What Can Companies Do To Prevent Privacy Violations?

Privacy Violations

Whether it’s physical, virtual, or in the cloud, discovering and blocking sophisticated threats in the network is at the forefront of every company’s mind. However, businesses are finding that more and more data violations are taking place when network security centers on the edge of the network are not giving equal protection to the network itself.

Privacy Violations

Security at the perimeter of the network has received most of the attention from data protection companies. What many internet service providers and businesses have neglected is protecting what lies within the network. Once attackers get into the network, they normally have free reign to steal valuable data and go undetected. What can your company do to solidify your network and protect you from hackers on the inside?

5 Ways to Prevent Privacy Violations

Prevent Data Theft with Patches

If a company’s IT department is inattentive when it comes to the application of patches, security vulnerabilities and other bugs can easily creep into a network. A patch is simply a set of changes to a computer program and its data that are created to update or fix a liability or get rid of a virus threat. Rapidly growing networks today are comprised of a wide range of networks, including the IoT and the cloud. Keeping track of the equipment inventory and the maintenance of this vast network can be a daily trial. For a company to protect its technology, applying patches is no longer an option but a necessity.

Protecting a Network with NIDS

With cloud computing as a way of life, cloud computing security is a mandatory requirement.

Network-based Intrusion Detection System (NIDS) is one of the solutions for enhancing the security aspect of cloud computing services. NIDS discovers and monitors attacks within the network. NIDS is a signature-based technique with an identification data packet throughout the network.

For the majority of companies, privacy violations are caused by attacks that have been detected for a while. Because these vulnerabilities are well-known and have already been patched, attacks can be identified through security holes in the signature. Incorporating signature-based discovery tools, businesses can seek out a breach and put a stop to it quickly.

Using Behavior-Based Analysis

Zero-day attacks to a network occur within a time frame, known as the vulnerability window. They are vulnerabilities that have not yet patched the software containing the weakness. Hackers can engineer malware that exploits compromised systems and steals valuable data. New high-level attacks are operating various techniques to evade protective measures and attack the network connections without even being noticed.

Behavior-based computer security tools can be designed to discover false or unanticipated traffic. They can destroy zero-day malware variants with what is called detonation chambers or sandboxing and link the data to defend against smart attacks. Behavior-based computer security tools allow data and applications to be scanned for malware across the network and thoroughly inspected. They look for patterns and then constantly monitor the traffic to determine the intent, preempting an attack before it starts.

Installing Web Application Firewalls 

Although many attacks are caused by phishing emails or known, unpatched vulnerabilities, web-based attacks are becoming more the norm.  Software that probes and calculates information directly in the data center is commonly targeted.

A web application firewall (WAF) is a filter that is designed to go before you and sift through incoming traffic detecting potential threats and malicious activity. It is one of the most common means of protecting against attacks at the application layer.

In a June 2017 survey of the top 1 million websites, Mozilla reported that an unbelievable 93.45% earned an F score at implementing basic measures to protect them from common attack methods. Companies that fail to accept and adopt application security methods are opening themselves up for constant threats and attacks.

Incorporating Network Segmentation

The modern network needs to be able to handle access through varying devices and an assortment of application and data flows. Businesses can markedly improve their network safety by installing Internal Segmentation Firewalls (ISFW). Network segmentation works by splitting a computer network into subnetworks. If the defense perimeter is breached, an access point penetrated, or if there is an attack from inside the network, ISFW prevents the spread of such threats. ISFWs can be used to protect specific servers that hold a company’s most valuable information and can also protect devices from users and web apps in the cloud.

Conclusion

Managing cyber-risk is a multi-faceted company-wide endeavor that requires implementation from the top level down. The quicker you are able to respond to a threat, the greater the chance you have of being able to stop the potential damage. However, with the implementation of these new tools and strategies, you can protect your company records from hackers. It does take a proactive approach and a watchful eye.

How Do I Find the Right IT Managed Services Provider?

IT Services Provider

Identifying the Right IT Services Provider for Your Business

IT Services Provider

IT service providers, also called managed services providers (MSPs), are in the business of managing a company’s IT needs.  IT service providers can offer their services both remotely and on-site. They normally render their services by one of two ways:

  • On an output-basis model
  • On a fixed-price subscription model

Pricing Model Breakdown

IT service providers often offer pricing models that are broken down per-device, per-service, per-user, and an all-inclusive subscription model. Since managed service providers charge for their services using several pricing models, it’s wise to evaluate what the essential needs of your business are in order to get the best bang for your buck.

The Balancing Act of Business Growth and IT Support

As your business starts to take off, your IT support will need to increase as well. Navigating both where your business is headed and how to manage that growth with proper IT support can be a delicate balancing act. So often, business owners tend to focus on growing their business rather than on their IT support, leaving their company open for easy attacks from online predators.

