Are You Using Internet Explorer?

Internet Explorer Security

Internet Explorer Security

Do you still surf the Web with Internet Explorer?  If so, you’re not alone. Even after Microsoft came out with their new Edge browser in 2015, some people are still using Internet Explorer.

The Problem?

Security experts have found serious security flaws in Internet Explorer’s code. This means that if you use it, you’re opening yourself and your business up to hacking and computer viruses.

Another Problem?

Microsoft won’t be fixing this for the foreseeable future.

What Are These Flaws?

The most recent of these was found by an independent researcher named John Page. He published a proof of concept that demonstrates a flaw in the way that Internet Explorer handles MHT files. MHT is a Web page archive file format.

How Do These Flaws In Internet Explorer Create Security Issues?

If you use Windows 7, Windows 10, or Windows Server 2012 and it comes across an MHT file, it will try to open the file using Internet Explorer. This presents an easy opportunity for savvy hackers.  All they have to do is to use an MHT file containing a malicious virus and present it to you via a phishing email or other form of social engineering. Once you take the bait, the malicious virus gets into your computer/server.

Are We Safe If We Use Another Type Of Browser?

Not really. Any Windows-based system is still very much at risk from infected MHT files. This is because Internet Explorer 11 still ships with all Windows-based PCs. This includes computers that use Windows 10.

What Can We Do To Prevent Being Hacked Due To Internet Explorer Flaws?

One good thing is that Internet Explorer isn’t enabled on Windows 10 computers. For it to be enabled, you need to set it up yourself.

For now, this is the simple solution — Just don’t enable Internet Explorer. And to be completely sure, it’s best if you uninstall Internet Explorer from your Control Panel altogether.

John Page reported the issue to Microsoft on March 27, 2019, and received the following reply from them:

“We determined that a fix for this issue will be considered in a future version of this product or service. At this time, we will not be providing ongoing updates of the status of the fix for this issue, and we have closed the case.”

Unfortunately, it looks like, for the foreseeable future, that Microsoft won’t be providing a fix regarding the flaws with Internet Explorer. As we said above, the answer, for now, is for you and your staff to uninstall Internet Explorer from your computers.

Have You Heard of DuckDuckGo?

DuckDuckGo

DuckDuckGo

The self-proclaimed “search engine that doesn’t track you,” DuckDuckGo is likely the most successful search engine available when it comes to privacy and security.

While Google remains the most popular search engine by far, many users are concerned about its practice of collecting and using your personal data. Namely, Google tracks what you search (yes, everything), stores it, and uses it to provide you with a personalized user experience. Oh, and they also make a profit from it.

What Are the Specific Benefits of Switching to DuckDuckGo?

No Tracking

Of course, this is the biggie. DuckDuckGo doesn’t track you or what you look up online. All searches are 100% anonymous.

No Ads

Google tries to trick users by situating ads at the very top of the page — ads, by the way, that look like search result listings. The only difference is a little box that says “Ad” next to the web address. DuckDuckGo foregoes ads like these, generally starting at the very top of the page with your first search result listing.

Minimalist Interface

Speaking of no ads, DuckDuckGo provides an overall clean and minimalist appearance. Like Google’s results pages, you can toggle between “Web,” “Images,” “Video,” etc. at the top. You can also filter results by region, “Safe Search” mode (for strict or non-filtered adult content), and time period.

Non-personalized Search Results

“Why wouldn’t I want personalized search results?”

Well, you might. But the advantage of not having personalized results is that you’ll see exactly what everyone else sees. In other words, when you search “cocktail recipes” in Duluth, Minnesota, you’ll get the same results as someone searching for “cocktail recipes” in Lyon, France.

Seriously, What’s Actually So Bad About Search Tracking?

Many people’s argument against worrying about Google and other tech giants tracking them (hi, Alexa) is this: “I don’t do anything bad or shameful on the Internet, so why should I care if I’m tracked and my data’s stored?”

That may be true. Certainly, for some, the sheer fact that you’re being listened to, your movements are being tracked, and essentially everything about you (from your age and income to your shoe size and favorite local bar) is being stored … well, it’s alarming and disturbing.

