Cybersecurity Gaps Still Plagued Organizations in Spite of Better Risk Management Protocols

A recent cybersecurity survey shows that overall healthcare approaches to cybersecurity have improved in recent years. Most organizations have embraced their need to protect their data from intrusion.

healthcare cybersecurity

A study conducted by Mountain View, California-based Symantec and HIMSS Analytics[1] found that healthcare organizations are showing improvements in risk management strategies. Although their efforts have still not been satisfactory, they do represent a vast improvement. Most security experts believe there are gaps in most company’s security tools.

The newer cyber risks include medical devices. Hackers can now hack into almost anything including medical devices and appliances due to the expansion of the Internet of Things (IoT). Since so much information is now available in the Cloud, it’s more important than ever to protect this data.

The Symantec and HIMSS Analytics study[2] covers the current position of healthcare organizations as to their investment and efforts to strengthen their security. It accentuates some of the vulnerabilities that many organizations still have. There is one positive finding from the survey showing that healthcare organizations have matured in their understanding of cyber security. In the past, a lack of understanding about hacking, malware, and ransomware has prevented many businesses from taking the threat seriously enough.

In the past, a company viewed cybersecurity as a responsibility of their IT department. They did not get involved in what was done to protect company data. Instead, they relied on their CIO or IT staff to do the right things to protect company information. Today, things have changed. Cybersecurity is discussed on every level, from the mail room to board meetings. According to the report, stronger security measures have been recently taken by eight out of ten organizations. However, about half of them admitted that they know they are vulnerable on some levels.

Another finding indicates that 60 percent of healthcare providers believe that risk assessment, not HIPAA compliance, is a more effective method of securing data against cyber thieves.

This progress has faced a few challenges as discovered in the research conducted by the Symantec and HIMSS Analytics survey. The main challenges faced were the efforts to acquire enough resources to counter the continually evolving threat margin. During 2017, the U.S. Department of Health and Human Services reported that there were 295 data breaches at hospitals and healthcare providers. That number is expected to triple for 2018.[3]

A number of hindrances to improving security programs in the healthcare industry were cited. Not surprisingly, about 73% said that budgetary restrictions were a significant barrier. Staffing came in second with lack of the essential skills a close third.

The survey also discovered that there was a substantial lack of sustained investments in cybersecurity by healthcare providers. According to the respondents, 74% of the providers set aside 6% or less of their IT budget to IT security. Nearly 45% of the health organizations’ respondents allocated only 3% on security. These IT expenditures have remained about the same for three years in a row. In comparison, the financial industry spent an average of 10 to 12 percent of its IT budget on security.[4]

There are a number of steps suggested by the research report in the form of recommendations that all healthcare organizations can take to improve their risk management:

  • Create greater awareness among employees and conduct regular training across the organizations.
  • Engage the Board on implications and the risks of failing to allocate adequate resources to invest in better cybersecurity resources and tools.
  • Employ a comprehensive cyber defense platform that addresses each gateway cyber-thieves use.
  • Ensure all the stakeholders (IT, Legal, PR and Communications, Clinical Staff, Executives, etc.) are actively involved in Incident Response planning.

According to Alex Wirth, a blogger who analyzed the research report by the two institutions, “Every aspect of a provider’s approach to cybersecurity must be conducted from a business risk perspective”.

His opinion expresses that of many IT security experts. The only way that cybersecurity for the healthcare industry will be given the seriousness it deserves is for everyone involved to realize that this problem will not just go away. It must be addressed and given the time, attention, resources, and money that it requires to stop the spread of cyber theft. In the long run, this is the most sensible and cost-effective approach.

CONCLUSION

All of the security people and resources involved in cyber security for a healthcare organization must work together in order to maximize detection and curb security events. The best way to go about this is to keep the board informed and adopt an effective security framework. A sufficient budget for IT security must be allocated each year. Otherwise, care delivery and patient safety will be highly compromised.

[1] https://www.symantec.com/connect/blogs/new-research-healthcare-organizations-bolstering-cybersecurity-budgets-and-resources-significa

[2] https://resource.elq.symantec.com/LP=2713

[3] http://www.healthcareitnews.com/slideshow/biggest-healthcare-breaches-2017-so-far?page=1

[4] https://www.sans.org/reading-room/whitepapers/analyst/risk-loss-security-spending-financial-sector-survey-34690

Technological Trends in the Public Sector for the Future

This article is an analysis of topics related to technology that topped the charts in 2017 and are still trending in 2018. No doubt, cybersecurity was a priority topic and many positive advancements were made there. The Internet of Things became a much more talked-about issue, mostly due to its vulnerabilities to hacking schemes.

Government Computers

The real world implementation of new technologies used in ‘Smart Cities’ was a hot topic in the public sector. This article will rely on information generated from two top government IT institutions, which are the National Association of State Chief Information Officers (NASCIO) and the Public Technology Institute (PTI). The article will also look at the perspective of private entities on the future of smart technology, cloud technology, and the impact that cybercrimes will have on these.

Government perspective of Important IT Topics

Cyber Security

It is not surprising that this topic created quite a bit of buzz back in 2017 and is still at the top of the list. This year, NASCIO and the PTI teamed up to offer a free webinar called Technology Forecast 2018: What State and Local Government Technology Officials Can Expect. [1]

Of course, security is a top priority and major concern for both the state and local governments. The government has made a resolution to address the growing concerns about cybersecurity that seem to be holding technology back. With so many data breaches occurring each month, private organizations, the government, and businesses of all types and sizes have been hit by cyber thieves. Every organization seems to be vulnerable, so leaders and experts believe that, in order to move forward with greater technological advancements for the future, the issue security must be a top priority.

