should be of concern to current and past customers. Anthem has also issued a warning about a phishing scam mimicking calls and emails from their company. The scammers will ask for personal information when they contact you, such as Social Security numbers and credit card numbers, which are all things Anthem never asks for in these ways. They will never ask for this information as a means to identify you.

Anthem has been working closely with a well-known and well-respected security firm called Mandiant to mitigate the damage from the data breach and phishing scam. It has also been working in close conjunction with the FBI to discover more about the origins of the data breach, which was discovered in January of 2015.

In the data breach, the following things were stolen from Anthem’s customers:

  • Names
  • Dates of birth
  • Social Security numbers
  • Home addresses
  • Personal email addresses
  • Employment information
  • Income
  • Anthem health ID numbers

Anthem is offering current and former customers who may have been impacted by the data breach two years of free credit monitoring and credit repair services if needed. Most of the customers who have or may have been affected by the data breach were sent letters in February. The letters let customers know about the breach, how it may impact them, and that it took place across several weeks in December of 2014. The letter also warns current and former customers of the phishing scam that is ongoing.

Anthem is particularly calling out to customers in the letter to let them know that they are not phoning or emailing them about the data breach, and are not asking for any credit card numbers or Social Security numbers over the phone.

In fact, the phishing scam appears to be attached to the data breach, either being done by the people responsible for the data breach, or by people taking advantage of it. The scammers behind the phishing scheme know about the data breach and are using people’s concerns about their personal information being involved in it to get them to give their most sensitive information in a belief that Anthem will use that information to protect them against being affected by the data breach.

While some people are receiving phone calls in the phishing scam, with the telephone numbers looking like they are coming from Anthem, others are receiving emails. The emails include a link that says “click here” to sign up for free credit monitoring. Anthem is already automatically giving everyone affected or possibly affected by the breach free credit monitoring, so the emails are not coming from Anthem, even though they are made to look like they are. Anthem is quite clear in its letters to customers about the breach that the emails are not from them.

Those who are concerned they may have been affected by the Anthem data breach are being protected by Anthem, but there are additional steps they can take. These additional steps ensure the maximum level of protection now and in the future. Some things that people can do to protect themselves include:

  • Changing their passwords on just about anything they do online, but particularly email, financial accounts, and social media.
  • Get a copy of their credit report from all three credit bureaus and place a fraud alert on them.
  • Dispute any items on their credit reports that are not real.
  • Closely monitor transactions on any credit, debit, or bank accounts, and reporting any suspicious or fraudulent activity to the bank or credit card companies involved.

Doing these things will give individuals a sense of control over their potential exposure in the data breach, and will also go a long way toward helping ensure their personal information and finances stay protected.

Top Concerns CISOs Face With Cybersecurity In 2019

Cybersecurity Concerns 2019

Chief information security officers face new and stronger threats to systems in 2019. Not only are hackers deploying more sophisticated attacks, but attackers have new targets in their sights. Also, geopolitics and consumers will continue to play an outsized role in discussions of cybersecurity issues.

Knowing what horizon issues will help CISOs to plan accordingly and deploy solutions that are ahead of the looming problems.

What New Technologies Are Hackers Using?

One growing threat is botnets, in which hackers compromise hundreds, thousands or millions of infected computers. Hackers run command-and-control networks to manage these zombie computers.

One widespread use of botnets is distributed denial of service (DDoS) attacks, which flood domains with so many requests that they can’t handle real inquiries. Often websites crash and are not recoverable unless a ransom is paid.

Botnets are delivered via worms, which attack spreadsheets and documents, and viruses that target systems, destroy data or make networks inoperable. Once implanted in a system, viruses and worms spread, infecting more computers and doing more damage to files.

The challenge for CISOs is to remain ever-vigilant in this front line of attack. Anti-malware software that is continuously running in the background and automatically updated is one key solution. However, companies large and small also need to stay on top of the software, hardware and operating system upgrades, making sure that all devices and programs are updated. These protections need to be in place both for core system servers and end-user devices.

Finally, an in-depth defense should involve regular, meaningful and compelling personnel training that makes employees aware of how to avoid phishing traps and remain suspicious of unknown or unfamiliar emails and attachments.

Are There Other Risks from Hackers?

Hackers frequently use the Dark Web to trade, share and buy information. As defenses get more complicated, hackers become more determined to find new ways to thwart preventative measures.

Take, for example, exploit kits, which are traded regularly on the Dark Web. Hackers do not issue attacks in one fell swoop. Instead, they sniff and explore different aspects of a target. While malware and phishing schemes target end users, other tools are deployed to explore the system’s website and perimeter.