What exactly do businesses need to look for in a managed IT services provider?

Ability

The first thing to look for is an IT support provider that has a proven track record of hiring and employing properly trained employees that are well versed in both IT and the company’s vision.  Look for company reviews with remarks stating that their staff is furnished with the right skills and experience to successfully execute all the expected IT tasks.

Another important item to look for is their certifications from top IT trade organizations, such as the Computing Technology Industry Association (CompTIA) or Microsoft Certified. These credentials are proof that the IT company takes training their team seriously.

Quality Customer Service

Another important factor to look for when finding the right IT provider is how quickly and effectively they respond to your company’s needs. Normally you can find this out by asking about their help desk software and ticketing system. A capable ticketing system that has a history of correctly prioritizing IT glitches is necessary for a fluid IT support team. The better the provider’s help desk and ticketing system, the more efficient the managed services provider will be. They should demonstrate a good system of keeping track of all their tasks and assignments. That way, your IT issues won’t get lost in a heap of paperwork lying on someone’s desk.

Budget Planning Value for Your Company

Too often the majority of a businesses’ IT budget goes to unexpected expenses. This puts a strain on making crucial planned improvements. You can’t purchase new computers or software when you need it. Your employees aren’t productive and there’s a higher rate of frustration in the workplace. Fortunately, a good managed IT service provider will offer managed services at a fixed rate to ensure your business runs efficiently and affordably.

By customizing the services that you get, you can focus on specific services that fit your company’s needs, such as:

  • Cybersecurity
  • Daily backups
  • Disaster Recovery Planning

On-Call IT Support

A necessary service for most companies is fast IT support. You never know when servers or computers might break down. Who can you call for any problem? Will they get there right away?

When combing through a company’s review section, look for their quick response rates and their on-site support. A good IT provider will be adept at hiring experts in their respective fields that they can turn to when you have a problem.

Much of the time, managed service companies can remotely diagnose and repair common errors. However, some issues cannot be resolved remotely and need to be handled on-site. Look for a company that has a reputation for being there when you need help. They should work to establish and nurture a good business relationship with you by responding quickly to your IT needs.

Cloud Integration Services

With the emergence of cloud technology, protecting your company’s data is essential. Just about every business now relies on data acquired through different means. Today, almost every IT provider offers data backups as part of their service.  They normally offer different pricing options based upon the frequency of backups and the incorporation of other cloud-based services.

Just like disaster recovery planning, routine backups provide insurance against all types of disasters. It simply makes sense to back up your data frequently to avoid any type of threat to your company’s files.

Monitoring Cybersecurity

Cyberattacks are becoming more prevalent and causing major disruption and damage to even the strongest of companies. Hackers can easily breach outdated software after determining the unpatched software’s security flaws. Look for an IT services provider that has a proven track record of not only monitoring a company’s cybersecurity, but regularly testing it as well.  A good IT services company will keep all software updated and secure.

IT consulting companies manage large data centers and put multiple layers of protection in place, but companies can still be breached by hackers. All it takes is one careless employee who clicks on the wrong email attachment. Employee training is a must these days. And it usually works better if you can provide quarterly training for employees. They do get busy and forget and this can result in disaster.

Summary

Keeping up with the ever-changing world of information technology means exploring new solutions as they become available to your business. When searching for the right IT services provider for your business, look at their years of experience. Check the type of industries they have worked with. Read over their client’s testimonials and reviews. When setting up a meeting with the IT company, make sure to have a summary of your business needs on hand. Come armed with a thorough list of questions for the IT consultants. With in-depth research, you will be able to determine the right IT managed services provider for your business.

7 Things to Look for in an IT Company for Your Dental Practice

Dental IT Services

More and more dental practices are outsourcing their IT needs, and are reaping the benefits of such a choice. By using a vendor, you are able to maintain better control of your IT budget, you can leave the headaches and complexity of IT technology to the experts, and you can save on office space (which is often at a premium), as well as hardware costs. However, it can be tricky to find the right provider for your dental practice, so here are seven things to look for when outsourcing your IT services.

Dental IT Services

They Take Security and Privacy Very Seriously

Dental offices are not immune to hacking and data theft. In fact, personal health information is a very desirable target for hackers. A solid IT provider will make sure that your system has up-to-date security software and tools to protect that data. This can include firewalls, encryption, anti-virus, web filters, and anti-malware software. It also entails keeping security software and tools up-to-date and patched.

No dental practice can afford to have a hacker prowling around in their patient’s data. In fact, ransomware crimes are escalating in the healthcare sector. Imagine logging into your network only to find that hackers have seized all your patient records and are holding them for ransom. Either you pay or you could lose everything. Consumers are not very forgiving when they hear that a favorite store or medical practice has been hacked.