A recent article on the Government Technology website[2] discusses why businesses need a cybersecurity framework.

Smart Government and Cities

Many cities and towns have embraced technology across their operations and service delivery sectors. This includes migrating data to the cloud, which a big step that can greatly improve a city’s ability to handle larger amounts of data each day. The transportation industry is using an app that tracks city buses so that riders can get accurate bus times. Seemingly small improvements like this can have a big impact on city services. Smart cities will run much smoother. The costs should also be lowered due to the automation of many city services. These services should be available cheaper rates and they should work much better.

Cloud Services

Governments are working to upload all their data to the cloud, where it will be much easier to access and manage. Most government entities are expected to hop on board this year according to a recent MeriTalk Survey. This survey found that 76% of state and local agencies are planning to increase their resources allocation to improve and increase cloud services.[3]

Private entities’ perspective on Government and Technology

A UK company called Deloitte[4] issued a report last year called Kinetic Enterprise. The report revealed many key insights in the trends that are shaping and redefining the role of Information Technology in disruptive technologies.

The report states that cutting-edge establishments are looking beyond implementations in a single domain. Instead, they are opting for projects that can affect a whole array of services, like the delivery of electricity, gas, and water to residents.

They are evaluating the ways disruptive technologies can work in harmony to create innovative tools that can redefine business. The report went on to say that federal and state government leaders could go a long way toward advancing sectors like machine learning, finance, the Internet of Things, blockchain, and others.

An article called, Gartner Top 10 Strategic Technology Trends for 2018[5] named three megatrends that they believe will drive digital business technologies over the next decade:

  1. Artificial Intelligence
  2. Transparently Immersive Experiences
  3. Digital Platforms

In the article, Gartner said it believe that businesses and organizations would lose ground if they did not take advantage of emerging technologies. The article stated that “States are increasingly being asked to referee fights between mobile phone carriers and local governments, as the wireless industry sets out to build the next generation of data networks. 5G Technologies requires a much denser network of 10 to 100 times as many antenna locations….”

On election cybersecurity, the article states: “The 2018 elections could provide an opportunity for states and localities to restore confidence in voting systems that came under scrutiny during the 2016 presidential campaign.”[6]

Conclusion

Technology is definitely having effects on the government and public sector. Many experts see this as a way for the future of mankind to ensure greater progress. For instance, building Smart Cities can cut back on pollution, use sustainable materials, and make life easier for everyone. Many experts believe that the only thing holding progress back is the vast number of security breaches that occur each day around the world. Once we are able to stop those attacks from occurring, the sky’s the limit.

[1] https://www.nascio.org/Publications/ArtMID/485/ArticleID/611/Technology-Forecast-2018-What-State-and-Local-Government-Technology-Officials-Can-Expect-webinar

[2] http://www.govtech.com/blogs/lohrmann-on-cybersecurity/

[3] https://www.meritalk.com/articles/policy-based-automation-key-for-multi-clouds/

[4] https://www2.deloitte.com/us/en/pages/public-sector/articles/government-tech-trends.html

[5] https://www.gartner.com/newsroom/id/3812063

[6] http://www.governing.com/topics/politics/gov-2017-9-issues-to-watch.html

Microsoft Launches Surface Pro 4 Replacement Program Due To ‘Screen Flicker’

Microsoft introduced the Surface Pro 4 Tablet some time back in 2015. It replaced an older model called the Surface Pro. Soon after the release of the Surface Pro 4, Microsoft’s social media pages were flooded with complaints about a flickering screen. The Redmond Washington-based company responded to these complaints by promising that they would replace some Surface Pro 4 devices with this problem.

Surface Pro 4

Trouble for the tech giant

This is good news especially since the company is making the replacements for free, but for only those devices experiencing the mishap within three years of purchase. In their web page called Surface Pro 4 screen flickers [https://support.microsoft.com/en-us/help/4230448/surface-pro-4-screen-flicker], Microsoft said that their top priority is to create the best products and experiences for their customers. Further, the company noted that they have heard their customer’s complaints and that’s why they have come on board to address these issues. After some investigation, Microsoft determined that some of the affected Surface Pro 4 devices could not be repaired with driver updates or new firmware.

Surface Pro 4 users who are experiencing the flicker are advised to first install the latest Surface and Windows programs to ensure that this is not the cause of the flickering. Surface and Windows updates are designed to keep any device running in an optimal state. If the issue persists, consumers should contact Microsoft Support. Once they verify that the device is certified as one of those that will require a replacement, the exchange process is set in motion.

Getting your Surface Pro 4 replaced or repaired

For those shipping their devices out to Microsoft for repair or replacement, it typically takes about 5-8 business days for the tech giant to get your broken device. The time to repair or replace it can vary depending upon several different factors. Microsoft has also promised to refund the warranty fee to customers who paid for a warranty fee to repair their device. In order to get a refund, customers must contact Customer Support for validation. Microsoft is committed to delivering great products and services to their customers.