Exploit kits are self-contained, all-in-one tools that are developed with discretion in mind. If a hacker finds a vulnerability on a website, it can attack the server that hosts said site. When a victim visits the website, they are redirected to a rogue server instead, which gathers information about the victim. The exploit kit identifies and delivers an exploit that is attached to the victim and downloaded onto the victim’s computer, often via a software security hole.

Another example is an APT (advanced persistent threat). Another stealthy hacker tool, the APT can enter a system network and lie dormant until activated. APTs don’t do file damage but steal financial and other critical information. When login credentials are taken, the APT can dive deeper into a system to compromise even more data.

Then there’s the drive-by download attack. Such attacks don’t require any action on the part of a user. Malicious code is downloaded automatically upon visiting a URL via a browser, operating system or app. Often these attacks contain multiple pieces of code that infiltrate the system in the hopes that a few get past your defenses.

Stopping these attacks means updating browsers, using anti-malware tools and deploying sophisticated firewalls that monitor and protect the network’s perimeter. Intrusion detection systems and alerts can identify, contain and neutralize many of these threats before they cause significant damage.

What About Blockchain and Cryptocurrency Defense?

The growing application of blockchain technology in many areas has led to new opportunities for theft of these assets. While blockchain can be difficult to hack, mining for cryptocurrency is a lucrative endeavor.

The challenge with mining for crypto is it takes a tremendous amount of computing power. Hackers are hijacking (cryptojacking) corporate and personal computers to take advantage of their processors to mine. It’s a passive way for hackers to make money, but can dramatically slow down computer performance and add to utility costs. As long as cryptojacking remains profitable, it will be a headache for CISOs.

Do I Need to Worry about Cloud Data?

More companies have shifted data and applications to the cloud, breathing a collective sigh of relief that the protection and monitoring of that information are in the capable hands of a trusted third party. However, companies often deploy cloud data solutions without investing in the underlying security, particularly encryption. That means many companies have unsecured information stored in the cloud that is easily accessible to anyone who might want to use, steal, manipulate or alter it.

Hackers are shifting their tactics about how to disrupt data. Instead of stealing it, they are manipulating data. Data manipulation attacks can do serious harm to company reputations as data users question the reliability and accuracy of data sources. The impact on information providers, financial institutions and medical practices and hospitals could be devastating if data are altered such that an organization’s integrity is questioned.

What About Data Regulations?

In 2018, two significant regulations came into being. The General Data Protection Regulation (GDPR) governs data protection and privacy for citizens of the European Union and affects any organization that does business with said residents. California passed a sweeping online privacy law that affects consumers and requires companies to disclose on demand specific uses and sales of consumer information.

More regulation is likely. With more regulatory complexity will come additional challenges for CISOs.

Consider that Europe, China and the U.S. have very different approaches to data and its regulation. China takes a very nationalistic view of data, seeing it as something to be protected and contained within the country’s borders. Europe considers data as something that needs to be highly protected and kept secure.

The U.S. has seen data as a commodity to be commercialized, sold and leveraged for financial gain. There is very little unifying federal guidance on data security like Europe’s GDPR.

In the U.S., companies could face different data privacy requirements from each state if others take California’s lead.

What does this mean for companies? A complicated regulatory landscape. There will be difficulty in gathering, storing and using data from multiple jurisdictions. It could also lead to greater compliance issues as companies need to grapple with similar but distinct reporting standards for different states, countries or regions.

What Political Concerns Affect Cybersecurity?

The U.S. is embroiled in several controversies with other nation-states related to cybersecurity. Ongoing investigations about Russian intervention in elections, trade wars with China, and concerns about trade agreements in North America and Europe add to a climate of political uncertainty. Cybersecurity will likely continue to be a political issue both domestically and internationally throughout 2019, especially in the lead up to the 2020 presidential elections.

How Are Consumers Affected?

As consumers and companies become more interconnected, hackers are shifting their targets away from corporations to consumer devices. This concern becomes more significant with the vast proliferation of the internet of things. With smarter, connected devices in use comes added vulnerability. Hackers could, for example, attack a smart television and hold it for ransom. Connected toys could become a target for child predators. Already there is an increase in sextortion attacks designed to shame victims into believing their visits to porn sites were recorded and will be released if a ransom isn’t paid.

While these consumer-based issues may not directly affect CISOs, they will if the attacks come from your devices or services or a result of data stolen from your company.

What Issues Arise from Passwords?

In recent years, multi-factor authentication has grown. Simple passwords continue to be a prime target of hackers. Password theft and password-related breaches become less prevalent and relevant for companies that deploy low-cost multi-factor solutions.

How Can We Combat Shadow Systems?

Ego, internal politics and budget often make it challenging to address rogue and shadow IT systems. The reality is that shadow IT systems not governed, maintained or monitored by central IT staff are a significant liability. With increased awareness and understanding of cyber threats, CISOs should use 2019 as a time to finally pull the plug on rogue systems.

