The 10 Most Secure & Insecure Airports For WiFi In The United States

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel?

Safe Wifi Airport

Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want to think twice before connecting to the airport’s Wi-Fi.

According to Coronet’s findings, most airport public networks are unencrypted, insecure, or improperly configured. Hackers, therefore, have easy access to devices connected to the networks and they can potentially steal your personal data.

What Can Hackers Take?

Most public connections are either unsecured or require shared passwords. Hackers want to get between you and the websites you visit in order to look at your information. They do this with little effort on public Wi-Fi networks.

A weak network makes it easy for a hacker to gain access credentials to cloud apps, such as Microsoft Office 365, G-Suite, Dropbox, and iCloud. They can send malware to your device and the cloud, as well as breach your various forms of infrastructures. Although it’s not horribly difficult to cancel and replace credit cards and void unauthorized transactions, once passwords and business digital frames are exploited, it’s incredibly challenging to recuperate complete control over them.

How Were These Findings Conducted?

Coronet revealed which airports have the most vulnerable networks. They came up with a ranking system of airports by their threat level. Coronet amassed data from more than 250,000 consumer and corporate endpoints over a 5-month period that went through the 45 busiest US airports. They gave each of the airports a threat index score after assessing the vulnerability of the traveler’s devices who used the airport’s network.

“Far too many U.S. airports have sacrificed the security of their Wi-Fi networks for consumer convenience. As a result, business travelers, in particular, put not just their devices, but their company’s entire digital infrastructure at risk every time they connect to Wi-Fi that is unencrypted, unsecured, or improperly configured. Until such time when airports take responsibility and improve their cybersecurity posture, the accountability is on each individual flyer to be aware of the risks and take the appropriate steps to minimize the danger.” – Dror Liwer, Coronet’s founder and CISO

Top 10 Most Cyber Vulnerable Airports:

  1. Boston Logan International Airport
  2. Detroit Metropolitan Wayne County Airport
  3. Charlotte Douglas International Airport
  4. Phoenix Sky Harbor International Airport
  5. Dallas Love Field
  6. Newark Liberty International Airport
  7. Southwest Florida International Airport
  8. William P. Houston Hobby Airport
  9. John Wayne Airport-Orange County Airport
  10. San Diego International Airport

How Did The Hackers Specifically Get Traveler’s Information?

In its report, Coronet revealed some specific ways in which hackers were able to infiltrate the airport’s network and steal people’s information. In the worst rated airport, the data revealed that hackers in San Diego set up an “Evil Twin” hotspot with the name “#SANfreewifi” at the airport to trick users into connecting to it. This allowed them to have access to all of the files that the victims downloaded or uploaded while they were connected. Similarly, at Houston’s William P. Hobby Airport, which was rated third weakest, hackers created a network named “SouthwestWiFi.”

Top 10 least vulnerable airports:

  1. Chicago-Midway International Airport
  2. Raleigh Durham International Airport
  3. Nashville International Airport
  4. Washington Dulles International Airport
  5. San Antonio International Airport
  6. Louis Armstrong New Orleans International Airport
  7. Kansas City International Airport
  8. Lambert St. Louis International Airport
  9. Miami International Airport
  10. Tampa International Airport

How Do I Prevent Hackers from Attacking Me?

You don’t have to stop using public Wi-Fi for the rest of your life, and it’s not exclusively the airport’s fault. Let’s look at an easy solution to protect you from the majority of hackers.

Make Passwords Stronger

You have the ability to turn on two-factor authentication for all your web services. How this works is when you try to login to a website, the website will text message your phone with a code that you’ll enter into the site in addition to your password.

Even if a hacker has your password, they won’t have your phone — which makes it much harder for them to log in to your account.

Use a VPN

A VPN (virtual private network) is a secure and private solution within the wider internet itself that allows you to send and receive data while maintaining the secrecy of a private network.

If you access your data remotely via a VPN connection when you use public Wi-Fi, it can protect data from interception and networks from compromise.

Stay Vigilant

Most importantly, remember to always be alert and use caution when browsing the internet. In your browser, block cookies and remove tracking. Avoid unsafe or untrusted software recommendations. And lastly, avoid suspicious links in your inbox or on your social media feeds.

August 2018 Microsoft Office 365 (Features/Benefits)

What Are The New Updates On Microsoft Office 365 For August 2018?

As Microsoft continually works on improving the Office 365 experience for its users, the new August 2018 updates include some helpful, fun, and entertaining new experiences for Microsoft Office 365 users. Let’s take a closer look at the new updates.

Microsoft Whiteboard

As of July 12th, Microsoft rolled out their Whiteboard app on Windows 10 that gives users the ability to collectively share their ideas and content.

Some of Whiteboard’s features include the capability to draw, write, add images and create virtual sticky notes.  Team members can use a pen, touchscreen, and/or keyboard to share ideas. And your team doesn’t have to be in the same room. They can work from their own devices and from various places around the world.

As with all other 365 apps, the Whiteboard app sessions are saved routinely to the cloud with an expanding technology that never runs out of space.

The app is a free download at the Microsoft Store after logging into a Microsoft account or Office 365 account.

OneDrive

In July, the OneDrive team announced that they launched a new OneDrive Activity Center that is easier to use. One great newly updated feature is an option for conserving battery life on Windows devices. Now, the OneDrive desktop client will instinctively pause sync when it detects a device switches to “battery saver” mode. If you still want to sync, it will give you the option to “Sync anyway.” If you permit sync to remain paused, OneDrive will auto-resume the sync when it finds that the device is no longer in “battery saver” mode.

My Analytics Nudges

MyAnalytics is a tailored set of metrics that gives you the ability to establish habits that will make better use of your time.  It consistently gives insights into how you are spending your time and offers suggestions to work faster and smarter.

Now Microsoft offers a new feature called MyAnalytics Nudges. This new feature submits responsive, data-driven tips as you use Office 365. For example, when you receive new meeting invitations on your calendar, a MyAnalytics Nudge will give you a reminder to block time for your work before accepting the meeting invitation. You can see the existing time blocks on your calendar and reserve a time for the meeting without leaving your inbox.

The MyAnalytics nudges are currently offered in the preview for customers using both Workplace Analytics and MyAnalytics. As the kinks get worked out, Nudges will be available in phases as the summer progresses to enterprise customers on Outlook.

Kaizala

For those who need to work when they don’t have direct access to a desktop or laptop,

Microsoft Kaizala is a new mobile app that speaks to these needs. Using an iPhone or Android device, you are able to communicate and get work done with Kaizala. It provides tools ready for you when you are out in the field and allows the main office to give you updates, send feedback, and chat.

