What Is The Difference Between Computer Repair and Computer Support Companies?

Managed IT Services

When computers or network systems break, you need to know that you’re able to quickly get your teams back online and to full productivity. That can be a challenge, especially if you’re working with a computer repair company. You can’t predict when a problem is going to occur or guarantee that a technician who is comfortable with your network configuration is able to quickly resolve the problem. This can be a costly issue for your business, not only in terms of the direct costs of hiring a computer repair tech, but also the indirect costs of lost productivity and customer frustration. When you work with a computer support company, you have the peace of mind knowing that there are set parameters around their response times and ability to solve specific problems. With a structured ongoing cost structure and myriad business benefits, many organizations are choosing to outsource to computer support companies.

Managed IT Services

What Are the Benefits of Using a Computer Repair Shop?

If you use the same computer repair shop for a long period of time, you may develop a relationship that allows you to quickly describe the problem and receive the resolution. However, you may find that you need multiple repair partners in order to successfully support all of the software and hardware that make up your IT infrastructure. You will only pay for the items that break and need to be fixed, so there are no monthly or quarterly costs that need to be budgeted. This approach also allows your technology team to assign tasks to internal staff members for resolution if they have time available. While these are strong benefits, there are some negatives to this approach as well.

Why Should I Use a Computer Support Company?

Using a computer support company, also known as a managed services provider, helps fill in some of the gaps that are left with a simple break/fix repair shop. While computer repair shops are often able to resolve a specific problem, they are unlikely to provide your business with the proactive security and technology management that will help you remain competitive in the future. The ongoing costs of working with a computer support company also ensure that you receive a high quality of service — guaranteed. You’re able to offload some of the more time-intensive daily tasks that can be a drain on internal IT time such as resetting passwords or restoring files. This allows internal IT staff to become a more active part of the organization’s digital strategy by contributing thought leadership and active engagement with business users to move the organization forward. An IT managed services provider is always on the job: reviewing your security posture, applying bug fixes and security patches to software, actively managing software licenses and ensuring that your network infrastructure remains stable.

Security Benefits with IT Managed Services

Applying hotfixes and patches is one of those ongoing tasks that can be difficult to prioritize on a daily, weekly or even monthly basis — but they are crucial to the ongoing security of your network and computers. Since IT managed services providers are paid whether or not you have a major outage, they are incentivized to create a high-availability environment that includes fewer slowdowns and limits the possibility of a breach. Any network security concerns are addressed immediately, by a team of professionals who are well-versed in various software platforms and security procedures. You’re also able to leverage best practices from across a range of industries to ensure that any sensitive personal, financial or health data is well-protected by the best possible security procedures.

Making a decision between a computer repair shop and a computer support company ultimately rests on the importance of stability to your business. While an IT managed services model may seem more expensive due to the ongoing monthly cost, it’s important to factor in the expense associated with a major breach and productivity losses due to downtime when you’re making a decision.

What Is The Difference Between Help Desk Services & Desktop Computer Support?

Computer Help Desk

In searching for the ideal outsourced IT support company for your business, you may have come across some technical terms and phrases. Many of them are probably phrases you’ve heard before; however, you may not be sure of their precise technical meaning within the IT space.

Computer Help Desk
While there are general and universal terms, there may also be variations of these phrases from one service provider to another. When receiving a quote, make sure you have a full understanding of what your service plan will include.

With this in mind, the following is a list of common terms related to IT services along with an explanation of their general implications and meaning:

Help Desk

Help Desk refers to a central point of contact (external or internal) who can be consulted if problems arise. This technician would then determine the root cause of the issue and delegate the work to the appropriate department or team.

Break-Fix

Break-Fix refers to when an IT hardware component breaks down or becomes defective, an IT Support company (typically an independent contractor) would be hired to service, repair or replace it within a designated time frame. (The price of a replacement part is likely not included in the service pricing.) However, systems are not managed, monitored or maintained with this very basic level of service.

IT Support

IT Support refers to broad and general technical assistance for your system. It can cover the planning phase, the setting up of your system components and also the maintenance of software and hardware. However, service is conducted on whole systems and networks in a server room as opposed to servicing individual desktop computers.

Desktop Computer Support

Desktop Support covers office equipment and end users. Desktop Support often includes break-fix coverage as well as limited support and technical guidance. Desktop Support is typically offered remotely, to repair and support software-related issues on company networks and individual users’ computers. It often also includes coverage of telephones, printers and other peripherals.