Consumer complaints

Information about the flickering screen issue came to the attention of Microsoft after Consumer Reports, a non-profit organization that offers product ratings, said that they could no longer recommend Microsoft Surface products because the device did not perform as expected. As any serious service provider would do, Microsoft did a thorough examination, made their own findings, and came up with a resolution to have the screen replacement performed for free.

Further, Consumer Reports learned about the flickering screen from surveyed electronic owners who said that their Surface Pro had too many problems and that they would not recommend it. Experts have been concerned that the Surface Book Laptop may be more likely to have screen failures as compared to other competing brands. To date, this has not been the case, but it has caused sales of these products to decline.

Mitigating the damages

Microsoft’s decision to replace the flickering screens for free might not be the immediate solution that will stop future damage, but they are hoping to mitigate the harm caused by negative reviews of the Surface Pro devices. Nothing raises the spirits of a devoted customer or consumer than a company that acknowledges fault on their part and gives a remedy with no strings attached.

Many companies, especially those in the business of electronic devices, handle these types of issues poorly. They often spend months denying that anything is wrong. Then, later they make the method of repair and replacement so complicated that users get frustrated. Some warranties are felt to be useless due to these and other problems that people have experienced over the years. Consumers often complain that no one seems to qualify for the free repair services.

However, with the Microsoft Surface Pro 4, the steps were purposely made simple and straightforward. This encouraged those affected to give the company a second chance to do it right. Often, this type of issue can turn off consumers to a product or even an entire brand, but Microsoft has made every attempt to do the right thing.

Future Microsoft designs

The Microsoft design team has taken these problems into consideration when developing new versions of the Surface Pro. For the future, Microsoft products should have very clear and reliable screens that will last for years with no problems. The company seems to have learned an important lesson throughout this ordeal.

Developing brand loyalty

What Microsoft has done by launching the Surface Pro 4 Replacement Program is not only a wise corporate decision, but a show of gratitude and humility to their consumers. This is probably a major reason why Microsoft customers are loyal to this brand. They expect perfection from the company and do not accept anything less.

Nest, Google’s Smart Home Division, Discovers Leaked Passwords and Contacts Customers

Nest Labs, a division of Google, recently discovered a list of email addresses and passwords that had been published online. As part of their ongoing commitment to protect their customers from hackers, Nest continuously monitors databases found online of stolen or leaked passwords. When they found that some of their customers’ passwords were listed on a phishing website, they sent out an email to customers.

Nest Password Leak

Consumers remain the weakest link

Security experts all agree that the weakest link when it comes to internet security is the consumer. People click on suspicious links that download a virus or worm onto their device. They also frequently use the same password across multiple accounts. Many users visit sites that are unsafe where they may be exposed to malware. Often, consumers use the same password for years. All these practices make it very easy for hackers to steal passwords then break into various accounts.

Nest takes proactive stance

When Nest found the databases of leaked passwords, they sent out emails to all of their customers that read in part:

“Nest monitors publicly leaked password databases and checks our own databases for matches. We’ve found that your email and password were included in a list of accounts shared online. Common causes of password theft are falling victim to phishing emails or websites, malware, and password reuse on other websites which may have been compromised.”

The letter goes on to give instructions to users about what to do next and this applies to anyone who suspects that their password has been stolen. Instructions are below:

  1. Sign in to your Nest Account (bank account, credit card account, etc.) immediately.
  2. Navigate to the account management screen and find the item that says, “Reset Password.”
  3. Select a new password. Be sure to use numbers, letters, capital letters and symbols. An example of a good password would be: 57Rop*82!@HK. A password like this is much harder for crooks to decipher. An example of a weak password would be: time1234. This password would be easy for hackers to learn.
  4. Click “Save” to save the new password. Be sure to make a note of the password.
  5. You can also go to the log-in screen of any account including Nest and click on “Forgot Password.” This will initiate a procedure where you are sent a code (usually as a text message). Enter that code where prompted, then proceed to create your new password.

Nest reminded its users that unless they did log on and change their password within a set length of time, the company might disable access to their account. Often, users put off changing passwords so the company most likely felt like it was necessary to include this veiled threat to shut down the account until a new password was chosen.

How to change your Nest password using the app

The company also included instructions for changing the password via the Nest app and these are given below for your convenience:

  • On the Nest app home screen, tap the Menu icon.
  • Select the Account icon.
  • Select “Manage account,” then “Account security,” then “Account password.
  • Enter your current password and your new password, then tap “Save changes.”

How to use Two-Factor Verification (2FA)

Nest also offers the option of 2-step (2-factor) verification, which can add a layer of protection to any account. This is very important to do for financial accounts and other accounts like Nest where your home, family or money might be at risk. The instructions for adding 2-step verification are given below:

  • On the Nest app’s home screen, select the Menu icon at the top.
  • Select Account.
  • Select “Manage account,” then “Account security.”
  • Select “2-step verification.” Then tap the switch to toggle 2-step verification on.
  • Follow the prompts to enter your password, phone number, and the unique verification code sent to your phone.

Cyber theft increasing globally

Many experts are now recommending that customers add 2-step verification to all their online accounts. The increase in hacking and phishing schemes worldwide has alarmed many security experts, as well as consumers. It has become commonplace to read that one of your favorite stores or most trusted brands has lost millions of data records to hackers.