But if that still doesn’t make you ponder the importance of personal data tracking and storing, consider this: Google is using your data to get rich, like, really rich. They’re monetizing everything you do through their platform and making billions in annual profits as a result. The stuff their using? Your shopping habits (Google Express), your online searches (Google Search), your personal conversations (Google Assistant and Google Hangouts), where you go (Google Maps), the news you read and your political leanings (Google News), and much more.

To make matters worse, in many ways, they’re being less than honest about their tactics. For example, their so-called “incognito” mode is far from fully private. Your employer and ISP can still track your searches when you’re in incognito. Furthermore, Google documents you’ve “deleted” and searches you’ve “cleared” aren’t really gone. Google stores them … indefinitely.

Consider a Switch to DuckDuckGo

There’s no doubt that companies like Google provide useful services to individuals and businesses of all kinds. Their search engine is definitely useful as well. Extensive, highly complex algorithms can help you find exactly what you’re looking for, often faster than other search engines.

But if you’re at all concerned with privacy and security for your business and/or at home, consider a search engine switch to the up-and-coming DuckDuckGo. Set it as your homepage, try it out, and see what you think.

Should CMOs and CIOs Partner On Strategic Information Technology?

CMO Technology

CMO Technology

For as long as the roles of CMO and CIO have existed, their work has rarely overlapped. CMOs focused on the company’s marketing efforts while CIOs stuck to the technology side of the business. But in today’s digital world, the hard lines that once separated marketing and tech have dissolved. Now, any business that wants to remain competitive must engage in digital transformation—which requires strategic use of information technology incorporating both marketing and IT. That transformation can only be effective if CMOs and CIOs work together.

The Importance of Digital Transformation

According to the Altimeter Group, digital transformation is “The realignment of, or new investment in, technology and business models to more effectively engage digital customers at every touchpoint in the customer experience lifecycle.” The goal of digital transformation should be to better provide value for the client or customer and to improve competitiveness. To achieve these ends, a strategic approach to information technology must be utilized. And for that to happen, CMOs and CIOs must communicate and strive together in seeking the same goal.

The vast majority of businesses were not founded with digital technologies in mind, and even less were created from day one to take advantage of the digital platforms that have emerged in the past decade, much less those that continue to spring up on a seemingly daily basis.

Chances are, as a CMO you have probably already been thinking long and hard about how your marketing efforts can incorporate the vast array of digital technologies available. Just some of the areas where digital transformation could deliver notable improvements include:

  • Mobile computing
  • Social media
  • Big data
  • Cloud features
  • Data privacy compliance
  • BYOD
  • Data security
  • And more…

Of course, to achieve the kind of transformation that you want and need, certain obstacles must be overcome. You have to determine where you are, where you want to go and how you are going to get there—all of which is best facilitated through the partnership of the CMO and CIO.

Partnership Between Marketing and IT Facilitates Competency

The terrain of digital platforms is difficult to navigate for even the most experienced professionals. To conquer this terrain and make it work for your business, it only makes sense to utilize all the resources at your disposal. Between building, running and managing the digital tools necessary to reach and retain customers, and ensuring that marketing efforts are as well integrated with new technologies as possible, there is simply too much required for one department—marketing or IT—to do alone.

Both CMOs and CIOs face unique challenges from the digital technology field. Some of these include:

Challenges for CMOs

For CMOs, the number of existing and upcoming digital technologies can be overwhelming. There are so many areas that must be considered to achieve competitiveness, including:

  • Buying appropriate technology solutions
  • Managing the technology stack
  • Creating infrastructure for technologies
  • Integrating new technologies with existing enterprise solutions

You could be the most effective CMO in the world when it comes to marketing, yet feel completely in the dark when it comes to how to manage the nuts and bolts of new technologies. That is why different departments exist in organizations—because true competency and skill take years to develop, and no one is capable of being an expert in everything.

Challenges for CIOs

The technology your business needs to operate and serve your customer base is the focus of the CIO. However, the marketing end of the equation is rarely an area where the CIO will have much expertise. Some of the things that the CIO may struggle with include:

  • Continued awareness of company efforts to reach and retain customers
  • Understanding the value proposition presented by the company to the client or customer
  • Needed adaptations in marketing messages as new information comes in
  • Which technologies are most effective for marketing based on company needs

CIOs have their own challenges to contend with as they strive to keep the ship running and determine what the best technology solutions are among an increasingly vast array of options. If they are not brought into the marketing conversation, there is a real risk that the left hand can become detached from the right—possibly even to the point where the CMO and CIO are working at cross purposes.