Power BI

Power BI allows you to easily collaborate with your teammates and partners by announcing report sharing in the Power BI Service. The Power BI team at Microsoft has created an easy way for you to share reports with filters and slicers applied.

Until this new update, you would need to take a screenshot or carefully describe the steps you took to construct the report. Today, you just have to check the “Share with current filters and slicers” box, and everyone will see the report with your filters and slicers applied.

Power BI reports are shared through email that adds a URL to the report. When you email the report, just instruct the recipients to bookmark the URL and the linked report will maintain the filters and slicers to present the report exactly the way you created it.

Live Events

Microsoft is adding live event capabilities to Microsoft Stream, Microsoft Teams, and Yammer.  What this means is that customers will now be able to produce better quality live events. Whether you’re creating a big companywide event, a leader update, or a team talk, you’ll enjoy being able to bring people together in a live event.

Live Events will give you the opportunity to efficiently communicate updates to a small or large group using any device. Using Microsoft Stream to deliver studio-quality events which can be viewed in Microsoft Stream, Microsoft Teams, or Yammer, will cut down on confusion as well.

Also, artificial intelligence (AI), will soon be available in Microsoft Stream, including:

  • Facial recognition software that identifies who is talking
  • Speech-to-text and closed captions to be more inclusive
  • Transcript search and timecodes for quickly finding important parts of a video

Workplace Analytics

Workplace Analytics recognizes collaboration patterns that have an effect on a business’ productivity, effectiveness, and engagement.

These new team-focused dashboards in Workplace Analytics will help a company:

  • Locate relationship challenges such as too many meetings or too much overtime
  • Give teams ideas on how to be more effective through productivity insights and plans of action
  • Measure and track a company’s progress goals over time by analyzing their objectives and their effectiveness at meeting the set goals

Microsoft Office 365 August Update

Wrap Up

Microsoft is still the leader in today’s technology war. They continually create new and exciting ways to save your company and staff time, while improving the user experience. The new updates for August 2018 are no exception. They add some very helpful and fun new tools that make your work life a better experience.

Top 10 Laptops Of 2018

What Are The 10 Top Laptops of 2018?

One does not just walk into a store and purchase the first laptop he sees these days; they’re a pretty big investment! Everyone wants to get all the great features they have in mind with their purchase. Laptops have become somewhat of an extension of who we are. They say a lot about us. Everyone knows the stereotype of the young male Mac Book user.

Top 10 Laptops of 2018

Today’s laptop industry is jam-packed with impressive models, and if you’re of the notion that laptops make the world go ‘round, you’d do well to spend some time on your research before committing to just one. If it sounds like we’re talking about a committed relationship like between two people, we’re not! Your relationship with your laptop is much more important!

Brands like Apple, Dell, and Lenovo are at the top of their game, and with so many other great options to choose from, laptop shoppers certainly have their work cut out for them. We’ve rounded up the best of the year, measuring everything from portability to design and, of course, performance.

Here are our picks for the 10 most worthy laptops of 2018.

Number One: Dell Latitude 7390 2-in-1

Dell’s Latitude models have always given the industry’s top laptops a run for their money. The Latitude 7390 2-in-1 is more of the same, only slightly better with the addition of a few new features, such as Microsoft’s Precision Touchpad. In addition to features like Windows Hello facial recognition, and other security upgrades, a major perk of the new model is its portability. Weighing in at just three pounds, it’s easy to tote around, especially with its 2-in-1 convertibility. It also comes complete with a backlit keyboard with deep keys for comfortable typing.

Number Two: Apple MacBook Pro

Mac users are loyal and with good reason. The Apple MacBook Pro, for instance, is one of the best money can buy, and worth every penny if performance ranks high in your list of must-have qualities for a laptop. The newest version boasts plenty of updates to keep things interesting, including a Touch Bar and capabilities for 32 GB of RAM, a significant bump from the previous max of 16 GB. Inside you’ll find an eighth-gen Intel Core professor for plenty of power and a third-generation butterfly keyboard. All-in-all, the MacBook Pro is a hearty contender for best laptop of the year.

Number Three: LG Gram

LG’s new update to its well-received Gram notebook has a lot of things going for it. There is the portability factor for one, as it packs a mighty punch in a relatively small package, weighing in at just 2.1 pounds. This laptop is also durable, as it’s made from metal alloy, and has met military-grade requirements for drop protection. Inside, you’ll find a hearty 72WHr battery good for a whopping 22.5 hours of usage, plus an Intel Core processor from the eight-gen U series. Other features include a fingerprint reader and multiple ports, including HDMI and microSD.

Number Four: Dell XPS 13

The XPS 13 is Dell’s first full redesign in about three years, and it’s nothing short of awesome. In addition to major improvements on things like power, durability, and portability, this laptop also has style. Stain resistant, UV resistant woven glass fiber adorns the XPS13, and inside you’ll find an Intel eighth-gen Core processor. Included is a high-performing battery good for up to 20 hours of usage. There’s truly not much you won’t be able to do with this by your side.

Number Five: Lenovo Yoga 920 (14)

Lenovo’s Yoga 920 laptop is superior to others in its class for several reasons. The 920 boasts cool features like long-range voice-activated support, an optional pen with pinpoint accuracy, and a brilliant 4K display ideal for entertainment. Incredible responsiveness, Windows Ink, and access to Windows Cortana (the electronic assistant) leaves little room for worry if you’re always on the go.

Number Six: HP EliteBook x360 1030

HP’s third-generation EliteBook x360 1030 is impressive in both design and performance. This notebook was reduced in size for convenience, and it’s loaded with other features that strive for the same. It’s lightweight at 2.76 pounds and comes equipped with a powerful eighth-gen Intel processor, along with 18 hours of battery life. It also offers the option of LTE connectivity so you can get things done even without Wi-Fi.

Number Seven: Asus ZenBook Flip S UX370

The ZenBook Flip S UX370 is not your ordinary 2-in-1 laptop. It’s ultra-thin and lightweight, with powerful components that can tackle most things with ease. Within you’ll find a new Kaby Lake R eighth-gen processor, more than enough RAM and a variety of other features bound to delight users, including a fingerprint magnet. If power is what you want, Asus brought the goods.

Number Eight: Lenovo IdeaPad Miix 520

The 2-in-1 laptop/tablet hybrid is growing in popularity, and IdeaPad’s Miix 520 is one of the best of the bunch. Not only is it affordable, but it’s got power by way of its eighth-generation Core i5 CPU, which is still more powerful than some with Core i7 capabilities. And while its battery life could use some improvement, overall, the IdeaPad Miix 520 is a suitable choice for those seeking a 2-in-1 with major potential.