This fact has spawned a new generation of security experts and advocacy groups whose purpose is to stem the tide of the growing number of cyber thefts. One of these groups called the Internet Society was the first to discover the Nest breach when they stumbled across an email from Nest to one of its customers. The society forwarded the email to the Online Trust Alliance and they published it as a blog post. Once this occurred, the story made international news.

How Nest learned of the breach

Though Nest has not revealed how they learned about the compromised passwords, it is believed that they regularly check a site called “Have I Been Pwned?” which is run by Troy Hunt, a security researcher. The site can be used to check whether any of your passwords have been stolen or leaked online. It includes half a billion passwords and other credentials stolen from consumers all over the world.

About Nest Labs

Nest Labs, now a division of Google, provides home automation tools that are programmable, sensor-driven and self-learning. Using your home’s Wi-Fi system, Nest products can be controlled either at home or remotely. These products include smoke detectors, thermostats, indoor and outdoor security cameras, security systems, lights, and other common household appliances.

Nest was founded in 2010 by Matt Rogers and Tony Fadell, engineers who formerly worked for Apple. The company grew quickly to 130 employees and within just a few short years, Nest Labs had grown to 280 employees worldwide. In 2014, Google acquired the company for an estimated $3.2 billion. Today, the company has over 1,200 employees. They recently built a state-of-the-art engineering center in Seattle, Washington.

Internet Security a Top Priority, Experts Claim

Experts in the tech world are giving their input on what is planned by state and local Chief Information Officers (CIOs) in terms of security for all of today’s technology. For so long, technology has existed and yet the public has taken its security for granted. But, sometime last year, giants of industry like Cisco Systems, have revealed that plans are underway to bring new and better levels of security to the cyber world. According to Britt Norwood, the head of Cisco Systems’ state, local and education sales for the western U.S., it’s time that technology had some real-life applications.[1]

Internet Security

According to Mr. Norwood, the state and local government of the future will rely heavily on technology for its management. From Smart Cities to cloud computing, innovative breakthroughs will change life as we know it. Life will become easier while access to public services will become cheaper and more readily available.

A great example is the Internet of Things. All of our medical devices and appliances are now connected via the IoT. However, these devices are extremely easy to hack and that puts consumers at risk. This reveals our ongoing need to implement stronger cybersecurity measures to protect ourselves. The government, along with the private sector now understands the importance of keeping hackers out of our systems, networks, and databases.

To address these issues, a host of new and radical changes will take place over the next few years. These include four major areas as cited below.

Adoption of the Internet of Things at Community Level

There is no doubt that IoT has had the attention of the public sector for a few years now. Informal discussions on the implementation of IoT applications by the government in delivering services to citizens have been underway. Imagine a situation where parking meters are connected and pricing on parking are determined by the time of day. Or even an application that is able to track buses in real time to give accurate information on wait-times to patrons at bus stops. This would most definitely improve the quality of services delivered to the public.

Each town and city has its own set of unique problems with delivering affordable, reliable city services. Each jurisdiction may adopt its own unique applications according to what suits them best. These applications will definitely make a positive change in the way cities and states are run. But they must include the best security to protect consumers.

Cyber Security Still a Top Priority for Governments

With technological advancement comes increased risk and vulnerability in terms of security. It is very important that the government stays on top of it. It would be of no use to continue investing in digitalization and increasing connectivity without having in place measures to address the issue of data breaches.

That is why for the last four years the National Association of State Chief Information Officers (NASCIO) in their ‘State CIO Ten Priorities for 2017’ report, ranked security and risk concern as a top priority.

According to Yejin Cooke, who is the director of government affairs for NASCIO, security and risk management are not going to lose their importance any time soon. In fact, the public is only now becoming aware of all the threats across the globe that can endanger everything from air flights to ground transportation or satellites. A society cannot operate without knowing for sure that hackers will not have access to our most important sectors.

It is vital to have well-organized and comprehensive cybersecurity plans in order to counter major attacks. Some states like California and Michigan have made milestones in terms of well-laid security plans. They are setting the pace for other states.

Uploading data to Cloud Priority

According to Chip George, NetApp’s senior director of state and local government and education for the U.S. public sector, moving data to the cloud has proven to be a way in which governments are able to deal with financial constraints and legacy technologies. A recent survey by MeriTalk found that 76% of state and local agencies are planning to increase spending on Cloud computing.[2]

State and local governments must also consider their environment so as to adopt a model that best suits them. The Cloud has three models: public, private, and hybrid. Data management can complicate issues if governments resort to relying on multiple cloud management providers.

In addition, George pointed out that, “Agencies must adopt a data fabric, so that data across all cloud environments is seamlessly integrated and managed with the same set of tools, no matter the cloud provider.”

In the future, when governments are trying to evaluate which model suits their needs, they will have to consider these and many other factors dealing with the proper implementation.

Collaboration Tools

Another mechanism that has become highly prioritized across governments is collaboration tools where centralized resources are optimized. By optimizing and centralizing technology, costs are lowered and a more streamlined cyber security platform is installed. Good collaboration tools make sense. They reduce costs. They put everyone on the same page.

Conclusion

Technology is here to stay, but it evolves at a rapid rate. Though this is good on some levels, when it comes to cyber security, the experts have not been able to keep up with the hackers. Cyber thieves must be stopped in order for businesses and governments to improve efficiency in service delivery, cut their costs, and protect consumers from cyber criminals.