Each year brings new complexities and challenges to IT security officers. Getting ahead of these issues and making sure your organization is ready to address them is a valuable new year’s resolution.

What Is the Difference Between Managed Services and Break/Fix IT Services?

Break Fix Computer Services

Computer systems have a way of breaking at the worst possible time: in the middle of your business’s rush season, right before a long weekend or when your regular IT technicians are on vacation. When this happens, many organizations call a repair service, looking for an estimate on getting back to work as quickly as possible. While this can be an acceptable solution in the short-term, it can become quite expensive regarding lost productivity and direct costs over a more extended period. When you’re not able to plan ahead for the costs associated with a problem, you may find that your IT budgets are short when you get ready to implement the “next big thing” for your business users. Reduce the overall risk to your business and protect your ongoing profitability by implementing a managed IT services model.

What Are Break/Fix IT Services?

At their most basic, break/fit IT services are precisely that — when something breaks, you call someone to fix the problem. While this is a highly simplistic explanation, it represents a more reactive approach to technical problem resolution. Instead of actively looking for ways to partner with organizations to enhance their security, shore up problems and enhance usability, companies who specialize in break/fix solutions are waiting to hear about a problem before they jump into action. When that happens, technicians work with your business remotely or come onsite to diagnose the problem, ultimately charging your business an expansive hourly rate for the resolution. You pay only for services that you’re using when you need to use them. While there are no monthly or ongoing fees, it can be complicated to predict when you’re going to have a problem or the extent of the costs required to fix the issues.

If the technician you work with doesn’t have experience with your particular platforms, they may spend a fair bit of time getting up to speed and researching the issue and resolution. If the problem isn’t fixed the first time, you’ll be charged each time technicians spend time working with your business. It’s difficult if not impossible to predict long-term support costs with this model and since technicians are paid by the hour, there isn’t a compelling case for them to quickly come to a resolution that gets your teams back online.

How Are IT Managed Services Different from Break/Fix?

With an IT managed services model, you’re paying a consistent monthly rate to ensure that your business infrastructure remains secure, scalable and accessible. An IT managed services contract often includes guaranteed uptime and specific expectations around how quickly questions are answered or solutions provided. This means that your IT department is able to accurately project costs over time while still maintaining a high-performance, complex environment. This type of model allows your technology team to offload many of the day-to-day tasks associated with infrastructure management, such as:

  • Password resets
  • File and folder recovery
  • Application of software and security patches
  • Virus and malware protection
  • Server scaling
  • Software license management
  • Business continuity and disaster recovery solutions
  • Mobile device management
  • Security and compliance support

Each of these services provides a unique value to your business while allowing IT professionals with the capacity to push internal business and technology initiatives forward.

Enhanced Security Solutions

A key concern for businesses today is the security of systems and data — both information that is in transit as well as at rest. With a managed services IT provider, you have the assurance of a team of security experts actively reviewing your business’s security and performance metrics. Proactive monitoring of a wide range of systems from a central interface allows your managed services partner to offer proactive recommendations to enhance your security as well as spot problems and begin immediate remediation. A data breach can cost your business thousands if not tens of thousands of dollars, but a quick catch of a vulnerability can often be patched before cybercriminals have an opportunity to slip through your security procedures. This augmented security posture is particularly important for organizations storing personal, health or financial information for their customers.

Whether you are currently looking for an IT services partner or just exploring the idea of moving in this direction, the benefits are clear. More predictable cost structures over time, a deeper well of expertise on which to draw and the ability to quickly return to productivity are all compelling arguments for this proactive approach to your information technology infrastructure.

Ransomware Impacts Dental Professionals Too…

Dental Ransomware

Dental Ransomware

Most of the time, a five-day vacation is something to look forward to, but if that vacation is unplanned and filled with anxiety over when you can get back to work, it’s probably not much of a holiday. It becomes a burden; financially, emotionally and even physically on everyone involved.

This is what it feels like when ransomware attacks a practice. Get ready to cancel all of your appointments, damage patient trust and pay HIPAA fines on top of it all.

And no, ransomware isn’t exclusive to big hospital systems. Small to medium medical and dental practices are prime victims because the hackers know that many such practices are more vulnerable to these attacks.

Here’s what you need to know.

What Is Ransomware?

Ransomware is a particular type of malware that encrypts all of your patient files so that you can’t access them. The hacker then demands a ransom in exchange for unlocking the data. In some cases, the hackers keep up their side of the deal. In other cases, they take the money and then sell your patients’ information on the black market, turning this into a compliance and regulatory nightmare. As more medical practices have worked to increase security over the past several years to comply with compliance standards like HIPAA in the US or PIPEDA in Canada, dental practices become even more of a target.