Number Nine: Huawei MateBook X Pro

Huawei is a lesser known brand in the laptop world, but that doesn’t make the MateBook X Pro any less spectacular. This 13.9-inch model is equipped with an eighth-generation Intel Core i5 – i7, and carries with it an excellent battery life. A rich display and sleek design overall render the MateBook X Pro one of our favorites, and with a moderate price point, it’s within reach for many.

Number Ten: HP EliteBook 1050

The EliteBook 1050 is the first 15-inch in the Elite 1000 series, and it takes complete advantage of its size. Its display can reach up to 650 nits of brightness, and it also comes with an integrated privacy screen. It’s up to par on performance, with Intel’s eighth-generation H series processor, and a capacity for 32 GB of RAM. Its battery life is nothing to scoff at either. The EliteBook is good for 16 hours on a single charge, rounding out the benefits of this notable laptop.

30% Of Physicians Not Happy With Current EMR/EHR

Changing EHR Systems

New Survey Reveals What Drives EHR System Replacement and How Clinics Are Using Existing Systems

Changing EHR Systems

Thinking about replacing your EHR System? 30 percent of physicians surveyed say they’re no longer happy with their old EHR system. What is the #1 complaint? Read on.

In April, Black Book Market Research released the results of a survey they conducted that received responses from nearly 19,000 EHR (electronic health record) users. This was a 6-month client satisfaction survey which provided some fascinating insights into the use and expectations regarding EHR systems and included practices ranging in size from solo to large (15+ clinicians).

Plans to Replace EHR System

One of the most interesting revelations from the survey results was that 30% of practices that have 12 or more clinicians on staff expect to replace their current EHR system by 2021. This is a significant change from previous years, where smaller and solo practices were usually the main ones interested in replacing existing EHR systems because of high levels of dissatisfaction. In previous years, smaller clinics were mainly dissatisfied with the basic features of the EHR they were using.

Drivers Behind Replacement

There were several prominent drivers behind this intention of larger practices to replace their current system, according to Black Book’s report:

  • More available customization and integration
  • Increased functionality
  • Practice management
  • Revenue cycle management
  • ICD10 coding products

The primary driver behind EHR system replacement for most surveyed was a desire for additional customization options. Many physicians feel that their current EHR system doesn’t allow them to modify the system so it better meets their specific needs.

The survey also revealed that, among larger practices, there are three tools that are the most heavily used:

  • Data Repository
  • Order Entry
  • Results Review

No doubt the issues with functionality driving the selection of a replacement system are impacted by the functionality of these three tools in particular.

Highly Sought Features

Among those desiring to replace their current EHR system, Black Book Market Research reported that 93% are also highly interested in cloud-based mobile solutions. Among those solutions, the highest level of interest involved on-demand data that would provide useful insights into the following critical areas: financial performance, compliance tracking, and contractual quality goals. However, two other major features that ranked highly are virtual visit support and telehealth, at 87%, followed by speech recognition tools, at 82%. These numbers indicate that physicians are ready to move forward with the latest technology in order to heighten their abilities to provide a better range of quality services.

Habits of Small Practices

Smaller practices, defined as those with six or fewer clinicians on staff, are not making full use of the features available with their EHR systems. It is primarily more advanced tools that they are neglecting, and these tools include things such as electronic data sharing, secure messaging, clinical decision support, and patient engagement. While their EHR system may come with these features, they are not benefiting from them.

Smaller practices are more focused on basic functionality, and they are more likely to remain loyal to a particular EHR if the system provides the primary tools they need and those tools work well for them. Medium to large practices, on the other hand, look for much more in an EHR system and are currently more likely to be ready to try a new system.

Comparing the Tool Usage of Solo, Medium, and Large Clinics

Larger practices, with 15 or more clinicians on staff, make extensive use of electronic messaging, clinical decision support, and patient engagement tools, with 80% or more of respondents indicating that they use these tools very frequently. Among the medium size practices with 2 to 14 clinicians that participated in the survey, only 28% to 38% used the same tools frequently. Small or solo clinics used these tools even less, instead of using the record sharing tools the most. But even then, only 13% of participants said they used that tool frequently.

Practices of Users

In a related study, Black Book discovered that 91% of patients under 50 years old prefer to make use of digital tools related to managing their healthcare. The use of smartphones and computers is a popular method for them. This could begin to cause problems for smaller practices that are reluctant to make use of some of the advanced features to support digital access to health information. Larger clinics seem to be on track to meet the expectations of this demographic, however, with the priority, they are giving to systems that provide tools for virtual visits and telehealth.

Conclusion

The fact that many larger clinics plan to replace their current EHR system by 2021 is a departure from the norm, where it is usually smaller clinics that are looking for a better system. Larger practices may be ready to embrace artificial intelligence and machine learning in order to provide a better range of healthcare services to their patience. Those planning to replace their EHR system are also seeking cloud-based mobile solutions, along with tools that provide insight into finances, compliance, and contractual quality goals. The larger the clinic, the more likely they are to use tools such as electronic messaging and patient engagement. Finally, larger clinic practices match well with the expectations of patients under 50, who prefer to manage their healthcare via digital tools. This indicates that physicians and patients are realizing a need to utilize innovative solutions to administer better healthcare services.

Amazon vs. Microsoft: Who is Better in the Cloud?

Amazon vs. Microsoft

In a recent Forbes article, former VP of Strategic Communications at SAP, former Chief Communications Officer at Oracle, and current founder and president of Evans Strategic Communications LLC, Bob Evans, weighed in on the cloud wars between Amazon and Microsoft.

Amazon vs. Microsoft

Evans broke down the 10 key elements of Microsoft’s progress and strategy in the words of Microsoft CEO Satya Nadella and CFO Amy Hood taken from their comments during Microsoft’s July 19 earnings call for its fiscal 2018 Q4.

According to Evans: Why Can’t Amazon Match Microsoft In The Cloud?

Azure’s Ability to Scale Correctly on Demand is Added to its Plate

  • According to CFO Amy Hood, Microsoft doubled the number of $10-million-plus Azure agreements and closed a larger-than-expected amount of multimillion-dollar commercial cloud agreements.
  • Beating the company’s expectations, Hood also reported that commercial unearned revenue was $29 billion, up 23%.
  • Fiscal fourth-quarter commercial-cloud revenue rose 53% to $6.9 billion and Azure revenue grew 89%.

Azure’s Potential to Be the Go-to Computer

  • Microsoft CEO, Nadella reports that his prediction of Microsoft’s ability to interweave the cloud and the edge is allowing Microsoft to offer them, “ideal platform for customers’ digital transformations.”
  • In an effort to force Amazon, IBM, and others to catch-up with Microsoft’s advancements, Nadella said they are, “the only hyper-scale cloud that extends to the edge across identity, data, application platform, security, and management.” He added, “We are investing aggressively to build Azure as the world’s computer.”