An often-neglected aspect of security is not only making sure your data is backed up, but can be quickly recovered if an issue should arise. A good IT provider should offer a system that allows you to seamlessly continue normal operations while repairs are being performed. You can’t afford to lose access to patient files, billing information, and scheduling. Any good IT services provider should rank your network security as a number one priority.

Support HIPAA Compliance

The importance of HIPAA compliance cannot be overestimated, and you need an IT provider that is not only well-versed in the rules and regulations involved, but is as dedicated as you are to preserving the privacy of your patient’s information. A good dental IT vendor will be committed to securing your patient’s sensitive information and will offer tools and features to help support HIPAA compliance.

They Understand the Practice Management Software You Use

Dental practices have IT needs that are far different from other types of healthcare practices. It’s important to find an IT provider that is experienced not just with dental practices but with the particular type of practice management software you use. It is vital that they efficiently integrate the IT services they provide with things like patient clinical charting, radiographs, and digital x-rays. To do this well, they must be familiar with the type of software you use.

They Focus on Your Needs

A good dental IT provider will be focused on the specific needs of your practice. Before anything is implemented, you should expect your IT provider to perform a thorough review of your technology requirements. And when outsourcing your IT, make sure they understand not just the ins and outs of IT, but the special challenges involved with a dental practice. This way they can integrate the most important components of your dental practice with an effective, reliable IT system. This will ensure better productivity for your staff.

They Support Cloud Services

Another key feature to be considered when shopping for an IT provider is cloud services. Cloud services can save on the cost of (and space required for) server hardware. The cloud makes backup and disaster recovery easier and more robust. If you choose to go with a paperless office, then cloud services are your best answer. In fact, cloud services can make HIPAA compliance easier as well. There are a lot more great reasons to choose the cloud and your IT services consultant should be able to spell these out for you.

They Can Help You Scale

As your practice grows, your IT needs are going to expand. Make sure that any IT services company you are considering can help you easily scale up your IT resources both in terms of hardware and software. Whether it’s setting up additional storage for your practice’s file system or installing an upgrade of your practice management system, they should be able to fully support your needs not just now, but in the future.

They Are Strong on Support

Having the most state-of-the-art, robust IT system does your employees little good if there is poor customer support. Check into what types of remote support any potential IT providers offer. Let’s face it: when the IT network goes down, it limits access to critical files and you need that access restored ASAP. Imagine the chaos that can quickly result when your staff can no longer pull up a patient’s chart or schedule appointments.

Another aspect of support is onboarding, where the IT vendor provides you and your employees with training. Good training for your employees is vital. They may need extra help in dealing with the bugs that seem to go along with new software installations.

Conclusion

If you are planning to outsource the IT needs of your dental practice, keep in mind key factors like security, HIPAA compliance, scalability, and support. Also, don’t forget to make sure they are familiar with the practice management software you use, as well as dental office needs in general. Finding a suitable IT services provider can be challenging, but you’ll be glad you made the switch to outsourcing if you take the time to find the right IT provider for your dental practice.

Major Advance in EHR Interoperability Poised to Take Place This Summer

Electronic Health Records

EHR interoperability – considered by some to be the “holy grail” of electronic health record systems – may be a little closer than you think. This summer, a new architectural innovation will be implemented that is guaranteed to positively impact the way different EHR systems exchange information with each other.

Electronic Health Recordso

Interoperability

In the context of electronic health records (EHR), Interoperability refers to the ability of healthcare providers using two different EHR systems to be able to exchange patient information. A combination of standards and architecture are required in order to achieve this type of data exchange between different (and often competing) systems, and past attempts have been hampered by a wide variety of issues and concerns. However, things are about to take a dramatic turn through the work of two powerful influences in modern EHR development.

Who Is Involved

The major players in this undertaking are CommonWell Health Alliance and Carequality. Carequality works under the Sequoia Project and provides the necessary framework needed for successful data sharing among EHR systems.

CommonWell Health Alliance, on the other hand, is a network or trade association of EHR vendors. CommonWell’s goal is to make interoperability among EHR vendors a reality. Any medical facilities or doctors who use a major EHR vendor will benefit from this collaboration.

Major Accomplishment in Interoperability

CommonWell and Carequality are preparing to go live with a health information exchange that will allow doctors to share Continuity of Care Documents. This breakthrough in interoperability includes all major EHR vendors as well as the hospitals and clinics that subscribe to them. A doctor in one hospital that subscribes to a major EHR vendor will be able to exchange patient data with any other doctor that also subscribes to a different EHR vendor.

The collaboration between Carequality and CommonWell actually began back in 2016. As a result of this collaboration, Carequality created their own version of CommonWell’s record locator service. This will allow Carequality members to search patients in CommonWell’s network. CommonWell, in turn, implemented Carequality rules, which is making it possible for network members to easily query each other. This phase of interoperability is due to go live this summer, barring any unforeseen delays.

