About mhadmin

This author has not yet filled in any details.
So far mhadmin has created 46 blog entries.

Why is HIPAA & Cybersecurity Important?

Cybersecurity for Your Medical Office Cybersecurity is a big issue these days.  Data breaches occur all the time.  Because patient data is extremely valuable to criminals, breaches in medical offices are occurring with alarming frequency.  You have probably heard about the substantial breaches involving large providers such as Anthem and Blue Cross, but there are many, many smaller breaches that don’t make the news. While smaller healthcare practices have always had to comply with HIPAA, proactive government enforcement in the past has been lax. Categories of HIPAA Breaches Laptops and Portable Media = 40% of all breaches Inappropriate Access to Patient Information = 30% of all breaches Sending PHI through Unencrypted Email = 10% of all breaches Hacking = 10% of all breaches Loss of Backup Tapes = 10% of all breaches Enhanced HIPAA Enforcement This has now changed due to the epidemic of breaches we are currently seeing. The Federal Government has significantly stepped-up HIPAA enforcement, which comes in many forms – proactive examinations, Meaningful Use payment audits, breach investigations, complaint inquiries, etc.  If you’re responsible for your practice’s IT or compliance this couldn’t come at a worse time. You’re already dealing with ever-increasing network security concerns such as Ransomware, let alone the growing

Why Should You Get On The Cloud?

A recent article by The Guardian (UK) states that the cloud industry is set to see a growth of around 30% soon. But many small and medium business owners are still struggling to make sense of the cloud and how it can benefit them. If you are one of them, then here’s what’s in store for you when you migrate to the cloud:1. Connectivity - Being on the cloud gives you unparalleled connectivity to your data—from anywhere and at any time. All you need is a device that can connect you to the web and you are set!2. Save On Hardware Costs - Using the cloud for certain programs spares you the cost of investing in specific hardware. Even devices as simple as your smartphone or a tablet can help you access those applications so you don’t have to spend money on dedicated hardware. Studies have shown that cloud users end up enjoying as much as a 17% IT cost reduction compared to their non-cloud counterparts.3. Cloud Enables SAAS - The cloud allows you to use software as a service. Microsoft 365 is one such example. When you use software as a service, you enjoy certain benefits such as more regular

Has Your Website Been Optimized for Mobile Users?

Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time to make the switch this year, you may want to reconsider in light of new research. A recent study revealed that around 40% of prospects move on to a competitor if they have a poor mobile experience. How prepared is your business for this change? Well, if you are just starting out, the following checklist will help...1. Make sure your mobile site is different from your regular website - While you must stick to your branding standards, your mobile website should be simpler than your web version. The reason being is that complicated designs that load well and look good on computers are often distorted when accessed through a mobile device. Plus, mobile surfers don’t really have the time to sift through a lot of content. Bottom line: your website’s mobile friendly version should be short, simple and sweet...offering your viewers the most important and basic sections of your website.2. Option to access the

4 Essential Pieces to Any Small Business BYOD Strategy

4 Essential Pieces of Any Small Business BYOD StrategyBelieve it or not, once upon a time, kids at the bus stop didn’t have cell phones and the mobile device strategy of many businesses was typically "you’ll take what you’re given, refrain from using it for any personal use, and the data may be scrubbed clean whenever we please."We’ve come a long way.  Today, businesses really have no choice but to let employees use personal devices for work purposes.  Blurred lines now make it difficult to differentiate between what is professional and what is personal.  A company or organization may partially pay for an employee’s tablet computer or smartphone, but that same device is used to upload photos to Facebook or download torrents of this season of Game of Thrones.Naturally, security and privacy issues are a concern since these devices sync to the company network.  Larger corporations may be able to hire IT support or produce sophisticated BYOD guidelines for employees to adhere to, but smaller businesses have limited resources.In fact, recent surveys suggest that the small business sector is doing very little to preemptively prepare for potential network security risks that could arise with the use of BYOD devices.  This could

Breaking News: Downtime Kills Small Businesses

Breaking News: Downtime Kills Small BusinessesDowntime is bad news for any business whether big or small.A recent two-hour New York Times' downtime occurrence sent Twitter ablaze and their stock price plummeting.Google going down for one to five hours resulted in lost revenue up to $500,000 and decreased overall web traffic by 40%.We know what you're thinking. Holy crap, Google makes $100,000 an hour? Yeah... insane, huh?While the hourly cost of downtime for a small-to-medium sized business won't be nearly as large as that astronomical Google figure, downtime is often more detrimental to smaller companies. Smaller enterprises are more susceptible to downtime and are neither large nor profitable enough to sustain its short and long-term effects.Downtime Leads to Unhappy/Unproductive EmployeesEven the happiest of employees become dissatisfied when they can't perform basic day-to-day job functions or properly service customers or clients.While some employees may use downtime as an excuse to lean back, put their feet up, and comfortably collect their hourly pay, we're talking about those employees who come to work to actually work.And don't forget your IT guy or tech crew. They can't necessarily sit back and twiddle their thumbs when downtime occurs because they're typically taking the brunt of the storm.