Azure’s Capacity to Handle Mission-Critical Workloads

  • Nadella reported a continued growth of Microsoft handling Tier 1 workloads for many companies.
  • Citing Microsoft’s IaaS growth, Nadella believes they are going to continue to see businesses using both Azure and Azure stack as they move their workloads to the cloud. He believes businesses will concurrently discover that this is the perfect time to transform their legacy apps and move toward more advanced technology.

Microsoft’s Friendly Path to the Cloud

  • Hood touted Microsoft’s commitment of continuing to focus on creating customer value as a reason why they are still seeing a growth in their on-premises server business.
  • Hood said they persist at making the Microsoft platform a friendly way that their customers can move from on-premise to the cloud.

Microsoft’s Friendly Path to the Cloud Through Microsoft 365

  • Microsoft 365 gives business customers the freedom to take their existing familiarity with Microsoft Office and begin moving into higher-level cloud services.
  • Since Microsoft 365 is a multibillion-dollar business, it has the reach to give their customers a path to the cloud that otherwise might cause them to be apprehensive about approaching it.

Microsoft’s Competitive Advantage

  • Microsoft states that their vision for both centralized cloud computing and edge computing is to keep them together as much as possible. They don’t want to have two separate camps; one for edge computing and another for cloud computing.
  • Nadella said: “…our real competitive advantage and differentiation is, we have one programming model, one identity model, security, management, etc, so those modern developers, as well as IT, can use the computer available from Azure Sphere to Azure.”

Microsoft’s Best-Kept Secret

  • Azure Hybrid Benefit, a licensing model which gives businesses the ability to transfer money already committed to on-premises versions of Windows Server Standard and Datacenter Editions to the Azure cloud is what Nadella calls Microsoft’s “best keep secret.”
  • Nadella said Microsoft has not been good at promoting the Azure Hybrid Benefit, and he anticipates substantial progress to take place with this program in the future.

Microsoft’s Dynamics 365 Aggressive Position

  • Microsoft’s suite of Dynamics 365 SaaS applications has a price advantage and the value advantage for customers in what Microsoft considers to be a profoundly patchy market.
  • Microsoft envisions fully exploiting its place as an enterprise-cloud provider for both large and midsized businesses that can lead its customers through the digital-transformation journey.

Microsoft’s S&P Leverage

  • Microsoft admits that cloud revenue is growing more than CapEx is growing, but CFO Amy Hood said she believes that the rate of CapEx growth will moderate. According to Hood, they are adding regions and seeing a lot of global demand and improving margins.
  • As Microsoft’s margins increase, their ability to continue investing many billions of dollars across their extensive range of enterprise-cloud services will expand as well.

Microsoft’s LinkedIn Acquisition

  • Microsoft’s surprising $26-billion acquisition of LinkedIn has been remarkably successful. With a revenue growth of 37% in the last quarter, that is their “fifth consecutive quarter of revenue acceleration,” said Nadella.
  • Improving LinkedIn’s quality of video feed, messaging, and growth in mobile usage, made LinkedIn the go-to platform to connect business professionals worldwide.

Although Microsoft is not unbeatable, their ability to provide just one source that gives IT cloud providers the capability of designing the best-imagined cloud experience for their customers gives them a leg-up on Amazon and all other competition.  The fact that businesses can use the full suite of well-known Microsoft products in the cloud and combine their own cloud products and services under only one billing arrangement gives them the decisive advantage.

Orlando Healthcare Provider In Hot Water

Third-Party Vendor Breach and Subsequent Delays in Reporting Now Result in Major Problems for an Orlando Healthcare Provider

Orlando Healthcare

A recent breach left the protected health information (PHI) of more than 19,000 patients in Orlando, Florida completely exposed online for two months before it was detected. What is more concerning, however, is why it took the group of clinics involved five months to report the breach to the Department of Health and Human Services, and six months to alert the affected patients.

How the Breach Happened

The Orlando Orthopaedic Center in Florida hired a 3rd party vendor to handle their transcriptions, as do many clinics and health centers. When the vendor was updating their software during December 2017, they made a serious mistake that misconfigured access to one of their databases. That configuration issue left their server open to the public and accessible over the internet. Anyone who desired could access the patient data stored on that server, and they could do so without any authorization needed. It was two months before the mistake was discovered.

Impact of the Breach

This breach left 19,101 patient records seriously exposed, which was not only a major HIPAA violation but a situation that could easily result in identity theft. Once the breach was recognized, investigators discovered that a great deal of information had inadvertently been made publicly available. This included names, insurance details, dates of birth, medical treatments, employers, and, in a limited number of cases, social security numbers. Fortunately, no financial information (debit card numbers, credit card numbers, bank account numbers, or other financial records) were exposed during the breach.

All patients that received treatment from any Orlando Orthopaedic clinic prior to January 2018 would have been affected by the breach. Investigators were not able to determine if anyone had gained access to what should have been PHI, and none of the affected individuals have, as of yet, reported identity theft or misuse of their PHI. However, the investigators were still unable to rule out the possibility of information theft or unauthorized access to patient information.

The aftermath of the Breach

Orlando Orthopaedic did not find out about the breach until February 2018, two months after it occurred. However, it would be almost six months before the affected patients were notified by mail. The clinics involved have yet to provide a reason for the delay in notification.

As a result of the security breach, Orlando Orthopaedic Center employees are receiving cybersecurity training even though they were not directly responsible for the problem. In addition, the affected clinics are taking additional security measures to ensure that PHI stored both on their own servers, as well as accessible through endpoints, are all secured.

The transcription vendor responsible for the breach has offered all the affected patients one year of free credit monitoring and identity theft protection and restoration services. The vendor has also made changes to their security to ensure that information on their servers remains protected from prying eyes.

In addition, all patients involved have been advised to closely monitor their insurance Explanation of Benefits statements, as well as their other accounts for any signs that their PHI is being used fraudulently. In the event that a patient sees unusual activity, they should notify their insurance provider immediately.

Who Is Responsible?

Even if a 3rd party vendor or business partner is responsible for causing the breach, the healthcare provider is still held responsible. In this case, Orlando Orthopaedic is the responsible party even though it was the security of the vendor that was lax, a situation over which they had no direct control. This reinforces the fact that healthcare providers must be thorough in vetting potential vendors.

Concerns about Delays

As already mentioned, it took Orlando Orthopaedic six months to notify their patients of the PHI breach and five months to notify the Department of Health and Human Services Office of Civil Rights (OCR). The OCR should have been notified 60 days after discovery of the breach, according to HIPAA guidelines, not five months. The same deadline applies to notifying patients.