The benefits of CMOs and CIOs partnering quickly becomes apparent as your company embraces technology. Marketing has never had so much reach as it has today with digital platforms and real-time data. But utilizing that technology requires expertise that is found in the CIO and the IT team.

CMO and CIO—In it Together for the Long Haul

CMOs and CIOs share the same ultimate goal—the success of the organization for which they work. Success in today’s digital environment means utilizing appropriate technologies to keep the business strong, competitive and attractive to the customer. To obtain success requires a partnership between the CMO and CIO to identify areas for improvement, move forward with effective action that will achieve improvements, and to continue to adapt to the rapid changes that are inherent in today’s business world.

What Is Google G Suite and What Are the Benefits for My Business?

Google G Suite

Google G Suite

There are certain functions that every business requires — word processing, analysis, presentations and calendaring — and Microsoft Office used to be the default option for businesses of all sizes. Over the past few years, Google’s G Suite has become an increasingly attractive option for small businesses due to the reasonable price point and the cloud-based software that allows you to access your information from nearly any location with internet access. Does Google G Suite have everything that you need for your business, or is there some missing functionality in Microsoft’s productivity suite that you still need?

More Than Just Email

Google’s G Suite email provides you with some extremely helpful: an ad-free version of the user-friendly Gmail interface that can be customized for your business with your domain name and more. When you consider that the email accounts are fully integrated with Google Calendar for scheduling meetings and events, Google Drive for storage and more — it’s easy to see why small to mid-size business owners and even enterprises are adopting Google’s G Suite. The intuitive interface and friendly commands allow employees of all ages and skill levels to quickly become productive, too.

Is Google G Suite Right for My Business?

Microsoft’s suite of office productivity software is top-notch, but many businesses find that it can be overly complex for their needs. G Suite includes the most often-used functions without the convoluted approach that you may find in Microsoft’s flagship cloud-based apps. One thing that continually confounds Microsoft Office users is their email storage within Outlook — it’s simply not clear where your emails are being stored and there is a solid possibility that your storage file can become corrupted. With Gmail, you have virtually unlimited storage space for your emails and no functional limits to rapidly searching years worth of information. However, if you’re using advanced mathematical or analytical capabilities, you may still need to invest in Microsoft Office 365 for your business.

Why Should I Pay for G Suite?

Sure, the base apps in Google’s office productivity suite are free on their own. Does it truly make sense to spring for the paid versions? It depends on the needs of your business, but there are some compelling reasons to obtain the paid version of the apps which are collectively known as G Suite.

  • Advanced administrative functions across multiple users, similar to Microsoft’s account-based features
  • Private and secure collaboration keeps your digital conversations safe
  • Add legitimacy to your business with a customized domain name for your emails
  • Converge your cloud-based data and document storage on Google Drive
  • Take advantage of the exceptional (and human!) customer support options with G Suite

Is Google G Suite right for your business? If you are looking for a reasonably-priced, robust suite of office productivity software the answer may be “Yes”. If you need to take advantage of advanced mathematical analysis or more complex use-cases, you may want to consider the more traditional option: Microsoft Office 365 for Business.

Canada Taking Facebook to Court

Facebook Court Canada

Facebook Court Canada

On Thursday, April 25, 2019, notable news broke that Canada is taking Facebook to court. Daniel Therrien, Canada’s federal privacy commissioner, gave a joint news conference with Michael McEvoy, the information and privacy commissioner for British Columbia. In this announcement, Therrien asserted that the existing accountability requirement enshrined in Canadian law, while meaningful, “is not sufficient to protect Canadians from companies that do not behave responsibly”.

Therrian went on to explain that as Canada continues working to refine its privacy laws, his office is taking Facebook to court based on the company’s response. He’s seeking a court order “to force Facebook to correct its privacy practices”.