According to Sylvia Burwell, secretary, U.S. Department of Health and Human Services, “Cybersecurity is one of the most important challenges we face as a nation…Unlike many cyber threats, ransomware is immediately disruptive to day-to-day business functions and, therefore, your ability to provide high-quality health care.”

According to the Office of Civil Rights (OCR), which is the federal department that enforces HIPAA compliance, around 4000 attacks happen each day. Having proven lucrative for the thieves, these attacks are on the rise.

How Does Ransomware Happen?

Hackers have many virtual windows they can climb in through to access your files. Some common methods used are very inconspicuous yet effective like:

  • Sneaking malware to a 3rd party software
  • Attaching the malware to a link in an email that appears to come from a known, trusted source (a dental insurance company, coworker, etc.)
  • Placing a file on a website that automatically downloads when someone visits the site

In some cases, hackers find clever ways to gain access to computers that aren’t even on the Internet.

How Do You Prevent Ransomware in a Dental Practice?

The American Dental Association (ADA) reminds dental practices that the OCR has established several steps you can take to protect yourself from these attacks, including:

  • Implementing in-office protocols to reduce risk
  • Educate yourself and employees about how malware might enter your computer system
  • Limit who has access to PHI
  • Have a separate backup for patient files that can be accessed in an emergency

Also,

  1. Install a firewall
  2. Do not allow employees to access public wi-fi with devices that may communicate even through email with office computers
  3. Keep all software and virus protection up-to-date to stay protected against emerging risks. Hackers are continually updating their malware to bypass existing security and exploit newly discovered vulnerabilities. When companies find these, they immediately push out a patch to their customers. But customers must install them promptly to become protected.
  4. Be mindful about 3rd party software. Culturally, we’re so accustomed to thinking that “there’s an app for that”, that we put little thought into how safe the convenient 3rd party programs are
  5. If you suspect that one of your computers has been infected, take it off the network immediately to reduce the risk of the infection spreading.
  6. Only allow a knowledgeable IT professional to work with the infected computer
  7. Work with your IT team to institute safety measures and track employee compliance with those measures.

Does Ransomware Impact Dentists Too? Absolutely.

Any business who would be negatively impacted by having their customer data encrypted is a possible target. As larger practices increase security, smaller entities like dental professionals find themselves a more enticing target. You can take steps to significantly reduce your risk. For more information on keeping your practice safe, follow our blog.

What Is The Difference Between Computer Repair and Computer Support Companies?

Managed IT Services

When computers or network systems break, you need to know that you’re able to quickly get your teams back online and to full productivity. That can be a challenge, especially if you’re working with a computer repair company. You can’t predict when a problem is going to occur or guarantee that a technician who is comfortable with your network configuration is able to quickly resolve the problem. This can be a costly issue for your business, not only in terms of the direct costs of hiring a computer repair tech, but also the indirect costs of lost productivity and customer frustration. When you work with a computer support company, you have the peace of mind knowing that there are set parameters around their response times and ability to solve specific problems. With a structured ongoing cost structure and myriad business benefits, many organizations are choosing to outsource to computer support companies.

Managed IT Services

What Are the Benefits of Using a Computer Repair Shop?

If you use the same computer repair shop for a long period of time, you may develop a relationship that allows you to quickly describe the problem and receive the resolution. However, you may find that you need multiple repair partners in order to successfully support all of the software and hardware that make up your IT infrastructure. You will only pay for the items that break and need to be fixed, so there are no monthly or quarterly costs that need to be budgeted. This approach also allows your technology team to assign tasks to internal staff members for resolution if they have time available. While these are strong benefits, there are some negatives to this approach as well.

Why Should I Use a Computer Support Company?

Using a computer support company, also known as a managed services provider, helps fill in some of the gaps that are left with a simple break/fix repair shop. While computer repair shops are often able to resolve a specific problem, they are unlikely to provide your business with the proactive security and technology management that will help you remain competitive in the future. The ongoing costs of working with a computer support company also ensure that you receive a high quality of service — guaranteed. You’re able to offload some of the more time-intensive daily tasks that can be a drain on internal IT time such as resetting passwords or restoring files. This allows internal IT staff to become a more active part of the organization’s digital strategy by contributing thought leadership and active engagement with business users to move the organization forward. An IT managed services provider is always on the job: reviewing your security posture, applying bug fixes and security patches to software, actively managing software licenses and ensuring that your network infrastructure remains stable.