No doubt a fine is to be expected. Presence Health delayed reporting a breach to the affected patients and OCR 40 days past the 60-day deadline. Their fine amounted to $475,000 and was the first case of a HIPAA breach fine for the untimely reporting of a breach of unsecured PHI

Conclusion

Even if the breach of PHI is caused by the carelessness of a business partner (including 3rd party vendors), the healthcare clinic is still the entity held responsible. There is a 60-day deadline for notifying OCR and the affected patients, and failure to meet this deadline will most likely result in a punitive fine. Failure to notify the patients right away can damage the reputation of the healthcare provider. Even offers of credit monitoring and iidentitytheft restoration cannot undo the negative effects of the breach.

August 2018 Ransomware Update

The Newest Forms Of Ransomware & How To Protect Your Business From Them

2018 Ransomware Update

The Situation

Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure requests, and water billing department.

The attackers who deploy SamSam are known for clever, high-yield approaches. This, combined with the City’s lack of preparedness, explains why the infection was so debilitating.

Experts are telling us that SamSam will strike again. Unlike many forms of ransomware that spread via phishing attacks where individuals inadvertently invite the attack, SamSam exploits IT system vulnerabilities and cracks weak passwords. These ransomware attackers have made $1 million in less than six months.

Keeping all your systems patched, storing data in enterprise-based cloud backups, and having a ransomware preparedness plan can offer real protections against SamSam and other ransomware infections.

Unfortunately, ransomware attacks are on the rise, and as hackers use more sophisticated encryption technology, the threat is constantly evolving. According to malware security firm Barkly, a company is hit with a ransomware attack every 40 seconds. They also identified ransomware as the most prevalent form of malware, with “4.3x new ransomware variants in Q1 2017 than in Q1 2016.”

This eBook details how dangerous ransomware is, how it could harm your business, and what you should do to protect your data.

Part 1

What is Ransomware?

Ransomware is a type of malicious software (malware) that blocks access to a computer that infects, locks or takes control of a system and demands a ransom to unlock it. It’s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don’t pay using a form of anonymous online currency such as Bitcoin.

Most forms of ransomware are spread via spam using unsolicited phishing email or an attachment. Phishing attacks use emails disguised to look like they’re from someone you know and are more likely to trust.

Some ransomware-based applications disguise themselves as police or a government agency, claiming that your system is being locked down for security reasons and that a fine or fee is required to reactivate it. Then it typically asks you to click on a link or attachment to perform a routine task such as updating records or account details. If you do this, a worm or malware is downloaded, infects your system and locks it by encrypting your files.

Ransomware, like SamSam, can also infect your IT system using vulnerabilities in your computer’s browser. It does this when you click on a malicious code hidden in online ads or free software.

Ransomware targets small to medium-sized businesses because they are particularly vulnerable due to limited IT resources. They are also more likely to pay the ransom in the hopes that they’ll get access to their data, although the FBI warns that this isn’t necessarily so.

“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cybercriminals to target more organizations, but it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.”

Paying the ransom only guarantees that the malicious actors receive your money, and possibly even banking information. Also, decrypting files does not mean the malware infection itself has been removed.

No one is immune.

  • Temporary or permanent loss of sensitive or proprietary information,
  • Disruption to regular operations,
  • Financial losses to restore systems and files, and
  • Potential harm to your organization’s reputation.

The lack of awareness and cybersecurity training is a leading cause of ransomware.

Part 2

Ransomware Comes in Many Forms.

Ransomware comes in many different forms, but essentially, it’s a type of malware that denies access to your computer devices unless you pay a ransom. The ransomware malware encrypts your data. Once it does this, it can travel throughout your network and encrypt other mapped and unmapped network drives. Because of this, it can bring your organization to a halt.

The ever-evolving nature of these threats makes ransomware very difficult to keep track of. Ransomware-as-a-Service (RaaS) makes it easy for cybercriminals to set up a lucrative hacking scheme. It is provided as a vendor platform on the Dark Web. Unlawful vendors offer hackers and criminals a tool to use to lock down computer files, information or systems and hold them hostage.

Ransom32 is a type of “Ransomware-as-a-Service” that provides any cybercriminal, even those without technical knowledge, the ability to create their own form of ransomware. What makes Ransom32 so dangerous is that it uses JavaScript, and can be used on computers that run Windows, Mac OS X, and Linux.

Over 2,900 types of ransomware have been reported, and they’re growing. Here are just a few:

Bad Rabbit 

Bad Rabbit has infected organizations in Russia and Eastern Europe and is spreading throughout the world. It does this via a fake Adobe Flash update on compromised websites. When the ransomware infects a machine, users are directed to a payment page demanding .05 bitcoin (about $285).

Cerber

This ransomware encrypts your files using AES encryption and demands a ransom of 1.24 bitcoins (worth $500). It communicates via a text-to-speech voice message, a recording, a web page, or a plain text document. There’s no way to decrypt files that are encrypted by Cerber unless you pay the ransom.

Cryptolocker

CryptoLocker infects computers that run Microsoft Windows. Like other forms of ransomware, you must pay the hackers to decrypt and recover your files. CryptoLocker spreads via fake emails (phishing) designed to mimic legitimate businesses.

CryptoWall

This form of ransomware has been around since 2014, but new variants are still circulating, including CryptoBit, CryptoDefense, CryptoWall 2.0, and CryptoWall 3.0. Like CryptoLocker, CryptoWall is distributed by spam or exploit kits.

CryptXXX

CryptXXX used additional capabilities including network-share encryption. This means that even if you can decrypt your files, it can still cause significant downtime by encrypting files on your network shares.

FakeBsod

FakeBsod uses a malicious piece of JavaScript code to lock your web browser. It displays a fake warning message and tells you to go to a particular webpage (that contains the ransomware). The message says to “contact Microsoft technicians” about an “Error 333 Registry Failure of the operating system – Host: Blue screen Error 0x0000000CE.” When you call the phone number, you’ll be asked to pay a fee to fix the problem.

Lockscreen

This form of ransomware isn’t new and has been in use for quite a while. It attacks Android devices. However, now there’s a new version that is more powerful and much more resilient. It used to lock your screen using a hardcoded passcode, but with the right code, you could unlock your device. Today the new version is impossible to reverse-engineer the passcode since it uses pseudorandom passcodes. Because of this, you can’t unlock your device and must pay the ransom.

Locky

If your computers are infected by Locky, it will rename all of your important files and prevent you from opening them. It does this through encryption and using the file extension–locky. Now, only the cybercriminals have the decryption key, and you must purchase it from them to retrieve your files. To do this, you have to go to the Dark Web and pay $400+ in Bitcoin.

NotPetya

This is a strain of Petya and was first seen in 2016. Today, experts believe NotPetya’s sole purpose is to destroy data instead of obtaining a ransom.

