• Categories
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Platinum Security for Multifunction Devices and Beyond

    , Vice President, Solutions and Vertical Market Business Development

    As we quickly transition into a new year, I think back on 2017 and the rash of cyber security stories that made national and international news. Ransomware like WannaCry and NotPetya, the Equifax breach, SMBv1 and SSL vulnerabilities, etc. Even a global phishing scam used a fake Konica Minolta C224e scan to email message as bait.

    Most noteworthy in the printer industry were the major campaigns launched by various MFP and print providers. As it turned out, one of the most prolific printer security campaigns actually backfired when it was discovered that the very printer vulnerabilities described in the campaign were actually discovered on their own portfolio of enterprise printers. You couldn’t make it up if you tried. (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

    blog-cb-082917 (1)You might recognize this as the title of a song by Fleetwood Mac, a very popular band in the 1970s and ‘80s. It’s a fun song to listen to but if you think about it, what it’s saying is really motivating and inspirational as well. It may be easy to get into a rut in our everyday lives and start acting like tomorrow will be just another yesterday. But the truth is, new challenges and opportunities are always all around us. Just look at all of the technological changes that have occurred in the last five to 10 years. It wasn’t  that long ago that Netflix introduced online streaming, the iPad was first launched, e-readers changed the way we read books and Keurigs’ single serve system revolutionized the world of coffee. (more…)

    Content Management, From Our Experts, Solutions, Strategy, Technology

    , , , , , , , , , , , , , , ,

    KMBS_LogoImagine a technology of bygone days that’s still a vital communications tool today, relied upon by businesses of all shapes, sizes, industries and regions worldwide, and still needed in today’s digital transformation. No, it’s not the automobile or the lightbulb. It’s fax communications. Consider this: The latest 2017 IDC Fax Trends survey confirms the vitality of fax and its continuing growth and relevancy today.  In the survey, 75 percent of total respondents expect fax usage to grow or remain the same in the next two years while in North America it’s expected to be an even higher 88 percent! (more…)

    Content Management, From Our Experts, Security, Solutions, Technology

    , , , , , , , , , , , ,

    The Importance Of Secure File Sharing For Companies With Sensitive Data

    , Vice President, Solutions and Vertical Market Business Development

    PrintFile sharing solutions are ubiquitous now. If you run a Google search for “online file sharing services,” you’ll get pages of possibilities returned like secure file sharing, secure file transferring, virtual data rooms, Google drives and every other imaginable solution out there. In today’s high-tech world, businesses of all verticals, but especially legal, deal with sensitive data understand the importance of sharing files securely.  With the likes of Konica Minolta and Workshare file sharing solutions, we’ve come a long way in how we now protect our client and customer data. (more…)

    Content Management, From Our Experts, Security, Solutions, Strategy, Technology

    , , , , , , , , , , , ,

    Print Management: The Forgotten Revenue Stream

    , Solutions Product Marketing Manager

    KMBS_LogoGenerating a steady stream of revenue and ensuring document security are big objectives for a business of any size to survive. But many of them – especially small businesses – neglect to adopt a comprehensive means for tracking multifunction printer (MFP) usage and recovering costs. Additionally, many businesses don’t take the necessary precautions to protect and secure files across their organization. The result? They’re tossing a bundle of valuable funds into the wind while leaving their organization open to security breaches and threats. (more…)

    Content Management, From Our Experts, Solutions, Technology

    , , , , , ,

    “Moon shots are made to be landed.”
    Ginni Rometti, chairman, president and CEO of IBM

    These are exciting times across the healthcare spectrum. And nowhere was this excitement more palpable than at the HIMSS Conference, where more than 40,000 healthcare IT professionals from around the world gathered in Orlando, FL, to discuss the future of healthcare. (more…)

    Content Management, Leadership, Solutions, Strategy, Technology, Thought Leaders

    , , , , , , ,

    Predictions 2017: Envisioning the Healthcare Solutions of the Future

    , Global Director, Vertical Solutions, Digital Marketplace

    Health_imageOur country’s ever-evolving healthcare landscape makes the future very unpredictable.  Changes are occurring everywhere – regulation and legislation, reimbursement, technology, medical advances, and even the way healthcare is accessed and consumed. These changes impact how healthcare is delivered, paid for and administered. As such, it is imperative that Konica Minolta take an active role in understanding the industry and provide healthcare solutions in order to help our customers prepare for a future that will look very different than it does today.  (more…)

    Content Management, From Our Experts, Marketing, Security, Solutions, Strategy, Technology

    , , , , , , , , , ,

    acutecareprovidersIn 2013, a covered entity reported to the U.S. Department of Health and Human Services Office for Civil Rights  that one of its workstations was infected with a malware program. This resulted in the impermissible disclosure of 1,670 individuals’ electronic protected health information. The ePHI included names, addresses, Social Security numbers, dates of birth, health insurance information, diagnoses and procedure codes.

    The covered entity, a hospital in the Northeast, determined that the malware was a generic remote access Trojan that infiltrated their system, providing impermissible access to ePHI, because the organization did not have a firewall in place.

    This is a common, basic lapse in compliance of covered entities. So, let’s examine the HIPAA settlement related to this organization. to better understand how you can improve your HIPAA compliance program. (more…)

    From the Experts, Security, Solutions

    , , , , , ,

    cyber-securityGartner estimates about 6.4 billion Internet of Things (IoT) devices today, such as DVRs, surveillance cameras, and many others, all connected to the Web and all with Internet (IP) addresses. By 2020, it is expected that the number of Web-connected devices will increase to 20.8 billion.

    So, why are these numbers relevant to healthcare cyber-security?

    An IoT fact is that these devices were not designed or developed with security at their core. Further, these devices are typically not configured securely.

    IoT = Internet of Threats!

    The focus of this article is to walk through the security challenges associated with IoT devices, which are proliferating healthcare entities. We will examine four key steps that a health-care entity should take to be better positioned to address this area of emerging cyber-risk.

    Why the IoT-driven Internet Wobble on October 21 Matters in 2017 (more…)

    From the Experts, Security

    , , , , , , , , , , , , ,

    Providing the Solution To Secure Direct Healthcare Messaging

    , Global Director, Vertical Solutions, Digital Marketplace

    bizhub_c754_panel_kno2_silo_2_resized

    As the old adage goes: Don’t take a good thing for granted.

    How often do we do this in our personal and professional lives?  Probably more than we’d like to admit.  So when that good thing comes along, recognize it, take pride in it and promote it.  That’s precisely what we’re doing with our interoperability capabilities as they grow and become more relevant for more of our healthcare customers. (more…)

    Content Management, From the Experts, Security, Technology

    , , , , , , , ,