Managed IT Service 

Managed Service is technical support for your computer servers, system load balancers, firewalls, hosting and related components. Managed Service is more proactive than typical IT support. Systems will be maintained and monitored remotely by the service provider. Any service could be managed or fully managed; it is up to the client to decide what service level they need and expect to receive.

Fully-Managed IT Service

Fully-Managed Service includes all the features of Managed Service, but also covers day to day IT department activities like adding or deleting users, adjusting privileges, changing passwords and the like.

When signing up for a service plan, it’s vital to be aware of the coverage and parameters of each option. This ensures that there will be no misunderstandings and that your company will be receiving the features that are ideal for your system. Services can range from basic break-fix to fully managed coverage and system care. Service may be hardware-only and not include routine care or specific jobs.

Again, this is not an exhaustive list of IT terms related to outsourced support. You should check with the providers you are considering and seek clarity about specific service offerings if required. However, this list offers a basic overview of the most common terms that are used in the IT Services Industry.

10 Tips To Guard Against SamSam Ransomware

SamSam Ransomware

In July 2018, an article published by Naked Security stated that SamSam, one of the latest ransomware threats, has been one of the most costly and dangerous attacks in history. SamSam leeched at least $6 million from unwitting victims, some of which were well-known businesses and government operations.

SamSam Ransomware

SamSam ended up costing the Colorado Department of Transportation upwards of $1.5 million as of April 2018, according to the Denver Post. The FBI and Department of Homeland Security (DHS) agencies have stepped in with recommendations to help business owners keep themselves and their data protected from not just SamSam, but other malware as well.

1. Make changes to systems that rely on RDP remote communication.

If you don’t use the RDP service, disable it. If you do rely on remote communication, work with an IT consulting agency to implement upgraded patches that conform to current system operations.

2. Use firewalls to protect open RDP ports.

If your system utilizes open RDP ports and public IP addresses, make sure these are rightly protected with a firewall. Virtual private networks should be used to access these ports, so make sure all users understand how to access the systems even once they are protected.

3. Beef up system passwords and lockouts.

One of the easiest ways to defend against brute-force attacks is to beef up your passwords and lockouts that are in use. USA Today says passwords should be a random collection of characters (upper and lower case), at least eight characters long, and that you should use a different password for each application. Use strong passwords among shared devices just the same as you would on the internet.

4. Utilize two-factor authentication processes.

Two-factor authentication processes offer an extra layer of security for applications that have it available. Many business owners skip doing two-factor authentication because it saves time, but this is an easy way to make systems more secure.

5. Pay attention to system updates as they become available.

System and software updates are hugely important, whether they are manually implemented or automatically added. These updates are frequently released as new threats emerge to the surface that would otherwise compromise an existing system. Never turn off automatic system updates and have a business security expert check your system for updates on occasion.

6. Implement a reliable backup strategy.

If something happens and your system is compromised by a SamSam ransomware attack, you need to have a backup plan already in place. Therefore, it is critical to implement a reliable backup access strategy so your system and your data can remain accessible.

7. Enable system logs and keep them for at least 90 days.

System logs will record every login attempt through RDP ports and other applications. In the event of an attack, IT analysts will be able to pinpoint the exact time that the system was infiltrated, which can be really helpful to solve the problem.

8. Follow guidelines for accessing cloud-hosted services.

If you do have cloud-hosted data that you frequently access, follow that provider’s rules for accessing your data and do not ignore their guidelines. These rules are specifically in place to keep your information protected. If you are using third-party services that require RDP access ports, make sure the service is following the latest safety practices.

9. Keep network exposure at a minimum for critical hardware.

In other words, if you have a hardware system that can function without being interconnected to all other devices on the network, then operate it as a standalone component. Just because you can connect everything in the modern technology setting, it does not always mean that you should. If SamSam or another ransomware attacks, hardware that is not connected can be safe. Likewise, it is good if you turn off sharing between printers and other devices unless it is absolutely necessary.

10. Restrict users from running software and opening emails.

There should only be trusted people within your business who are allowed the privilege of running software on any system. Therefore, make sure all users have a clear set of outlined access permissions and restrictions. It is also essential that email attachments are carefully handled, which means not every user should be allowed to open, access, or view email attachments.

Even though protecting your business from SamSam ransomware and other business cybersecurity threats can be time-consuming, it is these lines of protection that will save you from an expensive attack. Reach out to a cybersecurity expert for more information about adequately protecting your business network.

Amazon Now Into Healthcare?

Amazon Healthcare

Is Amazon Getting Into Healthcare?