How It Got to This Point

If you’re thinking that sounds like an aggressive move, you’re not alone. How did it get to this point? Tensions had been brewing for some time. Therrian’s office came to the conclusion some time back that Facebook failed to protect privacy at the corporate level. The commissioner’s office then launched a thorough investigation into Facebook’s privacy practices. The investigation lasted over a year, and its conclusions included that Facebook had violated Canada’s privacy laws in numerous ways. Much of this relates to a massive user data leak, one where the data was used for political gain through a firm named Cambridge Analytica.

The Data in Question

The privacy commissioner determined that at least 276 Canadians installed an app back in 2013 that violated privacy law, as David Akin reports. The app harvested the users’ data, but it didn’t stop there. It went two steps further, harvesting those users’ friends’ data as well as the data of their friends’ friends. In total, concluded the commissioner, around 650,000 Canadians had their data compromised. This information was stored and eventually shared with UK firm Cambridge Analytica.

Cambridge Analytica has made the news before. It’s the firm that assisted the Donald Trump campaign in targeting voters. There’s nothing wrong with using research to target voters, of course: all serious US presidential candidates follow similar tactics. The problem was with how the data that fed the research was collected. 650,000 Canadians and many more Americans had their data misused.

Facebook Rebuffs the Privacy Commissioner

Under current Canadian law, the privacy commissioner’s only recourse is to recommend that Facebook change its ways. The office made this recommendation, and Facebook said “no”. The company rebuffed the government’s recommendations and made no changes as a result of them.

The problem here is straightforward. Facebook (and other private companies) essentially becomes a self-policing organization. If Facebook determines it has not violated the law, then it can continue to operate no matter what the privacy commissioner concludes.

A Problem with Existing Law

Therrian said that he doesn’t think Canada’s privacy law makes sense. In his view it’s problematic that “a private company, with its private interests, can say to a regulator, ‘Thank you very much for your conclusions on matters of law, but we actually disagree, and we will actually continue as we were.’ It is completely unacceptable”.

Therrian is pushing for the legislature to amend its policies so that the privacy commissioner’s office has order-making power so that its conclusions are binding for private companies. He points to other countries that are rumored to be levying fines against Facebook for its privacy violations. It’s widely reported that the USA may fine Facebook up to $5 billion. Canada has no such ability under current law.

No Real Accountability in Current Law

Companies are accountable for the information they hold on behalf of users, which is an important safeguard. Therrian’s complaint is that current law states that companies are accountable for this without giving the government any mechanism for enforcement. An accountability law that no one can enforce accomplishes nothing.

It’s Up to the New Legislature

Therrian concluded his comments by encouraging the new legislature to undertake updated and enforceable legislation in their new session. He hopes this legislation will continue to hold companies accountable for their handling of data while giving regulators real power to enforce that this is done.

A Response from Facebook

Facebook, for its part, claims to understand that it has an obligation to protect users’ private data. Erin Taylor, communications manager at Facebook, stated that the company was cooperating with the commissioner. In a prepared statement she remarked, “We are disappointed that the [privacy commissioner] considers the issues raised in this report unresolved”.

What Happens Next?

The path forward is not completely clear at this time. Facebook will, for the time being, continue operating unaffected in Canada. The company is not compelled at this point by Canadian law to make any changes, though it has already made numerous changes to its privacy policy as part of the blowback from this scandal.

The results of the coming court case are anyone’s guess at this point. The federal commissioner’s footing is weakened, of course, by his own admission that the law grants him no authority to enforce action against Facebook. Even if no other positive outcome results from the lawsuit, the two privacy commissioners have at least gotten the issue into the public eye.

Then there’s the legislature, which is being pushed to fix this privacy enforcement loophole through new legislation. It’s too early to say how likely this action is, but the publicity of the commissioners’ actions last week may spur legislators to action.

Four Amazing Tips on Using iPhones and iPads in Your Business

Ipad in Business

Ipad in Business

Coordinating interactions between office staff and remote workers can be challenging. One way you can cut through a lot of the confusion that arises when trying to keep everything in sync is by leveraging your worker’s iPad and iPhone devices. It is a way of using something that is already in their arsenal at a minimal cost to your business.