Petya

Petya is especially dangerous because it encrypts entire computer systems, and overwrites the master boot record, so you can’t reboot your operating system.

Spider

Spreads via spam emails. It’s hidden in Microsoft Word documents and installs the ransomware on a computer when it’s downloaded. The Word document (typically disguised as a debt-collection notice) executes macros that encrypt your data.

TeslaCrypta

This uses an AES algorithm to encrypt files and is specifically designed to attack Adobe software vulnerabilities. TeslaCrypta installs itself in the Microsoft temp folder.

TorrentLocker

TorrentLocker spreads via spam email campaigns and targets specific geographic regions. It also uses the AES algorithm to encrypt files. It collects email addresses from your address book to spread malware to your business contacts, friends and family members.

WannaCry

WannaCry has hit over 125,000 organizations in over 150 countries. It currently affects Windows machines through a Microsoft exploit known as EternalBlue.

WannaCrypt

This computer attack began locking down data on May 12, 2017. It affects Microsoft Windows Operating systems. WannaCrypt encrypts all the data in on your computer and holds it hostage.

ZCryptor

This form of ransomware uses a worm-like tactic to self-propagate and encrypt files and external drives so that it can attack other computers.

Part 3

How Ransomware Infects Your Computers

Ransomware attacks are increasing, and so are the ransoms to recover your data.

You’ll know when ransomware infects your computer because the hackers display a message telling you how much to pay to unlock your files. These ransoms typically run in the $300-$500 range. But, some businesses are having to pay upwards of $1,000 per computer. If you have 25 computers that are infected, that’s $25,000.

Hackers primarily use the following attack vectors to infect computers:

Phishing Emails

This is the most common scenario. A realistic-looking email is sent to you with a link or attachment that contains the ransomware. Hackers will often send a number of these links or attachments to hide the one with the malware. Once it’s clicked the malicious software loads itself and the ransomware infection spreads throughout your files, locking them until you pay the ransom.

Drive-by-Downloads

If you unknowingly visit a realistic-looking website containing ransomware, it can load itself onto your computer. If you use an old browser, out-of-date software, or third-party applications, you’ll be most vulnerable. A hacker can detect a vulnerability and exploit it. When a software vendor discovers this, they’ll release a patch to repair the issue, but by this time the criminal has already done their dirty work. Examples include unpatched versions of Adobe Flash, a bug in Java or an old web browser, or an unpatched operating system.

Free Software

A lot of us download free versions of software. Some are legitimate, but others contain ransomware. They are especially prominent in broken versions of expensive games, free games, porn content, screensavers or bogus software. By convincing the user that they should download the software, they can get past firewalls and email filters. You might not even know that you’ve done this until the ransomware activates weeks later.

Unpatched Software

According to the U.S. Computer Readiness Team (CERT) using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats, such as ransomware. Microsoft provides a guide to help you keep your software up to date. They recommend that you use feed update functionality to stay informed about new ransomware variants and what you should do to protect your data.

Part 4

What to Do If Your Files Get Encrypted.

Tell your employees to let you know if they experience the following:

  • They can’t open their files, or they get error messages saying a file is corrupted or contains the wrong extension.
  • A window pops up with a ransomware program that they can’t close. This window may contain a message about paying a ransom to unlock files.
  • A message says that a countdown has started for a ransom to decrypt files and that it will increase over time.
  • They see files in all directories with names like “How to decrypt files.txt or decreypt_instructions.html.”

Ransomware isn’t easy to find while it’s at work encrypting your files. So, you might not know that it’s happening until the hacker sends you a message. By this time, the infection has completed its job. The best thing you can do at this point is to contain the virus from spreading throughout your network.

Unplug the infected computer from your network. You may also need to turn off all network access for all your computers until you know the virus is contained. Set your Basic Input Output System (BIOS) time back if the ransomware has started a countdown. This will hopefully give you more time to recover your critical files and try to eliminate the malware. You can access your BIOS time through the BIOS Setup Utility on the computer.

Restore your files from your last backup. This is why it’s important to regularly backup your files to a safe, offsite cloud location. Just make sure your most recent backup wasn’t infected as well. If you use a Disaster Recovery as a Service (DRaaS) solution, you should be able to do this and quickly “spin up” the DR image on your computer. By spinning up the image in a self-contained virtual machine (VM), you can inspect the DR image without exposing it to your entire network.

Alert the FBI. Don’t pay the ransom. This is a mistake because you still may not get your files back and the criminal will continue to extort you for money.

Unfortunately, recovery from ransomware can be difficult as cybercriminals fine-tune their tactics and become more sophisticated.

Part 5

How to Protect Your Data From Ransomware

ood news is that there are best practices you can adopt to protect your business. The Small Business Administration has these 14 recommendations. Your Technology Solutions Provider can help you with these.

  1. Implement an awareness and training program. Because end users are targets, employees should be aware of the threat of ransomware and how it is delivered.
  2. Enable strong spam filters to prevent phishing emails (an attempt to obtain sensitive information electronically) from reaching employees and authenticate inbound email using technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) to prevent email spoofing.
  3. Scan all incoming and outgoing emails to detect threats and filter executable files (used to perform computer functions) from reaching employees.
  4. Configure firewalls to block access to known malicious IP addresses.
  5. Patch operating systems, software, and firmware on devices. Consider using a centralized patch management system.
  6. Set anti-virus and anti-malware programs to conduct regular scans automatically.
  7. Manage the use of privileged accounts based on the principle of least privilege: no employees should be assigned administrative access unless absolutely needed and those with a need for administrator accounts should only use them when necessary.
  8. Configure access controls—including file, directory, and network share permissions— with least privilege in mind. If an employee only needs to read specific files, the employee should not have write access to those files, directories, or shares.
  9. Disable macro scripts (toolbar buttons and keyboard shortcut) from office files transmitted via email. Consider using Office Viewer software to open Microsoft Office files transmitted via email instead of full office suite applications.
  10. Implement Software Restriction Policies (SRP)s or other controls to prevent programs from executing from common ransomware locations, such as temporary folders supporting popular Internet browsers or compression/decompression programs including the AppData/LocalAppData folder.
  11. Consider disabling Remote Desktop Protocol (RDP) if it is not being used.
  12. Use application whitelisting, which only allows systems to execute programs known and permitted by security policies.
  13. Execute operating system environments or specific programs in a virtualized environment.
  14. Categorize data based on organizational value and implement physical and logical separation of networks and data for different organizational units.

In Conclusion

The increased incidence and rapid evolution of ransomware have raised concerns and stakes for both small and large businesses. Of everything we’ve discussed here, the two most important things to do to protect your business is to use a solid enterprise-grade cloud backup solution and to provide professional Cybersecurity Awareness Training for your employees. In both cases, your Technology Solutions Provider is your best friend. They’ll help you fight and prevent ransomware and cybercrime of all kinds. Don’t wait. Contact them today.