Amazon has already gotten into healthcare. The world’s largest internet company and third-largest retailer announced in January that it was forming an independent healthcare company for its own employees and the employees of other finance and multinational business giants: JP Morgan Chase and Berkshire Hathaway. Often overlooked in news reports, JP Morgan Chase CEO Jamie Dimon said that the new company could eventually “be expanded to benefit all Americans.”

Amazon Healthcare

Some experts have wondered if Amazon and its partners just wanted to negotiate lower healthcare costs for their own employees. Others, looking at Amazon’s acquisition of Whole Foods and its disruption of retail groceries, speculated that Amazon’s goals with the partnership were much broader.

The answer came June 28: Amazon has broader goals to disrupt the healthcare industry. The tech giant acquired New Hampshire-based PillPack, a mail-order pharmacy that delivers prescriptions directly to consumers on a bi-weekly basis.

Amazon paid slightly less than $1 billion for PillPack, which had a valuation of about $361 million when the offer was made. Its competitor for PillPack was the world’s largest retailer: WalMart.

What Could Amazon’s Disruption of Consumer Pharma Look Like?

Pharmaceutical sales are the first sector in healthcare that Amazon plans to enter. Traditional pharmacies have already taken a hit, with CVS, Rite Aid, and Walgreens losing more than $14.6 billion in share value after the announcement of Amazon’s purchase of PillPack.

It turns out that Amazon probably bought PillPack because it has been trying to enter the $400 billion U.S. pharmacy business for years, but encountered barriers to selling retail pharmaceuticals via its online platform. PillPack was already licensed to ship prescriptions to patients in every state. Analysts think that Amazon’s retail and IT background will quickly enable it to reduce prescription drug prices using PillPack’s platform.

What Other Aspects of the Healthcare Industry Could Amazon Disrupt?

Amazon seems likely to work toward disrupting traditional healthcare billing and payment. The tech giant’s joint healthcare venture with JP Morgan Chase and Berkshire Hathaway is led by celebrity surgeon and author Atul Gawande. Although critics say Gawande lacks management experience, he cofounded an innovative healthcare partnership between Harvard and Brigham and Women’s Hospital in 2012.

Gawande told an Aspen Institute audience in June, “we’re going to drive better outcomes, better satisfaction with care and better cost efficiency with new models that can be incubated for all.” Gawande has also said, “we pay doctors for quantity, not quality.”

Amazon also brought Martin Levine onto its healthcare team. Levine is a former practicing physician and clinic director for Iora Health, a Boston-based patient-focused and team-oriented healthcare provider which is expanding rapidly throughout several states, including Arizona, Georgia, and Washington. Amazon’s new healthcare models are likely to be based on patient health outcomes and satisfaction, not quantity or type of care provided.

Healthcare Logistics

Hospitals and clinics have begun to use Amazon Business to improve their supply chains. One Washington clinic provider uses Amazon’s “dash” buttons to fill 90% of its supply and ordering needs. Amazon is licensed to sell medical supplies in 47 of 50 states and the District of Columbia.

Big Data and Individualized Care

Amazon’s ability to use big data to improve retail customer care and outcomes might be adapted to improve health care provision. Amazon created a team to focus on adapting Alexa to help people with managing chronic illness. As an example, the voice assistant could easily be instructed to remind users to take medication at prescribed times.

Some analysts see Amazon as also having the potential to become any one of the following:

  • Patient engagement platform/remote/telemedicine
  • Transparency or provider rating tool
  • Insurance broker
  • EHR provider

Healthcare insiders have been skeptical about Amazon’s ability to make change or disrupt the healthcare sector because Microsoft and Google both failed with their prior attempts. Google Health ended in 2012, while Microsoft’s HealthVault ceased operations in January 2018. Google and Microsoft’s healthcare industry projects were consumer-facing and had limited to no revenue streams.

Amazon has already built a revenue stream and acquired a direct-delivery pharmacy with PillPack and it has brought several healthcare industry disruptors onboard, starting with Atul Gawande. Amazon’s partnership with JP Morgan Chase and Berkshire Hathaway brings the finance and multinational investment sectors together in a way that previous private industry failures to negotiate lower healthcare costs lacked. Amazon is also a big data company that has the potential to improve health outcomes for patients through the use of its voice assistant Alexa. Analysts have talked about how Amazon wants to “cut out the middleman” in healthcare. Amazon’s Jeff Bezos hasn’t commented in detail about his company’s healthcare venture, but Jamie Dimon, CEO of JP Morgan Chase, said the venture is likely to start out small, like Amazon did with books during its early years. “We may spend a bunch of time getting one piece of it right and testing things to see what works,” Dimon said in July.