There will not be a focus on any specific device versions, mainly because it may already be yesterday’s news by the time this article reaches your eyes. You can execute these suggestions successfully even if you have some employees who still cling to their iPhone 7 or iPad Air 2. One thing Apple has always offered powerful devices capable of being used in a variety of ways for business. If they are well-maintained and functional, you can implement the ideas that best suit your work culture.

1. Synchronize Accounting

Having a reliable means of tracking financial transactions related to business functions is a crucial component of any enterprise. The App Store provides access to a variety of accounting apps that can be synced to your company software to send invoices and track payments from suppliers and vendors. All workers can see the changes in real-time and keep all ledgers in sync.

The apps also have features allowing management of multiple business accounts and any related transactions between them all. Some provide reports with visuals giving you a quick overview of your current liabilities, and where the company may be making heavier-than-needed expenditures. Workers are not bound to their laptops when it comes time to issue an invoice or product documents needed for tax purposes.

2. Maintain Documents and Scheduling

Your employees can create memos or document the details of a significant business transaction using a variety of document creation tools. Their iPad or iPhone can be synced with popular Microsoft Office applications like Excel or any of your favorite G-Suite tools.

Workers would only need to log into a OneDrive business account to open a Word document created earlier on a MacBook or add the settings of the company’s business Google account to their device.

Their iPad or iPhone can also be coordinated with a calendar to send notifications about upcoming events. Imagine having all your staff show up on time to a meeting or continuously meeting project deadlines despite being in different locations.

3. Create On-The-Go Presentations

An iPad can be used to create a visual presentation showcase anywhere outside of the office. Apps like Keynote let workers share ideas with you and other executives in a creative and organized fashion. Their iPhone can also be transformed into a hand-held digital brochure to show off at conventions and other business events.

Instead of lugging around a ton of paper brochures that can easily be lost, staff can show off a digital version to a business contact that can be forwarded as they collect their information for follow-up. Other iOS apps like CamCard can be used to keep up with all the names and emails of potential future clients at trade shows and expos.

4. Stay Connected and Engaged

Are you concerned that your remote workers might be feeling a little disconnected from the office staff? There are iOS apps available for platforms like Trello and Slack that make communication and project coordination a smoother process.

The apps provide you with the same functionality that peers in the office have on their laptop or desktop. That means you can easily synchronize workflows and maintain communication about upcoming deadlines for tasks related to various projects. Their iPad or iPhone devices become conduits for hosting online video chats with co-workers.

Recommended Support Tools

You may decide that investing in iPhone or iPad devices for your workers would be a sound investment. We suggest investing in the following tools to effectively leverage them for your company.

  1. Stylus — Look for devices like the Apple Pencil that enhances note-taking ability during online meetings. Workers can add comments to PDFs, create charts and graphs, and more.
  2. Keyboard — Investing in a sound keyboard gives employees more comfort when they need to do a lot of typing.
  3. Case — Many cases can protect devices from accidental damage and let workers adjust them to a more comfortable angle for heavy keying.

Do your research into apps and other support devices that will enhance iPhone and iPad business usage. We think you’ll be happy at your decision to turn them into one of your company’s most potent occupational tools.

Can You Legally and Ethically Monitor Your Employee’s Online Activities?

Monitor Employees Online

Monitor Employees Online

Monitoring employee behavior is nothing new, as supervisors have been stalking their staff for generations. What has changed is the degree to which employee behavior is transparent in the workplace, with sophisticated monitoring solutions in play one could argue that nothing is truly sacred when it comes to being monitored by your business. It is standard practice for all phone conversations to be recorded in a customer service setting, but this is expanding dramatically into detailed tracking of websites that are visited and even emails that are being sent and received. Employees may not often think about the fact that personal emails that are being checked on business-issued phones or laptops are fair game for tracking — but they are. Whether this tracking is meant to identify underperformers or to protect the IP and sensitive data of the organization, there are laws in place to protect both the employer and the employee.

What Are You Trying to Accomplish With Monitoring?

When you are considering monitoring your staff members or contractors, the most important question to ask yourself if what you’re trying to accomplish. Do you have some underperformers, and are trying to gather information about their work habits? Do you suspect corporate espionage? Do you simply want to protect your organization from the productivity drains that occur when staff members spend an inordinate amount of time on social media? Understanding the business driver will help you more fully define the legal reason for gathering this type of information from your employees. You might even have someone who seems to be absent — even though they are technically “at work” every day. Monitoring of their access badge would fall under these same rules for electronic monitoring. As you’re defining your monitoring program, also look at the success metrics. Are you attempting to reduce the time spent on social media? If so, you also need to have in place a way to communicate that employee behavior is outside the expected norms.