What Does End-Of-Life Really Mean? This Important Question — Answered!

End-Of-Life Vs. End-Of-Sale

Computer End of life

The end of a product’s lifecycle can mean trouble for companies that haven’t prepared for the inevitable. If your organization uses certain products on a daily basis, you may find it difficult to keep up with the different dates revolving around these products’ unique life cycles. But failing to do so can have negative consequences for your operations if you’re not careful.

Familiarizing yourself with the life cycle of a product can help you make wise decisions about your hardware needs. “End of Life,” “End of Service Life,” and “End of Sale” are just a few terms you may need to know in order to avoid an issue with coverage later down the line. Read on to learn more about some of the similarities and differences between these common product lifecycle terms.

End Of Life Vs. End Of Sale: What Is The Difference?

“End of Life,” or EOL, means that the vendor of a particular product has determined that the product has reached the end of its life or its “useful lifespan.” For products in the EOL stage, the manufacturer will cease to market the product, and in most cases, will stop selling that particular product altogether. Past this date, it may become difficult to access support for the purchased product. In some cases, though, manufacturers may offer extended support, which can ensure you’re covered in increments for a certain period of time.

EOS or “end of sale,” also known as EOA or “end of availability,” is another important term companies dealing with equipment contracts should know. This refers to the date after which a product is no longer available for purchase through its manufacturer. The impact of this can be significant if you haven’t got a game plan. It’s important to be prepared for if and when the product and subsequent support you need for these products, is no longer available. How heavily would something like this affect your everyday operations?

Luckily, there may be a bit of hope, even if a product has been deemed EOS. While not available through its manufacturer, you may still be able to obtain an EOS product from a third-party vendor.

EOSL, known as “End of Service Life” means that a particular manufacturer will cease to provide technical support for a product after a chosen date. Although you might still be able to access some kind of manufacturer support after this time, it will probably cost more.

The 4 Stages Of Product Life Cycles

A product’s life cycle — its birth to its demise — is divided into 4 stages. From the initial introduction stage to the decline stage of the life cycle, understanding this unique sequence will help you further grasp what to expect from your products and what their life cycles may mean for you and your organization.

Introduction Stage 

The introduction stage of a product’s cycle is often the most costly. Launching a new product can entail strong marketing efforts, which can include research and development stages and consumer testing. Things can become even costlier for products in highly competitive industries.

The Growth Stage

The growth stage is an important one for a product, as the company finally begins to see the fruits of its labor. During the growth stage, sales show strong growth, profit margins increase, as does profit. Here, businesses are able to invest more funds into advertising, allowing the product to achieve maximum potential.

Maturity Stage 

Once a product has reached its maturity stage, it’s well established and it’s now the duty of the manufacturer to not only maintain but to further build upon its success. Investing wisely in marketing efforts during this stage is crucial, as it’s often the most competitive time during a product’s cycle, meaning it’s also a good time to evaluate making improvements to the product as a competitive advantage.

Decline Stage

The decline stage of a product happens when the market for that particular product begins to diminish. This can happen for a variety of different reasons, perhaps due to market saturation or because consumers are making the switch to a different product entirely. It’s also common that a large percentage of the target audience already have the product or that of a competitor. While this stage of a product’s lifecycle is inevitable, not all hope is lost. It can still remain profitable by implementing cheaper production costs or making the switch to more affordable markets.

Why It’s Important

Performing an IT upgrade can be difficult enough. Add in the worry of expiring service contracts and this can take things to a new level. Your maintenance contracts are highly important in making sure things are flowing smoothly. Finding out your manufacturer no longer offers support for one of your most-used products can bring on new levels of stress. Familiarizing yourself with the different aspects of your product service contracts can ensure you’re never without coverage when you need it most.

Another good solution is simply to look around and see whether there are newer products on the market that would provide you with even better features. Often when products are phased out and reach the end of their life, it’s because newer and better products have been released that will do a much better job.

Check Out The 10 Best Tablets of 2018 (Ratings/Reviews)

They are the next best thing to hauling your laptop around to school and on flights, and they’ve become the weapon of choice for parents with fussy toddlers in public spaces. But while tablets have earned their accolades in recent years, that’s not to say choosing one to take home is an easy task. With endless options to select from, it will take some time and research to determine which tablet is best for your unique needs.

Top Tablets 2018

What constitutes a great tablet depends on several factors. Aside from function, things like versatility, user-friendliness, and affordability all play a role in how well a tablet is received by the masses. Versatility carries so much weight, in fact, that many of today’s top tablets come with keyboards to offer an experience similar to that of a desktop. These 2-in-1s are all the rage, and if you’re hoping to pick up a new one, you’ve got your fair share of picks. Here are some of our favorite tablets to help you navigate your options.

Apple iPad

The Apple iPad is one of the most revered tablets to date, and the newest version spares no expense when it comes to cool features. Compatible with the new Apple Pencil, the tablet is easy on the eyes with a 9.7-inch Retina display and a small, but mighty A10 Fusion processor for all the power you could want in a tablet. Plus, Apple now carries plenty of options for immersive AR experiences, and at its most affordable price point yet, you can be sure this tablet is one to covet for business and entertainment alike.

HP Envy x2

HP’s Envy x2 model, hot off the heels of the debut of the Snapdragon 835 processor, allows for stronger performance and a load of other features. Fast-charging capabilities, optional LTE connectivity, and a 15-hour battery life are just a few things users have to look forward to in this tablet. From a digital pen to a sleek backlit keyboard, the Envy x2 is versatile and durable, and definitely not one to be looked over if a solid tablet is on your wish list.

Acer Chromebook Tab 10

Created in collaboration between Acer and Google, the Acer Chromebook Tab 10 is a 9.7-inch slate tablet perfectly fitting of its target K-12 education market. The first tablet to be powered by Chrome OS, it features a 2,048 x 1,536 resolution display, and a textured design for easy handling on-the-go. It also comes complete with an EMR stylus, which fits conveniently in its own slot. This tablet was definitely built for convenience.

Samsung Galaxy Tab S3

With a 2048 x 1536 resolution AMOLED display, the Samsung Galaxy Tab S3 is primed for immersive entertainment. Inside you’ll find a powerful quad-core Snapdragon 820 CPU and a sufficient 4GB of RAM. Its 600mAh battery is good for up to 12 hours of power, whether you’re hoping for gaming or Netflixing. It also comes with a bundle featuring the new S-Pen, which is ideal for creatives hoping to use this tablet for work. All in all, between its power and its potential, the Galaxy Tab S3 is among the best money can buy.