Why Business Must Have A Security Focused IT Consulting Company

Small Business Cybersecurity

When you are choosing the best IT consulting for your business, it is critical that you find a company that is extremely focused on all of the elements of security that can be a threat. Many of the best IT consulting companies go the extra mile for their clients by acting as a Managed Security Services Provider (MSSP), which allows all aspects of consultation to involve attention to security details.

Small Business Cybersecurity

Understanding Why Security Focus Is Critical

Cybersecurity threats are a significant problem for all business owners and corporations, whether they are small with only a few computers or massive with on-site servers and a lot of systems. A lot of big names have been targeted in recent years, including companies like Yahoo and Facebook, which shows that even companies with millions to invest in cybersecurity can face issues.

While security threats affect businesses of all sizes, smaller companies can suffer the hardest hits because they often do not have the funding to recover. The National Security Alliance says that about 50 percent of small businesses have faced an attack and about 60 percent of small and medium-sized businesses go under as soon as six months after an attack.

Many Businesses Lack the Security Protocols Needed

One of the most significant problems that allow businesses to be vulnerable to an attack is there is not enough integrated security protection. It is not uncommon for smaller business owners do not have the funding in place from the time a business is developed to pay close enough attention to building the most secure data setup. Many of these companies rely on a primary operating system that only boasts a typical firewall or antivirus program, but much more is necessary for absolute protection. If a hacker with ill intent manages to get through a basic firewall or antivirus program, they can get into the entire system.

The best cybersecurity protection is an all-encompassing thing; built along with the entire system and weaved through all the programs and operating functions of the system’s components. Therefore, having a good business IT security consultant to work with you from start to finish is always for the best of your business. The most efficient and protected business will have around-the-clock protection from a qualified IT consultant or cyber security expert, and sometimes both.

Protection Provided by a Security-Focused IT Consulting Service

The overall role of a security-focused IT consulting service will be to protect your data, your hardware, and your business operation. Certain things like frequent security scans of the entire system, consistent upgrades to security firmware, and ongoing attention to the latest security threats will be an integral part of the services offered by an IT consulting company with an intrinsic focus on cybersecurity threats.

Beyond the typical measures to keep your data and hardware protected, the company will offer things like:

  • Utilizing intrusion detection and protection methods to make sure the IT team is aptly alerted when there are the smallest signs of malicious activity.
  • Monitoring network traffic and staying alert to any drastic changes that could be due to a compromise of your system.
  • Building multi-layer firewall protection systems that are hard to penetrate completely.
  • Incorporating efficient and up-to-date antivirus programs designed to scan, contain, and remove any fragment of malicious files.
  • Providing immediate response to cybersecurity threats and attacks when the timing is the most critical to protect your data.
  • Making sure your employees have the training materials needed, so they know how to recognize threats and suspicious activity.
  • Offering off-site storage for data to protect your information in the event of a significant compromise.
  • Giving your business IT systems the necessary attention and upgrades to comply with the most recent standards in security.
  • Informing you off cybersecurity insurance products to help protect your business in the event of an attack.
  • Testing for the vulnerability of your system on a regular basis to track down any weak points in your system setup.

How to Find the Best Security-Focused IT Service

Not every IT consulting company is going to offer the exact same level of care when it comes to security. Therefore, as a business owner or executive in charge of overseeing IT needs, it is vital that you know how to find the best company that will keep your security held as important. Look for an IT service provider who acts doubly as a Managed Security Services Provider (MSSP). These companies will have a complete dedication to keeping all aspects of your systems secure.

How Will Artificial Intelligence Work In Healthcare?

AI In Healthcare

When it comes to artificial intelligence (AI), it seems that no matter the environment, there are always two parties: staunch defenders and unconvinced skeptics. And to be sure, any new technology carries the same burden — Do the benefits outweigh the potential downfalls?

Everyone seems to have a different opinion.

For now, let’s look at some of the most recent news concerning the marriage between AI and healthcare. Later, we’ll get into some fears and potential drawbacks that this new form of technology has posed.

AI In Healthcare

What’s New in the World of Healthcare and AI?

You’ve probably already used it.

While you don’t see robot doctors rolling down the hallway in hospitals quite yet, there are still many artificial intelligence tools being used on a regular basis in the healthcare industry. For example, AI is often used in precision medicine to allow for detail work in risky surgeries. It’s also used regularly in cardiac care and routine colon screenings.