Employee Notification of Online Activity Tracking is Crucial

The majority of employees are simply going about their daily work, unconcerned that their employer could be potentially tapping into conversations on email or their phones. These individuals probably have nothing to hide, because they are being good stewards of time and resources and only doing a little light shopping at lunch, for instance. Others might be extremely concerned and secretive about their online behavior, going so far as to surf in incognito mode or clear out browser activities when they close down for the day — never realizing that these steps probably don’t make a bit of difference in whether their employer can still see their activities. If your organization plans to do any kind of monitoring at all, it should be detailed for employees as they are onboarded. A safer practice would include asking employees to sign the most recent version of the policy on an annual basis to indicate that they understand and agree with the monitoring that is being done.

Handling Second-Party Notifications of Recorded Activities

In many states, there are legal standards that require that both parties to a conversation must be notified and agree that the tracking may take place before the activity is deemed legal. There are some workarounds such as a conspicuous posting on your website or an email signature that warns all parties that continuing the conversation with a staff member is considered their agreement to recording the messages. However, this remains a legal challenge in many states. As the government begins to look more deeply at personally identifiable information (PII) and exactly who has access to that data, you might run into additional legal challenges due to the various data breach notification statutes that are currently in place in 48 states.

IoT in the Workforce

Perhaps on of the most controversial conversation around employee monitoring is around connected devices, such as wearables. These items can be capturing data that is extremely personal to the employee, much of which would be considered protected health information (PHI), including things such as heart rate, miles walked, calories consumed and more. Mobile phones that are provided by the company could easily contain apps that would record the information. If you’ve installed keystroke logging on these phones, are you capturing more personal information than you intended?

While you may feel as though you can list the key legal concerns with employee monitoring, the best course of action is to engage an attorney to ensure that you are staying clear of any legal implications of your actions. This is especially true before you take action based on your monitoring findings, such as a formal employee write-up or termination. While triggers can be written to turn monitoring into an effective tool to ward off data loss, there are still plenty of pitfalls to consider before creating a widespread online activity monitoring program.

How AI Is Saving Orthopedic and Sports Medicine Practices An Hour Each Day

AI in Orthopedics

AI in Orthopedics

The red tape that normally surrounds the administration of patients in the healthcare industry is a leading cause of physician burnout, as many data experts have noted. Healthcare providers are responsible for a growing volume of paperwork and other off-patient work, and the trend towards greater bureaucracy seems to be inevitable. By some estimates, one hour of bedside patient care results in two hours of paperwork post-visit for the average physician.

Fortunately, AI-driven resources are finding new avenues for physicians to spend less time in front of mounds of paper. With new technology in tow, there are now new ways to administrate patient encounters. Physicians are able to stay in compliance with watchdogs, take smarter notes on patients and provide better overall care.

AI in the Medical Marketplace

One such technology, Suki, is a voice-enabled digital assistant that is made specifically for professionals in the medical industry. Suki is designed to help doctors with patient documentation, giving them more time to focus on the bedside. The technology has the ability to respond to complex voice commands, using those commands to create notes that are clinically accurate. The program also has the ability to enter those notes directly into an electronic health record (EHR) system.

No voice technology is able to completely replace direct input, but it does reduce the need for it immensely. AI also reduces the instance of human error in the data input stage during medical transcription and dictation. The result is a significant time savings when creating and organizing medical documents.

Where the technology succeeds most is in leveraging AI to “teach” the program the idiosyncrasies of the physician that is using it. Eventually, the Suki that is used by an individual physician will become a digital scribe that is unique to that person, fully capable of note taking with very low input from the physician himself. Suki is based on successful commercial digital assistants like Alexa, but the nod to the medical industry is an essential one. Currently, commercial digital assistants do not have the ability to learn from esoteric medical terms or organize records in a way that is specific to medical watchdog standards.

Other speech recognition systems that are focused on medicine include Sopris Health, Deepgram, Saykara, Dragon Medical Practice Edition and Nuance.