[1] https://statetechmagazine.com/article/2017/02/5-priorities-state-and-local-government-technology-year-ahead

[2] https://www.meritalk.com/study/destinationcloud/

Are Parents Being Good Role Models for Children When It Comes to Technology?

Everyone likes technology, right? It’s amazing what you can do and find out about the use of technology. However, technology itself is addictive and parents are not an exception. Today, most parents pay more attention to their computer or phone screen than they do to their children. Even busy parents stay on social media too much. They constantly check their email. They watch television shows or news programs on their smartphones—all without realizing that this behavior does harm their children’s development and well-being to some degree.

teenagers smartphones

According to research done on child psychology, some of the problems that children experience today can be contributed to their parents. Thanks to technology, children today feel that they have to compete for their parent’s attention. This is because most of the time parents are glued to their screens. Some even respond harshly to their children when the child tries to get their attention. Many child psychologists believe there’s a serious need to find a balance between technology and taking care of your family.

Studies show that a modern parent spends too much of their time online or involved in texting and social media. After working all day and taking care of the home, parents often leave very little time that they can commit solely to their children. Family outings where all family members are given a chance to really bond are very scarce these days. The inability for parents to control the amount of time they spend on their phones or laptops has also extended to their children. This is mainly because children look up to their parents. They mimic what they see parents doing.  Many kids have become antisocial and some have even become introverts. The ability to develop real-world relationships is missing in many people today.

Effects of parental technology use on children

  1. Children may constantly seek attention. Child rearing is not easy. Children are dependent beings that require more attention than most adults. Parents constantly being online or on their phones make children feel deprived of the attention they deserve. They may not know how to tell you, but they miss play time, storytelling time, kitchen activities, and so forth. This is not good for the emotional and mental development of the child. It may lead the child to be withdrawn or even lower their self-esteem. In these cases, the child may act out.
  2. A study also shows that children whose parents are constantly messing with their phone or on social media feel less supported by their parents. This is mainly attributed to the lack of communication between the parents and the children. Parents don’t get to know what’s going on in their children’s lives or even how they are progressing in school. Communication is extremely important to a child’s development. Lack of communication can easily divide the family.
  3. Need for privacy. The modern-day parent on social media loves to post pictures of themselves and their children. They never seem to care how that affects the kids though. What you post and the comments you make on social media can shape how your children perceive you. Many children say they don’t like some of the photos their parents share online. Kids have a right to privacy too.

Ways to find a healthy balance between technology and parenting

Establish good technological habits. This means simply setting time limits for surfing the web and sticking to them. This is most effective if the kids are still young. Don’t just set the time limit, but make every effort to stick to it. Spend that extra time each day with your family and give them the attention they need.

Be a role model. One can achieve this in various ways. Avoid fooling around with technological gadgets during dinner. Give your family your full attention at social outings. Listen to them when they speak to you. This will help the children learn that they, too, need to find a balance between technology and their social life.

Turn off work. Some parents constantly feel the need to access work email and work projects. They wind up spending too much time checking their mail or in group chats. By turning off work when you get home, you can fully concentrate on your family. You can give your spouse and children the attention they need.

Final thoughts

All the studies and findings clearly show that parents need to find a balance between technology and parenting. It not only helps the parent to spend more quality time with their family, but they can monitor their children’s growth. They can spot behavioral problems. It’s important to know what your children are up to and how they are progressing in life. It helps you to be a better-rounded individual and it helps your kids to grow up into responsible adults.

View and Publish Microsoft Planner Tasks in the New Outlook

With everyone so busy these days, people are searching for new ways to get more done and Microsoft Planner is an excellent tool for that. It allows teams and individuals to collaborate on any project in real time. It has so many great features that can streamline projects, helping you to achieve deadlines while producing better work.

Microsoft Planner

Each year, Microsoft works diligently to update its product line with helpful features for all products including its Planner. These features are designed to give users greater insight into project schedules, receive notifications of upcoming deadlines, and filter tasks accordingly.

The latest and one of the most useful features for the Microsoft Planner enables users to publish tasks to their Outlook calendar. This handy feature allows users to view their Outlook calendar alongside their personal calendar. This can give you a much better idea of what’s coming up and what projects you need to work on first.

There are numerous other features like this that can cut time and stress out of your day. Since many are not familiar with these new functions, we’re going over them to give users a bird’s eye view of some of the most important new updates in MS Planner.

First things first: what to know about Microsoft Planner

MS Planner is a sophisticated work management app that comes as part of Office 365. Today, millions of businesses and offices worldwide are using Office 365. This product is part of Microsoft’s cloud-based environment that includes well-known programs such as Word, PowerPoint, Excel and OneNote.

MS Planner offers its users the ability to organize any project, share files with others or even collaborate on a project. It features a very handy chat environment where employees can get together and discuss a project while jointly viewing files.

The Outlook Calendar

As a busy individual, you are probably looking for anything that can make your life simpler. Having a work calendar that integrates with your personal calendar is a big time-saver. You can now view or import Planner tasks into your Outlook calendar. Adding the task to your Outlook calendar can be accomplished using the iCalendar feed. This creates a link that members can share with others.

Publishing an iCalendar feed is simple as well. Start by tapping the ellipsis at the top of your page, then select the Add plan to Outlook calendar from the drop-down menu. A dialog box appears giving you the option to Publish or Unpublish your plan’s schedule and other information. By selecting Publish, you can automatically send scheduling information to anyone with the iCalendar link. Now that person can open the plan in their own personal Outlook program.