The FDA is finally starting to clear new AI technology.

For a long time, the U.S. FDA (Federal Drug Administration) seemed to be taking forever to examine and clear new artificial intelligence technology.

Now, it’s catching up with the changing times and has recently cleared several intelligent software algorithms. Some of these algorithms scan CT scans for common problems while others analyze data, attempt to detect atrial fibrillation in heart patients, and do many other tasks that humans used to do.

Larger AI systems are being anticipated, but not so widely implemented.

There’s definitely a lot of hype around artificial intelligence, but not many hospitals and healthcare facilities are actually making changes that will allow for its immediate implementation. What does that mean for you? It means that now is the ideal time to get involved in developing new AI equipment and tools or at least investing in their development.

Not everyone is onboard with AI.

Those who aren’t on board? Often, it’s executives.

The only way these guys are going to bankroll new technologies is with some proof that it will be worth the investment — because investments in these areas are significant, and the price tag is what holds a lot of executives back from giving the green light. When proponents can show that the return on investment will be worth it, however, that’s the only time that execs seem interested in supporting brand-new AI systems and software algorithms — and this all comes down to showing the data.

Are There Drawbacks to AI in Healthcare?

Yes, certainly. Below, we’ll focus on two of the main concerns people have about AI in the healthcare industry.

Human jobs lost to robots

Or lost to computers, if you prefer; however, for all intents and purposes, human doctors, nurses, and other medical staff will be replaced by de facto robots.

Either way, just as in any other industry (see grocery store checkout lines, customer service, assembly line work, and more), AI is edging out the real-life competition. This will not only cause widespread job loss, but it will also disrupt the relationship between patients and their caregivers.

While a majority of the healthcare industry is driven by science (and technology) and the possibilities these fields can create for increasing lifespan and wellness, there’s also a large portion of healthcare that’s driven by compassion and humanity’s general desire to care for and heal each other.

Naturally, this is lost on AI.

As such, the caring concern, encouragement, and inspired confidence that a good doctor or nurse can provide will be gone when cold, hard, short-circuiting computers take their place.

Unseen errors

If a human makes a mistake in a human-driven industry, it’s bound to be found out rather quickly. And checks and balances in any pharmacy, doctor’s office, or hospital are primarily run by humans at this point. But wait several years, and you’ll see computers taking over these, often monotonous jobs of double checking, updating, and editing.

Indeed, there are many details of healthcare that computers get right more often than humans, but there are also details that computers probably won’t ever get right — seeing and noticing handwritten memos, detecting typos that could technically be correct but that — logically — are not, and recognizing other errors that just don’t make sense.

Computers can’t do these things. They “make sense” of whatever you tell it to make sense of initially, and they don’t “care” if something “seems off.”

As backup and checks and balances systems become more computer-driven, then, this leaves room for errors at the source that will eventually make it all the way to the patient — without anyone noticing.

While many people have genuine concerns about what AI will do to healthcare, it’s evident that momentum in research, development, and implementation isn’t going to stop. As of right now, there’s just too much hope (and money) wrapped up in the AI industry. In the end, only time will tell how this new technology benefits us — or hurt us.

Critical Questions CEO’s Need To Ask When Evaluating Cyber Security Risks

CEOs & Cybersecurity

The number of cyber attacks has continued to increase exponentially. In fact, the FBI reported that since January 1, 2016, the number of cyber attacks using ransomware has risen to more than 4,000 daily attacks. Evolving technology and an increasing dependence on digital communications have created higher risk factors for businesses of all sizes. To effectively evaluate their cybersecurity risks, CEOs need to ask a few critical questions.

CEOs & Cybersecurity

Understanding The Cyber Security Landscape

Much like addressing any boardroom problem, CEOs need to ask the right types of questions if they are to effectively map out their cybersecurity defense system. A failure to effectively implement cybersecurity best practices can not only lead to stolen business files, but it can cost the company millions of dollars. In fact, in 2018 the average cost of a data breach increased by 6.4 percent from 2017 to reach $3.86 million. To avoid this hefty cost, CEOs should ask their IT teams the following questions.

  1. What critical information could be stolen during a cybersecurity attack?
  2. Who is authorized to access mission-critical information?
  3. Is our business involved in any type of information sharing? For example, are other companies or outside consultants allowed to remotely access the networks where critical information is stored?
  4. What security measures are already in place to avoid ransomware attacks? For example, have employees been trained on cybersecurity best practices and is two-step authentication used for all digital communications?
  5. How many threats does the business receive on a daily basis? Secondly, what are the identified areas of strength and weaknesses, and how can cybersecurity policies be enhanced?