Security Benefits with IT Managed Services

Applying hotfixes and patches is one of those ongoing tasks that can be difficult to prioritize on a daily, weekly or even monthly basis — but they are crucial to the ongoing security of your network and computers. Since IT managed services providers are paid whether or not you have a major outage, they are incentivized to create a high-availability environment that includes fewer slowdowns and limits the possibility of a breach. Any network security concerns are addressed immediately, by a team of professionals who are well-versed in various software platforms and security procedures. You’re also able to leverage best practices from across a range of industries to ensure that any sensitive personal, financial or health data is well-protected by the best possible security procedures.

Making a decision between a computer repair shop and a computer support company ultimately rests on the importance of stability to your business. While an IT managed services model may seem more expensive due to the ongoing monthly cost, it’s important to factor in the expense associated with a major breach and productivity losses due to downtime when you’re making a decision.

What Is The Difference Between Help Desk Services & Desktop Computer Support?

Computer Help Desk

In searching for the ideal outsourced IT support company for your business, you may have come across some technical terms and phrases. Many of them are probably phrases you’ve heard before; however, you may not be sure of their precise technical meaning within the IT space.

Computer Help Desk
While there are general and universal terms, there may also be variations of these phrases from one service provider to another. When receiving a quote, make sure you have a full understanding of what your service plan will include.

With this in mind, the following is a list of common terms related to IT services along with an explanation of their general implications and meaning:

Help Desk

Help Desk refers to a central point of contact (external or internal) who can be consulted if problems arise. This technician would then determine the root cause of the issue and delegate the work to the appropriate department or team.

Break-Fix

Break-Fix refers to when an IT hardware component breaks down or becomes defective, an IT Support company (typically an independent contractor) would be hired to service, repair or replace it within a designated time frame. (The price of a replacement part is likely not included in the service pricing.) However, systems are not managed, monitored or maintained with this very basic level of service.

IT Support

IT Support refers to broad and general technical assistance for your system. It can cover the planning phase, the setting up of your system components and also the maintenance of software and hardware. However, service is conducted on whole systems and networks in a server room as opposed to servicing individual desktop computers.

Desktop Computer Support

Desktop Support covers office equipment and end users. Desktop Support often includes break-fix coverage as well as limited support and technical guidance. Desktop Support is typically offered remotely, to repair and support software-related issues on company networks and individual users’ computers. It often also includes coverage of telephones, printers and other peripherals.

Managed IT Service 

Managed Service is technical support for your computer servers, system load balancers, firewalls, hosting and related components. Managed Service is more proactive than typical IT support. Systems will be maintained and monitored remotely by the service provider. Any service could be managed or fully managed; it is up to the client to decide what service level they need and expect to receive.

Fully-Managed IT Service

Fully-Managed Service includes all the features of Managed Service, but also covers day to day IT department activities like adding or deleting users, adjusting privileges, changing passwords and the like.

When signing up for a service plan, it’s vital to be aware of the coverage and parameters of each option. This ensures that there will be no misunderstandings and that your company will be receiving the features that are ideal for your system. Services can range from basic break-fix to fully managed coverage and system care. Service may be hardware-only and not include routine care or specific jobs.

Again, this is not an exhaustive list of IT terms related to outsourced support. You should check with the providers you are considering and seek clarity about specific service offerings if required. However, this list offers a basic overview of the most common terms that are used in the IT Services Industry.

10 Tips To Guard Against SamSam Ransomware

SamSam Ransomware

In July 2018, an article published by Naked Security stated that SamSam, one of the latest ransomware threats, has been one of the most costly and dangerous attacks in history. SamSam leeched at least $6 million from unwitting victims, some of which were well-known businesses and government operations.

SamSam Ransomware

SamSam ended up costing the Colorado Department of Transportation upwards of $1.5 million as of April 2018, according to the Denver Post. The FBI and Department of Homeland Security (DHS) agencies have stepped in with recommendations to help business owners keep themselves and their data protected from not just SamSam, but other malware as well.

1. Make changes to systems that rely on RDP remote communication.

If you don’t use the RDP service, disable it. If you do rely on remote communication, work with an IT consulting agency to implement upgraded patches that conform to current system operations.

2. Use firewalls to protect open RDP ports.

If your system utilizes open RDP ports and public IP addresses, make sure these are rightly protected with a firewall. Virtual private networks should be used to access these ports, so make sure all users understand how to access the systems even once they are protected.

3. Beef up system passwords and lockouts.

One of the easiest ways to defend against brute-force attacks is to beef up your passwords and lockouts that are in use. USA Today says passwords should be a random collection of characters (upper and lower case), at least eight characters long, and that you should use a different password for each application. Use strong passwords among shared devices just the same as you would on the internet.

4. Utilize two-factor authentication processes.

Two-factor authentication processes offer an extra layer of security for applications that have it available. Many business owners skip doing two-factor authentication because it saves time, but this is an easy way to make systems more secure.