What This Will Mean for Healthcare

Once the current information exchange goes live, an estimated 80% of doctors will be able to share their patient data – even among EHRs that are fierce competitors. For those in the medical field, the ability to share patient information across EHR systems – especially as the interoperability continues to evolve and expand – will support more informed decisions about patient care. Decisions can be made more quickly and providers will have far easier access to critical patient data. This will reduce ambiguity that can adversely affect patient care and recovery. It also enables better and more efficient workflows, and no doubt will have a positive effect on patient satisfaction as patients will receive better quality care.

Current Limitations

The dream is, of course, for a physician to quickly and easily track down tiny details of a patient’s information (e.g., medication allergies). The technology and software have not progressed to that point quite yet. At this stage, physicians using major EHR systems will be able to search for and access Continuity of Care Documentation, which is basically a data dump of information about a patient.

Challenges and Concerns

It is natural that some resistance to cooperation would be present from vendors because it does not seem like good business to facilitate a client’s ability to connect with services from your competitor. Some physicians may have concerns about making it too easy for a patient to seamlessly transfer all their medical records to a different doctor. Another issue that causes difficulty for vendors is that they have clients over a continuum of sizes, from small, one-physician clinics to massive hospitals. Trying to ensure interoperability between clients at opposite ends of the spectrum may be problematic as the architecture progresses further.

Another critical challenge is one that can only be overcome by forging forward: bugs and unforeseen technical issues that arise. These can only be found and dealt with after the interoperability architecture goes live this summer, and actual users begin to interface with it in a clinical setting.

Conclusion

The ultimate goal, according to CommonWell and Carequality, is for a patient’s healthcare information to follow them wherever they go, regardless of what EHR vendor the medical facility uses.  This, in turn, means that healthcare information is no longer bound by geographical boundaries. However, this dream cannot become a reality without a robust framework of standards, which is already being successfully developed through the hard work of Carequality. The process will require collaboration among sometimes competing EHR providers, which is already taking place thanks to the CommonWell network community and positive cooperation among vendors.

What is a Blockchain? Can It Create New Business Opportunities?

blockchain

What’s A Blockchain?

A “blockchain” is basically a financial record similar to that of a spreadsheet, only for bitcoins and other forms of cryptocurrency available publicly and online. As the use of cryptocurrencies has evolved, it has created some innovative business opportunities. According to MIT Technology Review, the transparency and trust created through them have increasingly facilitated trade across the world in a number of ways.

blockchain

First of all, they are publicly available, and access to the records is superior to that of public access to annual company reports. Many organizations do not produce annual reports out of a lack of obligation. The extent of transparency and detail in blockchain records generally exceeds those provided through annual reporting methods. This can allow investors to have more insight into trends and opportunities for investment, trade, and other forms of business growth.

The Rise of Bitcoin and Other Cryptocurrency

Bitcoins are the most common form of cryptocurrency recorded in these newer and more unique forms of financial transactions. They were initially used in 2009 with some trepidation, but have become so popular that, today, you’ll find hundreds of different forms of digital currency, now generally referred to as cryptocurrency.

Soon after the bitcoin was introduced, people began developing cryptography tools for public use, including the blockchain. Cryptocurrency was considered valuable because it provided a global means of completing financial transactions. Due to the complex nature of the bitcoin, it is nearly impossible for individuals or organizations to spend the same bitcoin currency twice.

This successfully addressed the previous challenges with digital currencies and effectively removed the demand to establish and maintain a central authority to mediate such electronic exchanges. Cryptocurrency transactions can be difficult or impossible to trace. That’s why they’re most often used by hackers when requesting ransomware payments from their victims.

Approximately two years after introduction, bitcoins grew from novelty to the preferred payment method in online commerce. “Altcoins,” a comparable cryptocurrency, were developed after bitcoin as an alternative form of digital currency but used the same open-source code for bitcoin. There were some slight differences between the two.

At this time, approximately $1 billion dollars’ worth of bitcoins and other cryptocurrencies are in circulation. Developers realized that blockchains could be more useful to other areas of common business operations as well. Normal steps in the development and use of a blockchain include the establishment or creation of a business transaction. This most often involves the sending of a form of cryptocurrency in exchange for a product or service. They’re also used for all types of investment and financial transfers.

The placement of a line of code representing the transaction as a ‘smart contract’ is initiated when specific conditions are met within the program. The sending of a broadcast to an access network on nodes and the ongoing listing of node subsets are referred to as ‘blocks’ within a ‘chain.’

More on the steps in the creation of blockchains and their history is available through MIT Technology Review.

What Other Uses Does It Have Currently?