The next series of questions will help CEOs to better understand specific risk levels.

  • What is the identified current level of cybersecurity risk?
  • What is the protocol when a cybersecurity risk is a) identified, b) escalated, and c) resolved?
    • Are lessons learned implemented so that the specific type of cybersecurity risk can be mitigated in the future?
  • How is the cybersecurity plan designed to mitigate insider threats (e.g., when an employee accidentally opens a corrupted file containing ransomware)?
  • Does the business continuity and disaster recovery plan include the potential for cybersecurity incidents?
  • Are best practices being implemented and is the cybersecurity plan up to industry standards?
    • Is the business prepared to effectively work with local, state, and federal government cyber incident responders/investigators in the event of a cybersecurity breach?

The goal of these questions is to help CEOs effectively evaluate and manage their company’s specific cybersecurity risks. For example, by identifying which critical assets would be most impacted by a cybersecurity attack, CEOs can best prioritize how to protect these particular entities by allocating resources and developing the policies and strategies needed to manage the heightened cybersecurity risk areas. In short, the goal of asking and answering these questions is to establish a “what if” environment rather than an “it won’t happen here” mentality, which can not only create a sense of false security but can also cause costly data security lapses.

How CEOs Can Implement Cyber Security Best Practices

As they answer the above questions, CEOs should also look to create a cybersecurity environment that leverages best practice approaches. In fact, by answering the above series of questions CEOs will be taking the first step needed to develop a robust cybersecurity plan. By elevating cybersecurity risk management discussions with not only the IT department but also with leaders from each department, CEOs can ensure that best practices are implemented across the company. After all, when it comes to cybersecurity, a company is only as strong as its weakest link, which in many cases is an employee who doesn’t follow the security guidelines.

The next step that CEOs should take is to ensure that the new cybersecurity plan adheres to industry standards. Instead of merely relying on compliance certifications and standards (which often represent the “bare minimum cybersecurity protocols” that a company should implement), CEOs should instead turn to industry best practices. For example, CEOs should ensure that they meet the guidelines outlined in the Federal Information Security Modernization Act, that they follow the insights provided by top organizations, and that create a proactive environment focused on consistency.

Finally, CEOs should ensure that any and all cybersecurity risk metrics are a) useful, b) measurable, and c) meaningful. In this vein, a useful metric would be to measure how long it takes for the IT department to patch an identified vulnerability. If the number of days it takes to create the patch reduces, then it shows that the cybersecurity risk is being lowered. However, if the number of days it takes to create the patch increases, then the company is being placed at a higher risk. If the threat continues to increase, then weakness in the company’s cybersecurity has been identified and should subsequently be addressed.

It is equally critical that companies test their entire incident response plan. As seen through the previous example, the trickle-down impact of a cybersecurity weakness can lead to costly results. By examining the incident response plan across the entire company, CEOs can ensure that both minor and large-scale cybersecurity incidents will be effectively resolved using industry best practices. In this vein, CEOs should evaluate in a mock cybersecurity incident how the department leaders, employees, and IT respond. After all the best incident response plans and cyber security tools are only as good as a) the people using them and b) the people reviewing them. If the entire company is not dedicated to implementing cybersecurity best practices, then the organization will remain at a higher risk level.

The Bottom Line: CEOs Need To Remain Prepared Against Existing And Emerging Cyber Security Threats

It’s no secret that new cybersecurity threats appear every day; however when CEOs fail to create a “what if” approach to cybersecurity, then they are leaving the doors open for an unwanted digital invasion. Through employee education, asking the right questions, and implementing the best practices approach, CEOs can shore-up their cyber security and keep critical data assets safe from threats. In conclusion, CEOs need to remain proactive in their approach to cybersecurity by leveraging the skills of industry experts and becoming a part of the more significant security conversation to ensure that their business and those that they exchange information with remain secure in the coming year.

Have You Heard Of The Maryland Cyber Security Tax Credit?

Maryland Cyber Security Tax Credits

Protecting data and information systems is a priority for nearly every type of business and organization. The state of Maryland has recently stepped up to support businesses by passing a bill that enables small businesses to invest in security technologies while earning tax credits. There are several aspects of the Maryland Cyber Security Tax Credit that business executives and managers may not be aware of.