5. Pay attention to system updates as they become available.

System and software updates are hugely important, whether they are manually implemented or automatically added. These updates are frequently released as new threats emerge to the surface that would otherwise compromise an existing system. Never turn off automatic system updates and have a business security expert check your system for updates on occasion.

6. Implement a reliable backup strategy.

If something happens and your system is compromised by a SamSam ransomware attack, you need to have a backup plan already in place. Therefore, it is critical to implement a reliable backup access strategy so your system and your data can remain accessible.

7. Enable system logs and keep them for at least 90 days.

System logs will record every login attempt through RDP ports and other applications. In the event of an attack, IT analysts will be able to pinpoint the exact time that the system was infiltrated, which can be really helpful to solve the problem.

8. Follow guidelines for accessing cloud-hosted services.

If you do have cloud-hosted data that you frequently access, follow that provider’s rules for accessing your data and do not ignore their guidelines. These rules are specifically in place to keep your information protected. If you are using third-party services that require RDP access ports, make sure the service is following the latest safety practices.

9. Keep network exposure at a minimum for critical hardware.

In other words, if you have a hardware system that can function without being interconnected to all other devices on the network, then operate it as a standalone component. Just because you can connect everything in the modern technology setting, it does not always mean that you should. If SamSam or another ransomware attacks, hardware that is not connected can be safe. Likewise, it is good if you turn off sharing between printers and other devices unless it is absolutely necessary.

10. Restrict users from running software and opening emails.

There should only be trusted people within your business who are allowed the privilege of running software on any system. Therefore, make sure all users have a clear set of outlined access permissions and restrictions. It is also essential that email attachments are carefully handled, which means not every user should be allowed to open, access, or view email attachments.

Even though protecting your business from SamSam ransomware and other business cybersecurity threats can be time-consuming, it is these lines of protection that will save you from an expensive attack. Reach out to a cybersecurity expert for more information about adequately protecting your business network.

Amazon Now Into Healthcare?

Amazon Healthcare

Is Amazon Getting Into Healthcare?

Amazon has already gotten into healthcare. The world’s largest internet company and third-largest retailer announced in January that it was forming an independent healthcare company for its own employees and the employees of other finance and multinational business giants: JP Morgan Chase and Berkshire Hathaway. Often overlooked in news reports, JP Morgan Chase CEO Jamie Dimon said that the new company could eventually “be expanded to benefit all Americans.”

Amazon Healthcare

Some experts have wondered if Amazon and its partners just wanted to negotiate lower healthcare costs for their own employees. Others, looking at Amazon’s acquisition of Whole Foods and its disruption of retail groceries, speculated that Amazon’s goals with the partnership were much broader.

The answer came June 28: Amazon has broader goals to disrupt the healthcare industry. The tech giant acquired New Hampshire-based PillPack, a mail-order pharmacy that delivers prescriptions directly to consumers on a bi-weekly basis.

Amazon paid slightly less than $1 billion for PillPack, which had a valuation of about $361 million when the offer was made. Its competitor for PillPack was the world’s largest retailer: WalMart.

What Could Amazon’s Disruption of Consumer Pharma Look Like?

Pharmaceutical sales are the first sector in healthcare that Amazon plans to enter. Traditional pharmacies have already taken a hit, with CVS, Rite Aid, and Walgreens losing more than $14.6 billion in share value after the announcement of Amazon’s purchase of PillPack.

It turns out that Amazon probably bought PillPack because it has been trying to enter the $400 billion U.S. pharmacy business for years, but encountered barriers to selling retail pharmaceuticals via its online platform. PillPack was already licensed to ship prescriptions to patients in every state. Analysts think that Amazon’s retail and IT background will quickly enable it to reduce prescription drug prices using PillPack’s platform.

What Other Aspects of the Healthcare Industry Could Amazon Disrupt?

Amazon seems likely to work toward disrupting traditional healthcare billing and payment. The tech giant’s joint healthcare venture with JP Morgan Chase and Berkshire Hathaway is led by celebrity surgeon and author Atul Gawande. Although critics say Gawande lacks management experience, he cofounded an innovative healthcare partnership between Harvard and Brigham and Women’s Hospital in 2012.

Gawande told an Aspen Institute audience in June, “we’re going to drive better outcomes, better satisfaction with care and better cost efficiency with new models that can be incubated for all.” Gawande has also said, “we pay doctors for quantity, not quality.”

Amazon also brought Martin Levine onto its healthcare team. Levine is a former practicing physician and clinic director for Iora Health, a Boston-based patient-focused and team-oriented healthcare provider which is expanding rapidly throughout several states, including Arizona, Georgia, and Washington. Amazon’s new healthcare models are likely to be based on patient health outcomes and satisfaction, not quantity or type of care provided.