With the fundamental added advantages of business transparency and prediction potential, blockchains have created exciting new business opportunities. According to Ignite, as their popularity has grown, they have affected a range of indirectly related aspects of business ranging from the manners by which banks transfer money to how medical records are handled.

Also referred to as ‘shared ledger technology,’ the transparency and trend perception is expected to become commonplace for the majority of business transactions. With over half of businesses now using them, increased opportunities for investors and small businesses, in general, are expected to escalate for an overall positive economic impact.

The use of cryptocurrency increases competition, diversification of products and services, and increased trade opportunities around the globe.

An example of improved business opportunities on a larger scale is the case of the New York City Depository Trust and Clearing Corporation, which began to use blockchain to more successfully facilitate their transactions. Experts attribute this to the success of $11 trillion dollars’ worth of transactions funneled through cryptocurrency technology.

More specific business uses include their infiltration into the banking system, once hesitant to use this form of digital currency. Cryptocurrency was originally thought to be unstable, as it was not backed by gold or other tangible assets. But today, many financial institutions have accepted the use of digital currency due to the increased speed and safety in making financial settlements.

Additionally, other organizations can increase efficiency by using the smart contract in the automatization of their agreements, with high potential for increased speed especially applicable to supply chain management and manufacturing. In addition to transparency, there is increased accountability, helping organizations to experience increased security over previous forms of common practice in transactions and records. This is why, as introduced above, the technology is even beneficial to the healthcare industry and medical records. More on how these areas, communications technologies, and other industrial developments can benefit from blockchain is available at Ignite.

According to The Economist, blockchain and smart contracts have even benefitted the way companies pay employees, the nature of cloud storage, and electronic voting. It seems increasing use and development continues to give rise to further opportunities, as organizations realize the potential benefits of using cryptocurrency and block chains over traditional financial transactions.

Can You Use Blockchain?

If you have the resources and other means required for conversion, your organization could benefit from blockchain if you are seeking increased security or efficiency in:

  • Banking transactions
  • Medical records
  • Manufacturing or inventory records
  • Communications records
  • Employee payments
  • Electronic voting
  • Cloud storage records

Even if your organization does not have a strong emphasis in any of these areas, the increased transparency and universal appeal of cryptocurrencies may be sufficient to warrant gradual integration.

The Critical Aspects of Mandatory Data Breach Notification That You Need to Know About

Data Breach Notification

As of 22 February 2018, the Notifiable Data Breach (NDB) scheme went into effect and included in its requirements is a mandatory data breach notification.  Failure to correctly notify those affected by an eligible data breach can result in fines of up to $2.1 million, besides potential compensation for affected individuals.  There are certain things that every Australian organisation needs to be aware of when it comes to mandatory breach notification.

Data Breach Notification

To Whom Does It Apply?

The NDB scheme applies to organisations and agencies that have personal security information obligations under the Australian Privacy Act 1988.  Such organisations and agencies include businesses, health service providers, credit reporting agencies, Australian government agencies, TFN recipients, and not-for-profits with an annual turnover of $3 million or more.

If an organisation …

  • Collects personal information,
  • Receives personal information on behalf of clients,
  • Processes personal information on behalf of clients,
  • Or holds personal information

Then they can be impacted by the NDB scheme.

If a breach occurs, the organisation and everyone involved in the chain can be affected, including marketers, data providers, brands, agencies, and similar partners.  In addition, if an organisation has clients, those clients may impose notification requirements to make sure they are in compliance with their own NDB obligations.

What Is an Eligible Data Breach?

Data breaches refer to unauthorised access of, the disclosure of, or loss of an individual’s information. If a data breach involves an individual’s personal information and this breach is likely to result in serious harm to said individual, then that breach must to be reported. This type of data breach is referred to as an eligible data breach.  Note that there are, however, some exceptions to the notification obligations.

What Constitutes Serious Harm?

While no hard and fast definition of “serious harm” has been provided, it is reasonable to assume that any type of harm – be it physical, psychological, or financial – would likely fall under the category of serious.  This is especially true of information of a sensitive nature or involving an individual’s health.  For example, loss of information involving medical allergies could result in life-threatening circumstances for an individual in a serious accident, or unauthorised access to financial information could result in identity theft and financial loss.

What Should Be Done When a Data Breach Is Suspected?

If a data breach is suspected, there are four key steps to be followed: contain, assess, notify, and review.  Of course, as soon as a data breach is suspected it should be contained to prevent any additional compromise of information.  Next, it should be thoroughly assessed by determining who was affected and what data was compromised, followed by risk assessment and, if possible, remediation.  The third step is notification. The final step is a review of the incident and developing a plan of action to prevent a similar breach from occurring again.

Who Needs to be Notified?