How to Trim the Fat From Data Center Costs

How to Trim the Fat From Data Center CostsWhen smaller businesses look to cut costs, they commonly take shortcuts that are risky to their bottom line. They may go out of their way to avoid upgrading dated hardware, buying software licenses, or increasing bandwidth. In some instances, they layoff in-house IT support, or avoid hiring new help, even as the business grows. This often leads to a very cranky and disgruntled "IT guy" with a bad attitude as he or she runs around the office putting out one fire after another – feeling overburdened and underpaid.Operating even the most basic data center today means recurring operating expenses that aren't affordable for most small-to-midsize businesses.Unfortunately, SMBs just have to accept that keeping their data center alive and kicking means significant overhead and expenses. That's just the way it is.Or is it? There are actually several ways to reduce data center infrastructure costs without sacrificing the efficiency of your network, server, and applications, or the sanity of your IT guy.Rent, Don't Own: A data center needs experienced people and a virtual, always-on, 24/7 staff of administrators, networking experts, database specialists, systems managers, and dedicated IT personnel monitoring the network. From an economic perspective,

Is That A Business Continuity Plan in Your Pocket…Or A Bunch of Jargon?

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon?Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity. These terms are commonly used interchangeably, often resulting in confusion. In an effort to alleviate some of this confusion, let's describe each physical process. You will see an overlay among all three, although they are each different processes.Backup – In IT lingo, the most basic description of backup is the act of copying data, as in files or programs, from its original location to another. The purpose of this is to ensure that the original files or programs are retrievable in the event of any accidental deletion, hardware or software failure, or any other type of tampering, corruption and theft.It's important to remember that the term "backup" refers to data only and doesn't apply to the physical machines, devices, or systems themselves. If there were a system failure, disk crash, or an onsite physical disaster, all systems would still have to be replaced, rebuilt, and properly

Is That Email a Phishing Scheme?

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing attempts are often so well-disguised that they escape the eyes of a busy email reader. Here are a few tips that help you identify whether that email really came from your bank or is another attempt at defrauding you…1. They are asking for personal information - Remember, no bank or financial institution asks you to share your key personal information via email, or even phone. So, if you get an email where they ask for your ATM PIN or your e-banking password, something’s amiss.2. The links seem to be fake - Phishing emails always contain links that you are asked to click on. You should verify if the links are genuine. Here are a few things to look for when doing that: Spelling - Check for the misspellings in the URL. For example, if your bank’s web address is www.bankofamerica.com, a phishing scheme email could misspell

Data Loss Can Cause You to Shut Down

Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and programs critical to daily business functions and customer service.While corporate-level data losses and insider theft are well publicized, many smaller businesses have also become casualties of data loss and theft. Following a significant data loss, it is estimated that a small-to-medium sized business can lose up to 25% in daily revenue by the end of the first week. Projected lost daily revenue increases to 40% one month into a major data loss.According to The National Archives & Records Administration in Washington, 93% of companies that have experienced data loss, coupled with prolonged downtime for ten or more days, have filed for bankruptcy within twelve months of the incident while 50% wasted no time and filed for bankruptcy immediately. Finally, 43% of companies with no data recovery and business continuity plan actually go out of business following a major data loss.Still, a survey conducted by Symantec SMB

Click, Click, BOOM – You’re in Business But Is Your Technology Ready?

Click, Click, BOOM – You're in Business But Is Your Technology Ready?It's a fast business world. Brilliant business ideas can be conjured up at some hipster-filled vegan coffeehouse, a website is thrown together, and poof... in no time at all there is a living, breathing, small business venture accessible from anywhere in the world.But as your head hits the pillow at night, with visions of becoming the next Mark Zuckerberg dancing in your head, understand that many obstacles will greet you on your road to entrepreneurial success. A fresh innovative idea is merely a start. For every successful startup like Groupon, there are even more that have faltered. Some great, even revolutionary, business concepts that just faded into obscurity; leaving behind nothing but tales of what could've been and insurmountable debt.Failed business technology is often a big reason for this. Many startups think big but tend to operate small-minded to keep overhead and costs down. They then find themselves completely unprepared to meet the demands of growth, particularly when it comes to their IT infrastructure. There is no one-size fit all approach to how to manage technology for optimal efficiency, uptime, and profitability. Especially given the challenges of limited budgets and