Healthcare Logistics

Hospitals and clinics have begun to use Amazon Business to improve their supply chains. One Washington clinic provider uses Amazon’s “dash” buttons to fill 90% of its supply and ordering needs. Amazon is licensed to sell medical supplies in 47 of 50 states and the District of Columbia.

Big Data and Individualized Care

Amazon’s ability to use big data to improve retail customer care and outcomes might be adapted to improve health care provision. Amazon created a team to focus on adapting Alexa to help people with managing chronic illness. As an example, the voice assistant could easily be instructed to remind users to take medication at prescribed times.

Some analysts see Amazon as also having the potential to become any one of the following:

  • Patient engagement platform/remote/telemedicine
  • Transparency or provider rating tool
  • Insurance broker
  • EHR provider

Healthcare insiders have been skeptical about Amazon’s ability to make change or disrupt the healthcare sector because Microsoft and Google both failed with their prior attempts. Google Health ended in 2012, while Microsoft’s HealthVault ceased operations in January 2018. Google and Microsoft’s healthcare industry projects were consumer-facing and had limited to no revenue streams.

Amazon has already built a revenue stream and acquired a direct-delivery pharmacy with PillPack and it has brought several healthcare industry disruptors onboard, starting with Atul Gawande. Amazon’s partnership with JP Morgan Chase and Berkshire Hathaway brings the finance and multinational investment sectors together in a way that previous private industry failures to negotiate lower healthcare costs lacked. Amazon is also a big data company that has the potential to improve health outcomes for patients through the use of its voice assistant Alexa. Analysts have talked about how Amazon wants to “cut out the middleman” in healthcare. Amazon’s Jeff Bezos hasn’t commented in detail about his company’s healthcare venture, but Jamie Dimon, CEO of JP Morgan Chase, said the venture is likely to start out small, like Amazon did with books during its early years. “We may spend a bunch of time getting one piece of it right and testing things to see what works,” Dimon said in July.

Why Business Must Have A Security Focused IT Consulting Company

Small Business Cybersecurity

When you are choosing the best IT consulting for your business, it is critical that you find a company that is extremely focused on all of the elements of security that can be a threat. Many of the best IT consulting companies go the extra mile for their clients by acting as a Managed Security Services Provider (MSSP), which allows all aspects of consultation to involve attention to security details.

Small Business Cybersecurity

Understanding Why Security Focus Is Critical

Cybersecurity threats are a significant problem for all business owners and corporations, whether they are small with only a few computers or massive with on-site servers and a lot of systems. A lot of big names have been targeted in recent years, including companies like Yahoo and Facebook, which shows that even companies with millions to invest in cybersecurity can face issues.

While security threats affect businesses of all sizes, smaller companies can suffer the hardest hits because they often do not have the funding to recover. The National Security Alliance says that about 50 percent of small businesses have faced an attack and about 60 percent of small and medium-sized businesses go under as soon as six months after an attack.

Many Businesses Lack the Security Protocols Needed

One of the most significant problems that allow businesses to be vulnerable to an attack is there is not enough integrated security protection. It is not uncommon for smaller business owners do not have the funding in place from the time a business is developed to pay close enough attention to building the most secure data setup. Many of these companies rely on a primary operating system that only boasts a typical firewall or antivirus program, but much more is necessary for absolute protection. If a hacker with ill intent manages to get through a basic firewall or antivirus program, they can get into the entire system.

The best cybersecurity protection is an all-encompassing thing; built along with the entire system and weaved through all the programs and operating functions of the system’s components. Therefore, having a good business IT security consultant to work with you from start to finish is always for the best of your business. The most efficient and protected business will have around-the-clock protection from a qualified IT consultant or cyber security expert, and sometimes both.

Protection Provided by a Security-Focused IT Consulting Service

The overall role of a security-focused IT consulting service will be to protect your data, your hardware, and your business operation. Certain things like frequent security scans of the entire system, consistent upgrades to security firmware, and ongoing attention to the latest security threats will be an integral part of the services offered by an IT consulting company with an intrinsic focus on cybersecurity threats.

Beyond the typical measures to keep your data and hardware protected, the company will offer things like:

  • Utilizing intrusion detection and protection methods to make sure the IT team is aptly alerted when there are the smallest signs of malicious activity.
  • Monitoring network traffic and staying alert to any drastic changes that could be due to a compromise of your system.
  • Building multi-layer firewall protection systems that are hard to penetrate completely.
  • Incorporating efficient and up-to-date antivirus programs designed to scan, contain, and remove any fragment of malicious files.
  • Providing immediate response to cybersecurity threats and attacks when the timing is the most critical to protect your data.
  • Making sure your employees have the training materials needed, so they know how to recognize threats and suspicious activity.
  • Offering off-site storage for data to protect your information in the event of a significant compromise.
  • Giving your business IT systems the necessary attention and upgrades to comply with the most recent standards in security.
  • Informing you off cybersecurity insurance products to help protect your business in the event of an attack.
  • Testing for the vulnerability of your system on a regular basis to track down any weak points in your system setup.