The Link Between AI and EHR

Digital assistants for the medical industry must be specific to the industry for another reason – the mandatory use of the EHR in the industry. HIPAA standards now require EHRs to form a significant part of each provider’s data infrastructure. Any note-taking or administration program that claims to help the medical industry must follow the protocols set forth in HIPAA standards.

The fact that Suki and other AI driven technologies kept these standards in mind allowed them to more easily implement new features that are relevant to physicians. These features include customer-facing options such as imaging and X-ray integration and supply-side improvements like improved end-user response times.

EHR technology gives the physician room to dictate data on a patient while in the room seamlessly, but only with the right process in place. Having a digital assistant that is geared to dictate medical records saves huge amounts of time. Many doctors in the orthopedic and sports medicine industries report that they are saving up to an hour of administration time per patient.

With AI and EHR in tow, doctors have the choice to document the patient during the visit or after. This saves a huge amount of time during the initial visit, a time that is usually spent gathering the entire patient history. Experts believe that doctors will save even more time when patients begin to become aware of these technologies. As patients become more open to their use, more doctors will implement them with greater levels of comfort.

Patients can also take command of the notetaking process when AI and EHR are used correctly. As notes are being taken, some doctors actually encourage patients to chime in if there is a point of clarification or some information that has not been considered.

Patient and Clinician Satisfaction

It is well known that doctors are judged by their bedside manner just as much as their technical skill or knowledge of medicine. One of the major benefits of AI is the ability to reduce physician burnout, a phenomenon that reduces the ability of physicians to present a warm, empathetic bedside manner.

Initial studies on Suki show an average note completion time of 1.5 minutes, down from 4.8 minutes per note without Suki or any other voice assistant tech. This adds up to approximately one hour of time saved per day. More importantly, it increases the time that doctors can spend truly connecting with patients during the encounter.

Future Success

Although the advantages of AI are well documented, its success depends on a number of factors. Experts have stated that vendor support is essential for more widespread adaptation of the technology. There must also be more attention paid to the unique needs of the physician practice.

Managing Your iPhone and iPad Business Notifications (User Guide)

iphone and ipad notifications

 

All notifications are not created equally, especially when it comes to business hours. That becomes apparent when sifting through multiple items on your iPhone or iPad. You want the alert from a peer letting you know about the receipt of a critical signed document, but not constant annoying pings about the latest updates to Candy Crush.

With a few tweaks to your iOS settings, you can avoid these annoyances in the future by taking control of what pops up while you are working.

Make Use of Do Not Disturb

There are times that you want to eliminate all distractions during business hours. It could be while preparing to sit down with a potential new client or when you are going over the implementation of a new organizational strategy with your employees. The last thing you want is to have your iPhone or iPad continually going off at critical points.

The latest iOS 12 updates make it a snap to go into your settings and silence your notifications during crucial junctures like these. Just swipe up from the bottom of your iPhone screen (or down from the top right on your iPad screen) to bring up a moon icon. All you need to do is click it to silence all your notifications.

Pressing and holding the moon icon for a few seconds more brings up additional options that control how long you silence your notifications. You can also press the “Settings” button at the bottom of the list for more detailed control over the length of your DND period.

Manage Alerts Through the Notifications Center

The Notifications Center allows you to make more permanent changes when it comes to managing your alerts. You can activate the Notification Center by swiping down from the top of your iPhone screen (or the top left/center of your iPad screen). Notifications can be viewed as a single entity or in multiple batches.

There are two ways to activate notification management. You can drag the notification from left to right and reveal the “Manage” option. Selecting “Manage” provides you with new options. Or, do a long press on a notification to bring it to the forefront. Select the three-dot icon at the top to bring up the same options.

  1. Deliver Quietly — You will still be able to see your notifications within Notification Center but will not see them on your lock screen. The alerts will also not make sounds, show a banner, or badge the app icon.
  2. Turn Off — Pressing this button allows you to turn off all notifications from a specific app.
  3. Settings — Pressing this button takes you to the notification settings for the app that sent the alert.

Going this route allows you to silence some notifications while allowing others through. That means essential Skype meeting notifications still gets seen, while updates on your favorite sports team wait until you have time to review them.