Maryland Cyber Security Tax Credits

What is the Maryland Cyber Security Tax Credit?

The Maryland Cyber Security Tax Credit is an incentive program for companies to buy cybersecurity technology from a cybersecurity provider. This particular tax credit encourages small businesses to purchase cyber technology which will ultimately help protect both their business and consumer information. It’s also being used to help promote the cybersecurity industry. Companies can apply for the tax credit anytime during the year. Applications must be submitted by January 31, however, to receive a credit for the previous year.

A company purchasing the credit can claim 50 percent of the net cost as a tax credit. It’s required that the credit is claimed for the same year that it’s purchased. The tax credit was initiated in 2018 and is awarded by first come, first serve. Currently, $1.5 million in funds is available through the Department of Commerce for cybersecurity technology while $500,000 has been set aside for cybersecurity services.

What are the Particular Benefits of the Tax Credit?

There are several specific benefits for companies when obtaining these tax credits.

  • A company can claim as much as $50,000 in tax credits in one year after purchasing cybersecurity technology from a Maryland provider.
  • A cybersecurity provider can claim tax credits in one year for $400,000 worth of cybersecurity sales.
  • Third parties are allowed to sell cyber security technology if the purchase price is reduced by 20 percent before the 50 percent credit is calculated.
  • Third parties must also have the name of the qualified Maryland provider on the invoice as well as describing the technology that was purchased.

Who is Eligible for the Tax Credit?

The tax credit is for businesses that meet specific criteria. Before receiving the tax credit, it must be determined that the services or products being purchased meet the required definition of cybersecurity technology. Cybersecurity technology must be proprietary goods and services that have been created to protect electronically stored information or data. The products or services are created to prevent data extrusion or unauthorized access to data and information systems. Besides meeting the defined criteria for what constitutes cybersecurity technology, both the provider and the business buying the services must meet several eligibility requirements. The following are a few of the requirements that need to be met.

  • Both the company providing or buying can be inactive business for no more than 5 years.
  • Both the company providing or buying the tax credit must file income taxes in Maryland and employ fewer than 50 individuals.
  • A cybersecurity provider in Maryland must be certified as either the company buying the services or selling to claim a tax credit.
  • To become a qualified cybersecurity provider in Maryland the company must be certified through the Department of Commerce.

How Does the Application Process Work?

There are several steps a business must take to be a cybersecurity provider or to qualify to buy the tax credit. The Maryland Economic Development Association explains the steps for either process. The process to obtain the tax credit or to be a provider both involve providing several types of documentation such as a detailed business plan and a Certificate of Good Standing from the state of Maryland. There are currently eight businesses in Maryland that are qualified to sell cybersecurity technology.

Business owners now have a tax credit option that can help them protect their vital data and information. Maryland has taken a positive step in assisting companies to improve their cybersecurity while promoting local business.

10 Important Tips For Meeting Accessibility Standards With Email

Email Marketing

When you launch an email campaign, you want your message to be read and understood by as many people as possible, and one way to do that is by making your emails accessible to people with disabilities. Those with visual, cognitive, auditory, or mobility impairments have special needs that can be addressed by adhering to some simple practices and assistive techniques to ensure that your message can reach them too. Failing to take steps to include these individuals is not only considered insensitive these days, it’s legally required in many countries, and more to the point, it also costs your business.

Email Marketing

Why Email Accessibility Is Important

There are a lot more disabled people in the U.S. and globally than those who aren’t affected by it personally realize. According to the National Institutes of Health, 37.5 million American adults, or 15%, have hearing loss, 1.3 million are blind, and another 2.9 million have low vision. The Centers for Disease Control says that 25% of adults in the U.S. experience some type of disability, and the World Health Organization states that hundreds of millions of additional people around the world are disabled.

From a business perspective, it has been estimated that people with disabilities in the U.S. have $1 trillion in total income and more than $220 billion in disposable income. That makes them a demographic that most businesses can’t afford to ignore, and if you’re not practicing email accessibility, you’re missing out on a big potential market.

So how can you start making your emails more user-friendly and understandable to those with disabilities? Here are ten methods you can start using right away.