How to Find the Best Security-Focused IT Service

Not every IT consulting company is going to offer the exact same level of care when it comes to security. Therefore, as a business owner or executive in charge of overseeing IT needs, it is vital that you know how to find the best company that will keep your security held as important. Look for an IT service provider who acts doubly as a Managed Security Services Provider (MSSP). These companies will have a complete dedication to keeping all aspects of your systems secure.

How Will Artificial Intelligence Work In Healthcare?

AI In Healthcare

When it comes to artificial intelligence (AI), it seems that no matter the environment, there are always two parties: staunch defenders and unconvinced skeptics. And to be sure, any new technology carries the same burden — Do the benefits outweigh the potential downfalls?

Everyone seems to have a different opinion.

For now, let’s look at some of the most recent news concerning the marriage between AI and healthcare. Later, we’ll get into some fears and potential drawbacks that this new form of technology has posed.

AI In Healthcare

What’s New in the World of Healthcare and AI?

You’ve probably already used it.

While you don’t see robot doctors rolling down the hallway in hospitals quite yet, there are still many artificial intelligence tools being used on a regular basis in the healthcare industry. For example, AI is often used in precision medicine to allow for detail work in risky surgeries. It’s also used regularly in cardiac care and routine colon screenings.

The FDA is finally starting to clear new AI technology.

For a long time, the U.S. FDA (Federal Drug Administration) seemed to be taking forever to examine and clear new artificial intelligence technology.

Now, it’s catching up with the changing times and has recently cleared several intelligent software algorithms. Some of these algorithms scan CT scans for common problems while others analyze data, attempt to detect atrial fibrillation in heart patients, and do many other tasks that humans used to do.

Larger AI systems are being anticipated, but not so widely implemented.

There’s definitely a lot of hype around artificial intelligence, but not many hospitals and healthcare facilities are actually making changes that will allow for its immediate implementation. What does that mean for you? It means that now is the ideal time to get involved in developing new AI equipment and tools or at least investing in their development.

Not everyone is onboard with AI.

Those who aren’t on board? Often, it’s executives.

The only way these guys are going to bankroll new technologies is with some proof that it will be worth the investment — because investments in these areas are significant, and the price tag is what holds a lot of executives back from giving the green light. When proponents can show that the return on investment will be worth it, however, that’s the only time that execs seem interested in supporting brand-new AI systems and software algorithms — and this all comes down to showing the data.

Are There Drawbacks to AI in Healthcare?

Yes, certainly. Below, we’ll focus on two of the main concerns people have about AI in the healthcare industry.

Human jobs lost to robots

Or lost to computers, if you prefer; however, for all intents and purposes, human doctors, nurses, and other medical staff will be replaced by de facto robots.

Either way, just as in any other industry (see grocery store checkout lines, customer service, assembly line work, and more), AI is edging out the real-life competition. This will not only cause widespread job loss, but it will also disrupt the relationship between patients and their caregivers.

While a majority of the healthcare industry is driven by science (and technology) and the possibilities these fields can create for increasing lifespan and wellness, there’s also a large portion of healthcare that’s driven by compassion and humanity’s general desire to care for and heal each other.

Naturally, this is lost on AI.

As such, the caring concern, encouragement, and inspired confidence that a good doctor or nurse can provide will be gone when cold, hard, short-circuiting computers take their place.

Unseen errors

If a human makes a mistake in a human-driven industry, it’s bound to be found out rather quickly. And checks and balances in any pharmacy, doctor’s office, or hospital are primarily run by humans at this point. But wait several years, and you’ll see computers taking over these, often monotonous jobs of double checking, updating, and editing.

Indeed, there are many details of healthcare that computers get right more often than humans, but there are also details that computers probably won’t ever get right — seeing and noticing handwritten memos, detecting typos that could technically be correct but that — logically — are not, and recognizing other errors that just don’t make sense.

Computers can’t do these things. They “make sense” of whatever you tell it to make sense of initially, and they don’t “care” if something “seems off.”

As backup and checks and balances systems become more computer-driven, then, this leaves room for errors at the source that will eventually make it all the way to the patient — without anyone noticing.

While many people have genuine concerns about what AI will do to healthcare, it’s evident that momentum in research, development, and implementation isn’t going to stop. As of right now, there’s just too much hope (and money) wrapped up in the AI industry. In the end, only time will tell how this new technology benefits us — or hurt us.