HP Chromebook x2

The HP Chromebook is heavy on both looks and performance. This 12.3-inch tablet is touted as the first detachable Chromebook and comes complete with a base hinge for keyboard attachment. It runs on Google’s Chrome OS and can download apps from Google’s Play Store. Aside from an impressive QHD display, it offers both front and rear facing cameras and includes the new HP Active Pen to make tasks like sketching that much easier.

Dell Latitude 5290 2-in-1

This 2-in-1 is pricey, to be sure, but that’s not to say it isn’t worth the money if power is what you’re after. Weighing in at just 2.64 pounds, the tablet boasts an eighth-gen Intel Core i7 processor and a crisp, clear screen ideal for work or play. Gorilla Glass 4 for durability and an adjustable kickstand are just a couple of the perks you’ll find on this hybrid, and that’s not all. There is also an optional keyboard to make typing a breeze.

Lenovo Miix 630

The Lenovo Miix 630 has a unique advantage over its competitors. It can stay connected all day via LTE, which is enabled by a Qualcomm Snapdragon 835 processor. It’s a fresh option for Windows devices, courtesy of a partnership between Qualcomm and Microsoft. And with this Snapdragon processor also comes an extended battery life, upwards of 20 hours. So if you happen to be looking for a tablet to replace your laptop for business, the Lenovo Miix 630 is a suitable option, indeed.

Surface Pro 4

Equal parts tablet and laptop, the Surface Pro 4 gets right a lot of what the original Surface Pro got wrong. Its 12.3-inch screen offers more than enough space for clear, crisp pictures, and its configuration capabilities are nothing to scoff at. From its dual cameras to its loudspeakers and extraordinary picture quality, the Surface Pro 4 is the best of both worlds.

Xplore XBOOK L10

One thing’s for sure: durability isn’t an issue with the Xplore XBOOK L10. Waterproof, dustproof, and drop proof for up to six feet, this tablet is one with plenty going on. It’s got a plethora of ports, including USB-C, USB-A, and Ethernet, with its powerful performance courtesy of an eighth-gen Intel Core i5/i7 processor. And with an ultra-bright display, there isn’t much this tablet can’t do.

Google Pixel C

The Google Pixel C, which many call a solid alternative to the Apple iPad, has a unique design that sees its optional Bluetooth keyboard double as the tablet’s cover. Its made from durable compact aluminum, and boasts a lightning fast performance plus a bold, bright screen bound to make your favorite games that much more enjoyable. If Android is what you’re after, this is simply one of the best.

How Can I Keep Data Breaches From Hurting Me And My Business?

Algonquin College of Applied Arts and TechnologyAn all too common occurrence that takes place in many businesses, organizations, and institutions is the data breach. This is where hackers infiltrate your database and steal all types of information including that of your clients. Just this past month, Algonquin College, located in the National Capital region, released a statement informing the public about a data breach that affected a large number of people and exposed more than 111,000 records.

With the alarming trend of various organizations exposing their customer’s data online due to vulnerabilities, what can you do to keep this from happening to you? More importantly, how can you keep your clients’ and employees’ personal and private records safe? Let’s take a look at what you can do to keep your data secure.

5 Ways To Protect Your Business From A Data Breach

 Keep Business and Individual Accounts Separate

First of all, begin with yourself. It’s important to create separate emails for your business, your personal, and your financial accounts. If someone hacks your personal email and password from a personal site, they should not be able to gain access to your business or banking/credit/PayPal sites. Guard what you allow to be uploaded or attached to your computers, and encrypt as often as you can. Having numerous passwords or passcodes can be confusing and troublesome, but consider the alternative. Having to undo and sort out what has been stolen in a data breach will be more confusing and costly in the long run. There are sites such as Lastpass.com that keep track of your passwords and preserve your information so it’s private and secure.

Create a Culture of Awareness

So often, employees are not well trained to protect against a breach. At the same time, companies do not have a protocol to secure their data. While, some things can be automated like encrypting email, there needs to be a heightened sense of resolve to keep the data safe by establishing the proper procedures and training for your employees.

Communicating with your employees and clients that there is a new attitude in how you think and operate is essential in ensuring they understand the need for a heightened awareness. Most successful hacks use social engineering through email messages and other social passageways.

Create an atmosphere where employees and clients are paying attention to their email inboxes and the links they are asked to click on. This is a fundamental method of fending off cyber-attacks. Because hackers are creative and inventive, informing your group of new tactics that hackers are implementing will keep your crew on their toes.

Teach your people to strengthen their passwords. This one step alone is worth its weight in gold. Many of your employees are no doubt using easy-to-decipher passwords like “abcdefgh” or “password123”. These will not take long for hackers to crack. Require two-step identification and keep a good antivirus program running at all times. Do your part to make sure your work environment is a fortress ready for an attack.

No boss likes to come across as heavy-handed, but limiting employee access to websites outside the scope of their daily duties will go a long way to ensuring your data is safe. An educated workforce is your best defense against cyber-attacks.

Establish Preventive Data Authorizations

As mentioned before, most data breaches are not complex attacks through unidentified backdoors. Most breaches are due to an employee clicking on a bad link in an email or attachment. Businesses should constantly confirm that employees only have access to the information necessary to do their jobs. Restricting data permissions will help ensure that these types of breaches do not occur.

The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to break into the network and gain access to your important data. These preventive layers can sometimes slow down an employee from completing a task or lead to a frustrating work environment. That is why much thought and planning must be given to establishing strong preventive layers in order to keep data safe.

Hire a Cybersecurity Expert

Experts cost money. Bringing one in to educate both yourself and your team may seem expensive until you consider the cost of a data breach. A data breach these days can easily cost a million dollars to mitigate.  Cybersecurity experts can help educate you and your employees on the latest trends in malware and ransomware. It’s so important for you and your team to understand how data breaches occur. Security awareness is key to keeping your data safe.

Follow the FINRA Checklist

The Financial Industry Regulatory Authority (FINRA) has a checklist on cybersecurity you can download for free on its website. Every company should take a thorough look at their security measures and use the FINRA checklist as a definitive guide. The checklist will prepare you to identify cybersecurity threats, protect your data from cyber-attacks, plan for a response if a compromise arises, and implement a plan to recover lost or stolen data.

It’s US-based, but it is a good start, even for Canadian companies.

Conclusion

Each day, hackers find new ways to get past your best cybersecurity programs so they can steal your database. Though it can seem like a constant war to maintain control, the alternative is not pretty. Data breaches diminish your company’s reputation and hurt your ability to compete in the marketplace. Train employees well and regularly. Take advantage of the latest security protocols to protect what’s yours. You can’t let your guard down for even a moment these days.