According to the Office of the Australian Information Commissioner,

“The NDB scheme introduced an obligation to notify individuals whose personal information is involved in a data breach that is likely to result in serious harm.”

In addition, the Australian Information Commissioner must also be notified of the breach, and this information can be submitted via an online form.

When Must Notification Take Place?

Notification must take place as soon as the organisation can determine what information was compromised and who was affected.

What Information Must Needs to be Included?

The following information must be included as part of the notification:

  • The identity and contact information for the organisation
  • A description of the data breach that took place
  • The type of information that was involved in the breach
  • Recommendations as to what steps the affected individual should take as a result of the breach

In terms of notifying individuals, there are two basic options available as to how the notification should take place: either notify all individuals or notify only the individuals who are at risk of serious harm.

If it is not practicable to notify individuals, then a statement about the breach can be published on the organisation’s website and then publicised.

What Happens When an Organisation Fails to Notify?

If an organisation fails to notify the affected individuals and the Australian Information commissioner of an eligible breach, fines of up to $2.1 million are possible.  However, there is also the possibility of compensation for affected individuals if there is a privacy compliance failure.  Compensation averages between $10,000 and $15,000 per individual if their complaint is successful.

Conclusion

Mandatory data breach notification is a critical part of the Notifiable Data Breach scheme, and failure to comply with notification requirements can result in hefty fines and compensation for those affected.  If you are an organisation in Australia that deals with any type of personal information, then you need to know what your responsibilities are and how to respond should an eligible data breach occur under your watch.

Centers for Medicare and Medicaid Services (CMS) Propose Reducing Submission Requirements for Health IT Security Under MIPS

Medical insurance

As providers are all too well aware, their payments from Medicare are affected by their score in the Merit-based Incentive Payment System (MIPS). MIPS imposes a number of requirements; if these are not met, payments may be reduced or denied.

Medical insurance

The MIPS requirements apply to all Medicare claims, even those whose performance is not necessarily affected by a MIPS constraint. Among these universal requirements is the meaningful use of electronic health records (EHRs). Within the EHR requirements, we have the promotion of interoperability with other EHR systems, and within that, we have the security requirements. Among the security requirements is an annual security risk assessment.

What Has Changed?

In the Federal Register of July 27, 2018, the Centers for Medicare and Medicaid Services (CMS) proposes that the current security risk assessment requirement in MIPS be replaced. The suggested replacement will be an attestation to the activities included in the security risk assessment standard that has been performed in the past MIPS year.

This essentially switches the scoring of the security risk requirement from the equivalent of a numeric grade to a pass/fail scoring system. A practice or institution passes if it has done the assessment; how well it has done on the assessment falls by the wayside. The requirements are stated in a bare-bones fashion in the Code of Federal Regulations at 45 CFR 164.308.

CMS states that their rationale is, in part, a result of the realization that a risk assessment is done well, or not at all.

What A Serious Risk Assessment Entails

The thinking behind this can be found in the Office of Civil Rights (OCR) newsletter for April 2018.  This newsletter distinguishes a gap analysis (“find the holes”) from a security risk assessment (“make sure there are no holes”). It is a highly useful guide to discerning the scope and the level of effort required for a serious risk assessment.

An article on the HHS website goes into greater detail explaining what is subject to the security rules and why:

All e-PHI created, received, maintained or transmitted by an organization is subject to the Security Rule. The Security Rule requires entities to evaluate risks and vulnerabilities in their environments and to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of e-PHI. Risk analysis is the first step in that process.

The guidance issues from OCR noted that the CFR requirements are divided into two categories: required and addressable.

The addressable requirements are not optional. Rather, if the approach specified in an addressable requirement is not feasible, the provider organization must develop an effective alternative to approach to achieve the same end and document this. The tendency to document-but-not-implement should be firmly resisted.

Did You Really Do A Risk Assessment?

Experts suggest that OCR has significantly underestimated the time required to do a serious risk assessment. Obviously, you have to look at hardware-associated risks. Are the BIOS files in your desktops and laptops updated? Has router firmware been updated?

 

You must take a hard look at software-associated risks as well. Are operating systems patched? You must strategically assess administrative risks: are you enforcing complex password requirements? Are you using biometric identifiers? Is data access truly on a need-to-know basis?

A Helicopter-Level View Is Not Adequate

The reader may protest that those concerns are nowhere to be found in the guidance. True. The point is that an adequate risk assessment will have revealed these as questions that need to be asked on a day-to-day operational basis. A risk assessment that is not dynamic misses all the critical points of vulnerability.

A risk assessment should point out any unnecessary risks and then offer a solid plan to eliminate them. It’s good to remember that the whole point of the endeavor is to make sure that the government (and all organizations) move toward the better Internet and network security. With cyber breaches occurring on almost a daily basis, there’s every need to be more cautious about how we handle, store, and transmit Big Data.