10 Tips For Meeting Email Accessibility Standards

  • Create concise and straightforward content. This is something you should be doing for the benefit of all your readers. Stay away from language that’s too technical and trendy business jargon that can distract readers away from your message. It’s also a good idea to use very clear subject titles to help those using assistive technologies like screen readers understand what the email is about, and to include a link to a plain text version of the email.
  • Use a larger font size. This can be very helpful for those with low vision and for dyslexia sufferers too. Aim for at least 14 pixels or larger for the best results.
  • Consider your use of colors. The use of color can be important for branding and capturing attention, but it can be a problem for those with vision impairment. Text and other types of content need to have a certain amount of contrast against a background color to be visible, with the accepted standard being a ratio of 4.5:1. You can check your emails for the right contrast on any page with this handy online tool.
  • Break up text content with images. You probably already know that it’s good form to keep your paragraphs short and to use subtitles, but placing images that represent a visual depiction of what’s being conveyed in the text between longer paragraphs can help to increase engagement and message reinforcement for all your readers and also help those with disabilities to understand. Keep in mind that if you use animation or graphics that flicker or flash like a strobe that it can cause seizures in people with certain disorders.
  • Use alternative text for images. Alt text is an attribute that can be added to an email to display a box with a text description of what an image is for those who can’t perceive them.
  • Use mobile accessibility designs. With so many people using mobile devices these days, your emails should be mobile friendly for viewing on smartphones and tablets. You can make them even more accessible to those with disabilities by including the ability to easily resize content without using third-party technology and by using large target areas for your CTA buttons.
  • Use HTML5 semantic elements. Use the same heading and paragraph tags that you would use to render content on a regular web page to make your text clearer and more easily understood.
  • Use “presentation” in layout tables. It’s common practice to use tables for layout and formatting purposes in emails, and you can easily make them more accessible by adding the element role=“presentation”. This tells any assistive technology to read the content but to ignore the table properties.
  • Include a text description for hyperlinks. Someone using a screen reader won’t know where a hyperlink is taking them if the text just reads ‘click here’. Adding text to describe the content of the landing page will let them decide if they want to click the link or not.
  • Consider adding transcripts and captions to videos. This is essential for those with hearing and vision impairments and also allows for private viewing or reading in situations where having the sound up is impractical, and when someone wants to understand the video transcript for deeper comprehension and consideration.

Creating emails that are more accessible to people with disabilities is not only considerate to your current or potential customers, but it’s also just good business practice. You can learn more about best practices in the Web Content Accessibility Guidelines (WCAG). You should also make use of this helpful checklist, and take advantage of this list of evaluation tools to test your emails.

Happy Wright Brothers Day – December 17

Wright Brothers Day

On December 17, 1903, Orville and Wilbur Wright made the first successful flight in a mechanically propelled airplane. To celebrate the accomplishment and commemorate the achievements of the brave brothers, December 17 became Wright Brothers Day by a 1959 Presidential Proclamation. Wright Brothers Day is now honored every year in the United States with festivities and activities.

Wright Brothers Day

A Land of Innovation and Invention

In the nation’s beginnings, the founding fathers had to cross an unfriendly ocean to live in uncharted land. Early settlers made their way across the vast landscape, using their strength and ingenuity to adapt to often harsh conditions.

Over the history of the US, Americans laid track to build railroads to span the nation, while other Americans built the cars that would change the way people live. The Wright Brothers succeeded in their revolutionary flight soon after.

What Was Once Thought Impossible

Before the Wright Brothers launched their flight, most people could not imagine that flight by humans was possible. Earlier efforts to leave the ground were limited, because there was no way to sustain flight or control a contraption in the air. The Wright Brothers knew that they would need to be able to control the wings and nose so that a pilot could navigate while in the air.

While it seems obvious now, their ideas changed the way humans view the world. People felt attached to the earth, trapped in two dimensions. Once people were able to fly, they could see the world from an entirely new perspective. Distances become relative, and the world seems both grander and more interconnected. The boundaries that used to limit people’s activities no longer hold that control over our lives.

Humble but Loving Beginnings

Milton and Susan Wright were the parents of Orville and Wilbur, and they encouraged their sons to learn about whatever they could and to travel to other parts of the world. Mr. Wright was a bishop in the United Brethren Church, and his position caused him to travel a lot for church business. While he was away, he sent many letters and gifts home to his family, exposing them the many fascinating wonders the world has to offer.

Wilbur and Orville started in the printing business and even had their own newspaper for a while. They started their own bicycle business in 1894, making and selling bikes to turn a profit. But their dreams were always bigger.

When Wilbur and Orville started seeing other inventors’ attempts at building flying machines, the brothers figured out where they were going wrong. Their first gliders did not succeed, but the Wright Brothers kept trying until they achieved their dream. The Wright Brothers decided what they wanted to do, and then they realized what other people couldn’t with their own abilities.