Please note that you must be the plan owner in order to view and work with this feature. In addition, your admin has the ability to turn this feature off when setting up MS Planner.

Visually organizing your work

MS Planner allows users to organize their tasks into buckets. This feature makes it easy to categorize each task based on several factors. A task can be organized by the task owner, the status, the due date and other dynamics. You can designate a task as a Favorite or check to see which tasks are due first. Updating the status of any assignment or handing it off to another staff member is easy to do because tasks in Planner can be dragged and dropped between columns.

You might want to check and see who’s working on a specific task or whether a task is overdue. Each plan has its own Board with Charts view. By checking the Charts view, users can see the overall progress of the task. Who’s been working on it? What still needs to be done? The Charts view gives you lots of important information about any task.

Adding iCalendar link to Outlook

Click on the option called Add to Outlook to add the plan to your own Outlook calendar. This prompt opens up your personal Outlook calendar in Outlook on the web. The dialog box contains the same iCalendar link and the calendar name (which you can change if you’d like to rename the plan.) Once you’ve created an iCalendar link, you can then paste it into any iCalendar app. Users who have the link can easily view your plan’s task information.

Adding a plan to your Outlook calendar if not the plan owner

Sometimes the plan owner will want to share their iCalendar link with you so that you can add it to your personal Outlook calendar. To accomplish this, click on the ellipsis at the top of the plan and select Add plan to Outlook calendar in the drop-down menu that appears. Now you’ll have the option to review everything before saving it. Once the plan is saved, all info is imported to Outlook. You can view the details using Outlook. The plan now appears under People’s calendars. Select the plan to view all the details.

Medical Devices Security Plan by FDA

The U.S Food and Drug Administration (FDA) has recently launched their Medical Device Safety Action Plan whose main focus is to give assurance in the safety of connected Medical devices. The organization has put its main focus on patients relying on medical devices as seen from their Medical Device Safety slogan: ‘Protecting Patients, Promoting Public Health’ as part of their Action Plan.

FDA Medical Device

The plan is molded in a way that it heavily relies on cybersecurity measures as part of its plan to reduce risk and curb breaches that are associated with connected devices. After all, security breaches cost everyone time and money and better cybersecurity is something that the whole world is working to achieve. Some of those measures are outlined below:

  1. A Consideration that firms should update and patch device security product design and submit a “Software Bill of Materials” to the FDA.
  2. Ensuring that there is an up-to-date guide to the medical device’s security before it is released into the market.
  3. Establishing a body to follow up on post-market requirements on firms in adopting policies and procedures for reporting known threats or risks.
  4. Finally, analyzing the improvements of CyberMed Safety (Expert) Analysis Board (CYMSAB).

This plan is well structured, but before it is even implemented and checked on its suitability to address all the cybersecurity breaches, below are two very real concerns:

  • What is the security plan in place for those devices that are already in the market?
  • What approach is in place to prepare for the future of cybersecurity?

The plan is obviously inclined to address the future security of medical devices. It has failed to adequately address the past which affects the present. More importantly, it may not adequately address the evolving threats that cyber thieves represent.

Here are some of the recommendations we put forward for consideration when reviewing the plan for Medical Device Safety:

Pre-market ‘hardening’ of Devices

Manufacturers should be required to ensure that their devices are up-to-standard where cyber security is concerned before releasing them into the market. There are various bodies from which the standard can be set. The Defense Information System Agency (DISA) or the Center for Internet Security (CIS) can be used as benchmarks for ‘hardening’ devices. This way manufacturers may be able to bypass the lengthy processes required to test and approve security updates once devices get into the marketplace.

Constant evaluation of Device connectivity

There should be a requirement that the manufactures set a clear connectivity path in their devices. This step is to help in monitoring any behavioral changes that are foreign and unwelcome. The users are also better able to understand the range of device performance on the network.

Standardized Communication by the Manufacturers

An organization deals with thousands of devices from different manufacturers, so imagine how difficult good communication will be. Today, providers are expected to contact the manufacturers about the known or expected vulnerabilities of their devices. This leads to a lot of time wasted in trying to ensure the security of the device environment. In some cases, manufacturers are being asked to come up with a timely resolution to a problem experienced. An effective process in risk mitigation would be to set up rules about the expected standards of communication between the manufacturers and the providers.

Accountability by the Manufacturers

Manufacturers should address the issues related to vulnerabilities. The devices should be tested and certified ready for use by the manufacturers and not the providers. Especially when it comes to system or software updates, the manufacturers of devices should be held accountable. The manufacturer is better positioned to test and approve their applicability or even make recommendations on their usage to their client base. This way, both parties are aware of who is accountable in case of a security breach.

Manufacturers should also be required to come up with a mechanism to monitor the performance of devices connected to the network on a full-time basis. This monitoring should be modified to suit all organizations whether small or big.

Consider the costs

The FDA’s plan should have factored in the amount of money that will be required to ensure this plan is carried out efficiently. For instance, the bandwidth required to store current data, devices, and patches are enormous and most providers cannot adequately handle it. Resource support is at the core of ensuring that medical devices are secure and continuously operate as expected.