Controlling Notifications Via Settings

You can also maintain your alerts the old-fashioned way through your settings icon. Clicking on it will bring up a list of options you can select, including one labeled Notifications. The Notification Style section allows you to choose any app and view selections enabling you to control when and how it sends you notifications. Those choices include:

  • Allowing or disallowing notifications from an app
  • Choose the way you wish to be notified by an application
  • Change the appearance of banners that appear for alerts

Imagine that you have separate apps controlling your business and personal emails. You can use the settings to prevent alerts from your non-work email account while still allowing business emails to come through. The Settings section also let you decide whether you want to group important notifications or see previews of relevant messages.

Thanks to the iOS 12 update, you have a variety of possibilities at your fingertips. So take some time to explore your notification controls and ensure that only essential items come through during business hours.

iphone and ipad notifications

UEFI Rootkits

UEFI Rootkits

UEFI Rootkits

Whether you are a cybersecurity expert or not, there are some security risks that every business leader needs to be aware of—and UEFI rootkits definitely fall into that category. These nasty computer viruses are uniquely dangerous to your computer systems because they do not get wiped out when you reformat your hard drive or reinstall your operating system. Instead, they stick around in your computer’s flash memory and pop right back up again when you try to start using the machine. It is important that everyone be aware of UEFI rootkits to minimize their spread and limit the damage they can do to your systems.

UEFI Basics

To understand what makes UEFI rootkits so difficult to deal with, you first need to understand the basics of how modern computers are set up. You have probably heard the term BIOS before. The basic input/output system was the firmware used for decades to start your computer up, among other functions. But in recent years BIOS was replaced by Unified Extensible Firmware Interface or UEFI. UEFI is also used to boot up your operating system, among other tasks. Because it needs to be able to start up everything else, UEFI resides in your flash memory—the same place that the UEFI rootkit resides once it infects your computer.

What UEFI Rootkits Do

The genius of the UEFI rootkit is that it is placed in the one area where you are unlikely to get rid of it using normal security measures. It infiltrates your UEFI on your flash memory. The specific location of the virus is ideal to keep it coming back again and again. The antivirus does not find it. Even wiping the hard drive does not touch it. Only a very targeted effort to remove it from your UEFI will eliminate the problem from your machine.

The Challenge of Getting Rid of a UEFI Rootkit

For most computer users, the basics of security begin with running antivirus and antimalware products. But the majority of these products will not even look at your UEFI, which means they are not going to find a UEFI rootkit. The next step, which is typically considered quite drastic, is to wipe your hard drive and reinstall your operating system. Almost every computer virus can be eliminated by taking this step. Once you wipe the hard drive, you wipe out the virus. Yes, you have to go through the inconvenience of reinstalling everything—which can be very inconvenient, depending on what your business computers have installed and the kind of work you are doing. But it is usually a surefire way to eliminate a virus.

What can be so frustrating for businesses is that even taking the drastic measure of wiping and reinstalling does not solve the problem. You can even swap out the hard drive and install a brand new hard drive. When you consider that applying all of these fixes could take days for companies with tens or even hundreds of computers, you can appreciate how maddening it would be to have the problem persist.

What Can Businesses Do to Prevent UEFI Rootkits?

There are a few things that businesses can do to prevent these nasty viruses from showing their ugly heads:

1. Educate those that need to know.

Whatever IT staff you have, even if it is just a computer-savvy employee that keeps things going smoothly, should be educated on UEFI rootkits. When people know about them, it becomes much easier to address the problem. If you have taken the normal steps to eliminate the virus and it keeps popping up, you could have a UEFI rootkit problem on your hands.

2. Consider getting new hardware if you do not have Secure Boot capabilities or something similar.

Secure Boot is a solution used on modern computer systems to prevent unauthorized access to the firmware. It requires that anything attempting to make a change to the computer’s firmware have a security code to make changes. If it does not have the security credentials, no changes can be made. Older machines do not have Secure Boot capabilities.

3. Verify that your Secure Boot configuration is properly set up.

Secure Boot is not a fix all. It does need to be properly configured to work as intended. Make sure that all of your Secure Boot systems are properly configured to prevent anyone from accessing your firmware when they should not.