Imagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today. In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)
File sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely. With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)
As more and more core parts of our clients’ business have moved online or into the cloud, they have become increasingly concerned with cyber security. Malware, vulnerabilities and hacking have become part of their most pressing concerns, not something they’re content to simply leave to the IT guys.
This rapidly evolving security threat environment calls for a more comprehensive information security approach that goes beyond systems management to active protection. Thus, we’ve evolved our managed IT services and tweaked the name to go with the change: we’re now All Covered Care – Secure and Protect. (more…)
The world is changing. It’s a fact. Think about it, in your lifetime, you may have seen computers shrink smaller yet more powerful, phones move from rotary dial and party lines to devices that comfortably fit in your hand and hold more computing power than the computers that sent men to the moon.
What if you and your law firm haven’t kept up with the times and haven’t yet embraced the right legal technology to improve your firm’s productivity? You can bet your client has and they expect you to be not only savvy with today’s technology, but to be innovative. (more…)
You may have heard about recent reports of network hackers gaining access to multifunction printers, causing headaches for IT and cyber security personnel. These stories in the news are creating a lot of noise in the industry, overstating the risks of having a printer or MFP installed within an organization’s network. Although the vulnerabilities could be a cause for concern, multifunction printer hacks are relatively harmless, causing incidents such as an MFP to “lock up” using denial of service and brute force attacks. This type of action would require an exceptional, concerted effort by a person within the firewall of an organization to attack a specific multifunction printer. Typically, a person who wanted to do cyber harm within a corporation wouldn’t spend this type of effort to attack a printing device.
It is important to understand that these perceived network vulnerabilities can only be taken advantage of from within a company’s network environment. This means that the network hacker would need to be a company or organizational employee with private network access. The devices are not vulnerable from outside the firewall or from the Internet – unless the network is vulnerable to external attacks. If that is the case, the multifunction printer should be the least of an organization’s worries. Obviously, the first course of action must always be to secure the network.
Your company has undoubtedly invested significant time, energy and money to develop intellectual property (IP) – unique ideas, methodologies and trade secrets – as well as other intangible assets – customer lists, plans for future products, non-public financial information, contracts with suppliers, software source code, and so on.
These information assets are extremely valuable, and often what differentiate you from the competition. In the wrong hands – the hands of a competitor, for example – the damage could be catastrophic.
IT professionals lie awake at night making sure their networks are protected from outside threats. And yet you don’t have to look too far to find high-profile examples of security breaches. The 2014 hacking of Sony Pictures and the release of thousands of private emails and documents was both costly and embarrassing for the company.
Perhaps, it’s another headline-grabbing event that offers an indication of what may be a more common and pervasive threat to your information assets: the release of classified National Security Agency (NSA) documents by Edward Snowden. Snowden, you may recall, was a contractor working for the NSA when he copied and released classified information without authorization. This wasn’t a hack from the outside; it was the job of an “insider.” (more…)
Our country’s ever-evolving healthcare landscape makes the future very unpredictable. Changes are occurring everywhere – regulation and legislation, reimbursement, technology, medical advances, and even the way healthcare is accessed and consumed. These changes impact how healthcare is delivered, paid for and administered. As such, it is imperative that Konica Minolta take an active role in understanding the industry and provide healthcare solutions in order to help our customers prepare for a future that will look very different than it does today. (more…)
“Change is the only constant in life,” so said Heraclitus, the Greek philosopher, around 500 B.C. As I look toward the legal environment in 2017, that saying is alive and well thanks to the emergence of robotics, other workplace of the future solutions and artificial intelligence (AI), the next critical wave of change in law firms.
What is different from Heraclitus’ time is the velocity at which change is occurring. Advancing law firm technology has pushed firms to move uncommonly fast to implement the changes necessary to garner the benefits that are possible for strategic growth and overall survival. The law firm of the future must address these coming influences that are re-engineering how work will be done. What are these influences that I believe will impact the legal arena in 2017? Here are my predictions: (more…)
In 2013, a covered entity reported to the U.S. Department of Health and Human Services Office for Civil Rights that one of its workstations was infected with a malware program. This resulted in the impermissible disclosure of 1,670 individuals’ electronic protected health information. The ePHI included names, addresses, Social Security numbers, dates of birth, health insurance information, diagnoses and procedure codes.
The covered entity, a hospital in the Northeast, determined that the malware was a generic remote access Trojan that infiltrated their system, providing impermissible access to ePHI, because the organization did not have a firewall in place.
This is a common, basic lapse in compliance of covered entities. So, let’s examine the HIPAA settlement related to this organization. to better understand how you can improve your HIPAA compliance program. (more…)
Gartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.
So, why are these numbers relevant to healthcare cyber-security?
An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.
IoT = Internet of Threats!
The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.
Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)