CONCLUSION

Cybersecurity is becoming a serious topic especially when it concerns medical devices; people’s lives depend on them. If there’s a chance that they could be compromised, the stakeholders involved, including providers and manufacturers, should treat cybersecurity with the significance it deserves. The FDA is often relied upon to handle these important tasks, but in today’s world, it will require everyone’s assistance. The job is too big to leave to one organization.

11 New Apps your Business Could Benefit From Using

Most of us work with programs like Dropbox, Google Docs, and Microsoft every day. But there are a wide range of great software-as-a-service (SaaS) and cloud-based programs that can improve efficiency. We’ve found 11 programs that are sure to be a crowd favorite at your workplace. Though some are not new, they’ve recently been updated to provide a wider range of services and features. These cloud services apps are perfect for small companies, as well as larger organizations.

Cloud Applications

Each program solves a real-world business problem that many of us have experienced and that’s no doubt the key to building a great app for business: it needs to solve a problem. Good apps that people actually download and use must be helpful. They must include benefits such as making your job easier or helping workers get things done faster. That’s another big plus for today’s busy people. We’re all multi-taskers who understand that we can’t get everything done without some help from technology.

The last big feature that these apps have in common is that they require a very small investment. For just a few dollars a month (in most cases), you can get apps that give you professional document management, cloud-based document backups, marketing campaigns, social media management, and many other services. Below, are 11 apps that will improve your workflow and save valuable time.

  • Approval Donkey

Free version: Up to three workflows
Plus program: $13 per month

Approval Donkey is a cloud-based approval app that automates the process of getting approvals on projects of all types. This app can be set up to move a project along a pre-defined chain so that there are no bottlenecks. It integrates with hundreds of other apps, making it a real bonus. Whether you’re dealing with admin, accounting or any other project, you can rely on the Approval Donkey to make sure each stage of the project gets the proper approval before moving on to the next stage. The app provides the current status of any project’s approval so you can quickly find out where the project is.

  • Asana

Free version: Up to 15 members, limited features
Paid version: $9.99 per month

Asana is a new project management app that provides easy project organization across teams. It can handle everything from tracking and reporting to conversations. A set of tasks can be managed for individuals, groups or larger teams. Asana has done away with clumsy project management tools that require numerous spreadsheets, emails, and word docs. All project documents are embedded within the project and completely transparent to everyone working on it. The paid version is $9.99 per month but there’s an even more comprehensive Asana app that can be used in Enterprise organizations.

  • Airtable

Cloud-based spreadsheet/ database
Free version: Store 2GB of data, manage 1,200 elements
Paid version: $10 per month, unlimited use

With Airtable, you can store, structure, and share information with other collaborators, allowing a team to work on the information in numerous forms. Airtable has a wide range of templates that let you structure your data any way you like. You can make it appear as a catalog, Kanban chart, inventory or however you need to suit your project. Airtable combines helpful features like those found in Google docs, Evernote, and Trello to help you manage information better.

  • Backblaze

Inexpensive cloud storage
No free version
Paid version: $5 per machine per month

Provides a set-it-and-forget-it backup system to store copies of local data in the cloud. Works for both internal drives and USB connections. This object-based cloud storage app is cheaper than most other cloud storage apps but still offers a rich API with good integration with other programs. Does not work with personal NAS boxes.

  • Cloudphone Virtual PBX

No free version
Paid version starts at $12 per month (includes one local number)

In the old days, a PBX system required a central box, intricate wiring, and actual telephones. It was a real hassle! But this Cloudphone has the ability to route calls just the way the old-fashioned PBX systems did. It includes conference calling, business voicemail, automated attendant services, and business phone numbers. It’s a great solution for companies that have lots of employees working from remote locations. Employees can work from anywhere while still using the corporate phone system. For $12 per month, you get one number and three extensions. For $49 per month, you can get five local numbers plus unlimited extensions.

  • Digital Ocean

Alternative to AWS
No free version
Paid version: Starts at $5 per month

This IaaS (infrastructure as a service) app allows users to create virtual machines in the cloud. This app works much the same as Amazon’s AWS but is simpler to use. Good IT skills are still required to configure the app. It was recently updated to add cloud-based object storage. Users build droplets or virtual machines adding RAM and processing power. Then decide what region to run them in. Allows users to preload virtual machines with numerous configurations.

  • Drip

Marketing automation
Free version: Less than 100 subscribers
Paid version: Starts at $43 per month for up to 2,500 subscriber

This marketing automation tool is basically a list manager that automates customer interactions. Using email, users can send out a pre-written set of messages to customers or prospects. This app integrates well with lead capture tools and shopping carts. Create a drip campaign, then send out emails over a period of time to improve customer engagement. For fewer than 100 customers, Drip is free to use, but the price goes up as you add new customers. At $43 per month, you can manage up to 2,500 subscribers sending out unlimited emails to them.

  • Hootsuite

Social media management
Free version: Up to three social profiles
Paid version: $29 per month for 10 profiles

This is a familiar app that allows marketers to sift through the feeds on popular social media sites to find out what’s important to their company. Hootsuite has become the go-to app for preparing corporate messages, interacting with consumers, or watching for important trends.  You can manage thousands of social profiles across various groups. You can manage and schedule social media posts and even measure your social media ROI. Hootsuite integrates well with hundreds of other apps.

