• Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • cyber-securityGartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.

    So, why are these numbers relevant to healthcare cyber-security?

    An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.

    IoT = Internet of Threats!

    The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.

    Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)

    From the Experts, Security

    , , , , , , , , , , , , ,

    Print

    Security should be a driving force and not an afterthought for senior executives and their boards.

    It is important that senior executives require that their organization formally establish a credible cyber security program. It starts with setting strategic security objectives that must be achieved by December 31, 2016, and December 31, 2017. Think near-term, and think far! The organization must address security and compliance as a life-cycle, as a process. It will lower business risk! (more…)

    Content Management, From the Experts, Security, Strategy, Technology

    , , , , ,

    bizhub_c754_panel_kno2_silo_2_resized

    As the old adage goes: Don’t take a good thing for granted.

    How often do we do this in our personal and professional lives?  Probably more than we’d like to admit.  So when that good thing comes along, recognize it, take pride in it and promote it.  That’s precisely what we’re doing with our interoperability capabilities as they grow and become more relevant for more of our healthcare customers. (more…)

    Content Management, From the Experts, Security, Technology

    , , , , , , , ,

    How ECM Keeps Data Secure

    , Director, Enterprise Content Management

    PrintThere’s no doubt about it. Every company, no matter what size or type, has massive amounts of data and sensitive information that must be kept secure and accessible only to those who need it. There are solutions and best practices you can have in place that will ensure all of your information remains safe. Having a lack of technology and protocols to organize and protect your data is a good way to set yourself up for data security issues.

    The challenge is huge.  The answer is clear: enterprise content management (ECM).

    Data security doesn’t only have to do with information being stolen or hacked; it involves knowing where your data is located and being able to access it when needed. This is especially true when information is stored and filed on paper. The frequency of documents being misfiled and lost are higher than most people want to believe — and very costly. On average, between 2 percent and 5 percent of an organization’s files are lost or misfiled on any given day.

    Now add to this compliance regulations and audits. With the increasing levels of compliance regulations and required audits, both internal and external, keeping track of necessary documents is more important than ever. This is difficult with a system heavy on hard-copy data. Paper-heavy businesses run the risk of being compromised or losing data that could result in lawsuits and other negative repercussions.

    To combat these concerns, business executives have begun to implement firewalls and disaster recovery plans to ward off outside attacks on their data.

    Having a strategy in place is the crucial key to your protection. The bloodline of your organization is your data and that is not something you can risk.

    (more…)

    Content Management, From Our Experts, Security, Solutions

    , , , , , ,

    No Rest For The Treasure Trove

    , U.S. Legal Practice Director, All Covered

    legal pic

    As high-profile breaches continue to increase and flood the news every week, so does attention to the growing concern of protecting all types of data. Hackers have discovered that one of the easiest routes to a corporation’s data is through third parties. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy

    , , , , , , , ,

    Blog-Zina (1)

    We don’t have 12 jurors to get a consensus of what challenges and trends will impact the legal profession come the New Year, but our vast experience with law firms allows us to play judge and jury to help enlighten you. Some of these may or may not come as a surprise, but they’ll be areas that the legal industry must consider to remain safe and successful.

    For instance, we believe that cybersecurity will be the industry’s biggest challenge. We’re used to hearing news reports about breaches in the medical and retail worlds – like those from Anthem Blue Cross/Blue Shield and Target – but we never hear about breaches in the legal world. Law firms have become a veritable treasure trove for hackers in the past five to 10 years. Hackers are now getting to big corporate data through much less secure routes, such as outside counsel. Law firms must deploy advanced security measures – like those offered via All Covered Security Services – that identify and mitigate the risks to their clients’ and the firms’ assets, especially personally identifiable information (PII). (more…)

    Cloud, Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , ,

    Our Prescription for Security and HIPAA Compliance

    , National Healthcare Market Manager, Solutions

    HIPAA Blog Image

    Identity theft has become epidemic in the United States — and across the world for that matter. It seems as if we hear about major breaches of personal data on a weekly basis, and now healthcare data breaches are becoming more and more prevalent. Nearly 42 million people have had their protected health information (PHI) breached since 2009.

    Over the past couple of years, a number of organizations, including Anthem Blue Cross/Blue Shield, Community Health Systems (CHS) and Xerox Healthcare, have experienced massive PHI breaches. The Anthem breach affected nearly 80 million records. A breach at the Texas Health and Human Services Commission put the state out of HIPAA compliance. And finally, CHS had 4.5 million patient records stolen by cyber criminals.

    (more…)

    From Our Experts, Security, Solutions

    , , , , , , , , , ,

    legal pic

    The golden rule for every business: “Put yourself in your customer’s place.”

    Orison Swett Marden

    More than ever, organizations are keenly aware that they can have cutting-edge products, superior customer service and the best talent but, if they are not keeping pace with their customers’ needs, they don’t have a working formula for success.

    In the legal industry, technology trends are rapidly changing. So, all aboard! The train has left the station and keeping pace is more paramount than ever.

    (more…)

    From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , ,

    Mastering the Mobile Workplace

    , Vice President, Marketing, All Covered IT Services from Konica Minolta

    15-KON-0377_Mobility_eBook_F.inddHow much time do you spend on your smart phone each day? Probably a lot. And, for the majority of us, it’s increasing. A 2014 study from mobile measurement and advertising platform Flurry revealed that on average, Americans spend 162 minutes on mobile devices each day.

    With so much time spent on smart phones and tablets, it’s not surprising that employees use their mobile devices for work-related tasks. While this trend offers a number of benefits in terms of productivity and flexibility, it doesn’t come without risks. Allowing a host of unmonitored devices to connect to a company’s network can make it many times more vulnerable to security breaches, non-compliance issues, data loss or corruption.

    So how can organizations encourage a mobile-friendly work environment while addressing these risks? If you’re going to allow mobile devices to connect to your network, you need to manage them properly, which involves an enterprise mobility management (EMM) solution.

    (more…)

    Cloud, Leadership, Security, Solutions, Strategy, Technology, Thought Leaders

    , , , ,

    Healthcare is a dynamic industry, and the pace of change relative to regulation, reimbursement and technology is rapid.  The topic of interoperability – the ability to exchange patient information between disparate systems such as a doctor’s office, a hospital and a rehabilitation center – has been top of mind over the past couple of years. (more…)

    From Our Experts, Security, Solutions, Technology

    , , , ,