The current cost of a data breach has reached between $1.3 million and $3.5 million. The number one most sought-after data that hackers are vying for is healthcare information. On the Dark Web, 30,000 up-to-date healthcare records will fetch a pretty price.

Conclusion

Under this proposed rule change, you will no longer be given a percent of compliance score on your risk assessment. You will simply be in or out of compliance. The upside is less administrative hassle; all you have to do is carry out the activities and attest that you did this. The downside is that this may lead to a relaxation of vigilance at a time when threats are constantly increasing.

Unified Endpoint Management (UEM): Can This Help Streamline Cloud Security?

What Is UEM and Cloud Security?

As technological devices continue to diversify, there is increased demand for streamlining control systems for security. According to Techopedia, Unified Endpoint Management (UEM) is a new digital system that integrates the range of devices that are available for use now, combining this wide range of software within a single organized program for increased efficiency and effectiveness.

Endpoint Protection

The system can, therefore, be used to improve control over computer systems used in workplaces, smartphones integrated with business systems and other “Internet of Things” (IoT) or online devices that may be used for some aspect of business or system operations. Combining all of these controls into a single system makes it more convenient for administrators to use and oversee, thereby making them safer.

With concepts such as “bring your own device” (BYOD) now in existence for increased employee convenience analogous to the introduction of “plug and play” technology in the past, there is a greater potential for attacks and thus, an increased demand for better security.

UEM systems have increased capacity to control endpoints in comparison to previous system designs and can work to have more proactive strategies in place to accomplish this. UEM practices now include security embedded within request processes, cross-functional strategies, cross-platform designs, and increased capacity to streamline cloud security. UEM can, therefore, be highly useful in helping to simplify a diverse range of security needs in the cloud.

The Origin of Cloud Computing

Cloud computing has been around for some time, and its security demands continue to diversify. According to Pianese’s 2010 study, cloud computing, as the practice of using remote rather than local servers in a network hosted online to manage information, has demanded programs emphasizing control. It requires policies that provide improved information integration.

In the past, there was no system capable of integrating the range of cloud resources in existence. Therefore, system administrators were unable to experience the extent of flexibility and efficiency available with streamlined systems. The author of the study reported on his research team’s efforts in assessing the significance of establishing and improving virtual distributed operating systems for cloud computing. UEM can now address these through meeting the demands for elasticity, fault tolerance, and autonomous decentralized management.

Can UEM Better Address Modern Cloud Security Demands?

As both cloud security demands and technological diversity increase, UEM can help to streamline cloud security and its growing needs. According to SecurityIntelligence, cloud computing, the diversity of technological devices, and the IoT continue to expand in both hardware and software types. This has increasingly given hackers new opportunities for exploitation. There is an ever-growing need for better security all around.

With this, it has become more difficult for business leaders and IT specialists to maintain tight security over the extent of otherwise effective new programs and efficient integrations of hardware that can be networked through a cloud. In addition to the software security demands, the technological improvements challenge the development and maintenance of relevant policies that are developed for these purposes.

Businesses generally require policies to address technological aspects before software is installed that address specific security needs. It can be challenging for businesses to keep up with the extent of new devices that are available for networking, especially when projects or outsourcing changes frequently.

UEM has been increasingly sought to address all of these demands, because it was designed to streamline old and new software and hardware capacities within an IT network, combining the entirety of endpoints. The system, therefore, allows organizations to integrate desktop systems, networked laptops, smartphones, tablet devices, and the range of users and apps (including relevant content) that potentially operate within a network into a single security system for network administrators or others supervising and securing the company technology.

Improved Productivity and Efficiency

With UEM, in addition to the increased efficiency in streamlining cloud security, organizations can experience improved productivity or output. Infrastructures previously considered complex through wide distribution can be more efficiently managed through the centralization, thereby freeing company resources to focus on output. Through this, end-user productivity can be increased as IT management costs are reduced. This approach is regarded as superior to other strategies or models focusing on disparate point solutions, as the latter involves greater demands for costs and resources amid lower levels of efficiency.

Beyond these fundamental advantages, UEM:

  • Uses containment technology that can better protect device information while reducing the potential for it to leak
  • Can better facilitate software currency though patching and updating capacities
  • Increases the user-friendliness of apps
  • Help organizations track flaws in data
  • Limit app and resource access
  • Implement streamlined organizational needs for logic, auditing, and reporting

Conclusion

According to SecurityIntelligence, over 80 percent of organizations are expected to use a form of cognitive computing or AI for these endpoint demands in the next two years. Just over half are expected to have the current UEM model as their model for centralized management.