  • JIRA

Bug and issue tracking
No free version
Paid Version: $10 per month for 10 users

Create a helpful database of bugs and software development problems with the Jira app. You can track how issues are being handled and their progress. The app is often used by software development teams but offers a wide range of agile team coordination tools. Developers can work together managing workflow and production. $10 a month for 10 users is a great deal but the price goes up $7 for each new user you add. The app is scalable and can be used by enterprise organizations.

  • MailChimp

Manage mailing lists
Free version: 2,000 subscribers and 12,000 emails
Paid version: Depends on the number of subscribers and services

MailChimp works much the same as HubSpot and Drip. It helps marketing companies manage their mailing lists. Users love it for its easy-to-use Dashboard and for how well it integrates with other programs like the shopping cart and your blog. The company includes many cool tools for opt-in signup. Everything is fully automated once you get it set up. The free version offers a generous 2,000 subscribers and 12,000 emails but the price goes up as you add new subscribers and other services.

  • Shopify

Turn-key ecommerce
No free version
Paid version: $9 a month for lite version

Shopify is well-known as the most comprehensive ecommerce app available today. You can set up an online store, then use “chip and swipe” readers for Point-of-Sale registers. It integrates well with all social media sites, as well as shippers like UPS, Fed-Ex, and DHL. Though most consumers think of this app as primarily for Internet sales, it can also be used in brick and mortar stores or for small at-home businesses.

After the 14-day free trial, Shopify is $9 per month for the lite version, and $29 per month for a basic plan that includes a wide range of services. While they do charge transaction fees for credit card processing, their fees are very competitive with other services.

FIVE TIPS FOR PROTECTING YOUR IoT-ENABLED MEDICAL DEVICES

In our modern world today, most of our electronic devices can be connected to the internet, sounds good, right? Some advanced technology recently introduced medical devices that can connect directly with health organizations through the internet. This is a great milestone since consultations can be done from miles away and immediate help afforded to patients and caregivers. There is a downside to this; that personal information shared on these devices might not be secure. Hackers have found a way of acquiring information and using it for financial gain. This is distressing for patients and it leaves healthcare organizations at risk for lawsuits.

Medical IoT Technology

The issues relating to securing information on Medical Devices connected to IoT should be a Health Organization’s priority over and above everything else. Here are five tips on how to protect your IoT-enabled medical device from hackers.

Conduct an Inventory

Healthcare leaders are often not aware of how many medical devices are connected to their network. This makes their monitoring and management of risks associated with the connection much harder. What makes it even more difficult, is the dynamic way in which the devices are introduced and removed from the environment. It has become more important for these organizations to create a database of these devices. Once they have a complete database of the device including some owner information, healthcare professionals can monitor them. They can also gather actionable intelligence based on the different security risks associated with them.

This may be costly and lots of work, but at the end of the day it will help secure the Health Organization’s reputation, while keeping patient information safe. Since the future seems dependent on technology, it’ only logical to go ahead and set up a system where the IoT devices can be tracked and monitored. This will also help avoid possible law suits against the organization.

Increased Accountability

Bad security will affect each and every aspect of any business, so instead of treating security as an IT problem, it should rather be seen as a business issue. This will in turn spark the kind of attention it deserves. Health organizations operate differently when it comes to the security structures they have in place. In some organizations, Clinical Engineering (CE), IT, and Security are handled separately. At the moment, those who are responsible for a security breach in IoT-enabled Medical Devices are not well defined. Unless these issues are clearly defined for each healthcare organization, it’s difficult to take steps to establish the responsible party whenever a medical device is hacked.

Create and Maintain A Cyber Security Strategy

The idea of medical devices being connected to the internet is relatively recent. So it is important for the healthcare organizations to review these issues as a matter of priority. Cyber security strategies for IoT devices will become even more relevant and critical as they move further into the future. It is recommended that the organization put in place a system that monitors the behaviors of these devices by listening passively to the medical devices and identifying dangers in real time. Security strategies work best with human interactions, but that covers only a small margin. It is important to include machine learning and Artificial Intelligence (AI) as strategies to effective cyber security.

Establish A Fast Response Process to Breaches

Every moment counts when a breach does occur. The organization should have in place a mechanism that is well integrated in the overall security system and designed to notify those involved. First, check to make sure the patient is aware and okay. The patient’s health is always first. It is also of key importance that those who are responsible in the organization clearly understand their roles. When each nurse, doctor, and technician is aware of what their responsibilities are, things will move along with more precision. Develop simple, clear, and straightforward rules and guidelines that everyone is aware of.

Allocate Adequate Resources

Healthcare organizations should ensure that their budget includes monitoring and security for these technologies. Have a budget set aside for the ongoing operating costs, as well as security breach events. A thorough auditing and cost analysis is required to decide whether it would be cost effective to run this in-house system or hire the services of a trusted IT professional.

Healthcare organizations must ensure a balance between enabling patient engagement services, protecting their connected medical devices, and securing patient data.  Health organizations should monitor those security measures for glitches, breaches, or even potential problems to the equipment.

Conclusion

Trust is everything in any business ventures, especially for those providing healthcare services. Technological advancements have great advantages if well applied, but they must be monitored and controlled so that security breaches do not occur. Security for all data has become an important issue and many businesses are dealing with the ramifications of a breach. For healthcare organizations, these issues are even more critical. Without good measures in place, a medical device could be hacked, causing embarrassment or even a law suit for the health organization.