Cheuvront explained other potentially beneficial UEM capacities include:

  • Containerization
  • Identity and access management (IAM)
  • Increased balance of critical functions of user productivity and corporate security
  • Easier enrollment

If your business needs include any of the above, then you may benefit from increased examination or integration of UEM as research and development in the area continues.

Bralin Technology Solutions Ranked Among Top 501 Global Managed Service Providers by Channel Futures

11th Annual MSP 501 Identifies World’s Most Forward-Thinking MSPs & Leading Trends in Managed Services

Computer Services

August 21, 2018: Bralin Technology Solutions ranks among the world’s 501 most strategic and innovative managed service providers (MSPs), according to Channel Futures 11th-annual MSP 501 Worldwide Company Rankings.

The MSP 501 is the first, largest and most comprehensive ranking of managed service providers worldwide. This year Channel Futures received a record number of submissions. Applications poured in from Europe, Asia, South America and beyond.

As it has for the last three years, Channel Futures teamed with Clarity Channel Advisors to evaluate these progressive and forward-leaning companies. MSPs were ranked according to our unique methodology, which recognizes that not all revenue streams are created equal. We weighted revenue figures according to how well the applicant’s business strategy anticipates trends in the fast-evolving channel ecosystem.

“For the past 24 years, Bralin has been one of the leading IT providers in Saskatchewan and Alberta” says Brad Kowerchuk, CEO of Bralin Technology Solutions, “and now we’re honored to officially be named one of the leading IT managed services providers in the world! We are privileged to have Clients that trust and value our experience and solutions. Our Team is obsessed with ensuring the technology used to run our Client’s businesses is reliable and cost-effective. The daily rise of cybersecurity threats demands that businesses have a dedicated partner to keep them protected and secure. We look forward to facing the challenges tomorrow brings and growing with our Client’s success.”

Channel Futures is pleased to honor Bralin Technology Solutions.

For the first time, Channel Futures will also name 10 special award winners, including MSP of the Year, CEO of the Year and one Lifetime Achievement Award for a career of excellence in the channel.

The MSP 501 winners and award recipients will be recognized at a special ceremony at Channel Partners Evolution, held this year October 9-12 in Philadelphia, as well as in the Fall issue of Channel Partners Magazine.

“This year’s applicant pool was the largest and most diverse in the history of the survey, and our winners represent the health and progressivity of the managed services market,” says Kris Blackmon, Channel Futures content director and editor of the MSP 501. “They’re growing their revenue, expanding their customer influence and exploring new technology that will propel them for years to come.”

The full MSP 501 report, available this fall, will leverage applicant responses, interviews, and historical data to identify business and technology trends in the IT channel. Highlights will include:

  • Revenue growth and business models
  • Hiring trends and workforce dynamics
  • Business strategies
  • Service deliverables
  • Business tools and automation investments

The complete 2018 MSP 501 list is available at Channel Futures.

Background

The 2018 MSP 501 list is based on data collected by Channel Futures and its sister site, Channel Partners. Data was collected online from Feb. 28 through May 31, 2018. The MSP 501 list recognizes top managed service providers based on metrics including recurring revenue, growth and other factors.

About Bralin Technology Solutions

Since 1994, Bralin Technology Solutions has been providing leading IT Solutions and management for Clients in Saskatchewan and Alberta. Bralin’s slogan “We Manage Your Technology… So You Can Manage Your Business” is far more than a slogan. It drives the decisions they make, and focuses each Team member on helping their Clients move their businesses forward, further, faster.

About Informa

Channel Futures, Channel Partners Online, Channel Partners Conference & Expo and Channel Partners Evolution are part of Informa, the international business intelligence, academic publishing, knowledge, and events group. Informa serves commercial, professional and academic communities, helping them connect and learn, and creating and providing access to content and intelligence that helps people and businesses work smarter and make better decisions faster.

Informa has over 10,000 colleagues in more than 20 countries and a presence in all major geographies. It is listed on the London Stock Exchange and is a member of the FTSE 100.

MEDIA CONTACT:
Kris Blackmon,
Content Director, Channel Futures
Editor, MSP 501
Kris.Blackmon@knect365.com

Welcome Rabia Tinna

North Battleford SKBralin Technology Solutions is excited to welcome Rabia Tinna to the team! Rabia is joining us as a Help Desk Technician, based in our North Battleford Office.

Rabia brings a wealth of education and experience to our company, holding a Master’s of Computer Applications degree along with various other academic distinctions.  Rabia previously worked with Oracle as a Technical Analyst and at IBM as a Senior Software Engineer.

We’re confident that the professionalism and dynamic skillset Rabia brings, will be a great addition to our team. We’re very much looking forward to working with Rabia, and know that our valued clients will be served, by her and the rest of the team, based on Bralin’s core values of Caring, Excellence, Responsibility, and Trust.

Welcome aboard Rabia!