Skip to main content

Tagged With "Security"

Comment

Re: The Heavy Toll of Poor Data Security in Healthcare

tonyl ·
I am out of the office until 09/01/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: The Heavy Toll of Poor Data Security in Healthcare" sent on 8/27/2014 8:12:05 AM. This is the only notification you will receive while this person is away.
Comment

Re: How dentists should comply with HIPAA

Keith Thompson ·
I am out of the office until 08/04/2015. I am away if you need to talk to someone please contact Darren Downey our GM Office 633-9264 X 226 Cell 204.229.7231 My Cell is 204.890.8570 Note: This is an automated response to your message "Post By David Bailey (Guest): How dentists should comply with HIPAA" sent on 4/1/2015 11:14:20 PM. This is the only notification you will receive while this person is away.
Comment

Re: New Survey Reveals Consistent Failures in Healthcare IT Security

Murleybacher ·
can you send me an application to sign up for a premium membership - thanks
Comment

Re: Ten Reasons Why the New Ricoh IM 350F, IM 430F and IM 430Fb is a Winner

Larry Kirsch ·
Thank you. Very helpful. Kindly continue to post further updates. Have a great day.
Comment

Re: Ten Reasons Why the New Ricoh IM 350F, IM 430F and IM 430Fb is a Winner

Old Glory ·
Slight correction...both the IM 430F and the IM 430Fb are 43 ppm. Additional info...the 430F (SP 501) has a Service Maintenance platform while the 430Fb (SP 502) has a User Maintenance platform. The SP 510 and SP 502 are printer only versions of their respective MFP's. As far as I know, the SP's and the IM 350 (350F without a standard fax) have not been launched yet. It is interesting to note that the service training does not reference the MP 301SPF or the MP 402SPF at all. The new IM units...
Comment

Re: IT Security, Compliance Become a Difficult Balancing Act

Sherri ·
Thank you for your e-mail. I will be out of the office and have limited access to my e-mail from March 31st through April 10th.. I will review your message upon my return. In my absence please feel free to contact Jim Singer ( jim@kopi.ws ) or Cynthia Wankum ( cynthia@kopi.ws ) for immediate assistance during this time. Have a great day! Sherri Wilbers President KOPI 518 Cheyenne Drive Jefferson City, MO 65109 573-893-4545 (ext. 203) www.kopi.ws sherri@kopi.ws
Blog Post

Master Service Providers Face New Competition

Art Post ·
Most MSP technology resellers who are increasingly delivering IT Security Services, understand they will outsource the heavy lifting associated with IT Security, compliance, and education. I think the time has come that there will be a new competition which will challenge Master Service Providers, especially those with limited resources. Two thousand nineteen will be the year of new options and game-changing competitors. Some will re-invent themselves becoming the new competitor, and some...
Blog Post

Ten Reasons Why the New Ricoh IM 350F, IM 430F and IM 430Fb is a Winner

Art Post ·
It's been sometime since Ricoh introduced the MP 301 (A4 black MFP 30ppm). Five years is a long time to hang on to a model, especially when A4 devices are being introduced left & right. There's a new kid on the block of A4 devices. Ricoh is now offering the IM 350f (37ppm), IM 430F (43 ppm), and the IM 430fb (45ppm). All devices come standard with copy, print, fax and color scan. Anyone can get the speeds and feeds on these devices, but I wanted to dig a little deeper and express what I...
Blog Post

MSP & MSSP Industry Notes for April 18th, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

MSP & MSSP Industry Notes for February 15th, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

MSP & MSSP Industry Notes for February 22nd, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

MSP & MSSP Industry Notes for March 22nd, 2020

Art Post ·
MSP & MSSP Industry Notes Sponsored by Arcoa Group ARCOA Group is here to help you successfully manage your IT Asset Disposition process. We help you recover value from retired electronic equipment through responsible methods of reuse and recycling. We ensure proper handling of assets which may contain data, while being environment stewards for assets that have no reuse value and are headed for recycling. We’ve built a robust de-manufacturing process to offer additional options for asset...
Blog Post

This Week in the Copier Industry 10 Years Ago for the First Week of May 2010

Art Post ·
Years ago I use to burn the late night candle pretty often. In some cases I would still find myself emailing a prospect at 2AM in the morning. In most cases the email was to schedule a meeting for later that week. Those late night emails was just something I was use to. It wasn't until one of my clients made mention of the email that arrived at 2AM. Of course he didn't see it until he arrived at work. But this client went on to tell me that he wished he had more sales people like me, meaning...
Comment

Re: Email Security is Moving Into More Prominent Positions

HUNTER BUSINESS SYSTEMS ·
Art what time is good today I néed 20 m minutes steve Steve s iPhone > On Aug 4, 2014, at 4:54 PM, Print4Pay Hotel < alerts@hoop.la > wrote: >
Comment

Re: A Closer Look at Data Breach Avoidance & Response

tonyl ·
I am out of the office until 07/14/2014. I will respond to your message when I return. Note: This is an automated response to your message "Post By Art Post: A Closer Look at Data Breach Avoidance & Respo..." sent on 7/9/2014 9:07:01 AM. This is the only notification you will receive while this person is away.
Blog Post

Healthcare's Next Step with Secure Cloud Demands

David Bailey ·
Cloud computing has remained one of the most important trends to ever have surfaced in corporate IT, as it quickly overhauled the ways in which organizations provision, use, maintain and optimize their technological assets. Although cloud markets were first very heavy on software, the industry has evolved rapidly to offer infrastructure, platform and other options necessary to have a fully functional and optimally enabled IT department. Still, security has been a touchy subject for cloud...
Blog Post

Healthcare IT Security Onus Remains on Access Control

David Bailey ·
As major trends in corporate computing such as the Internet of Things, enterprise mobility, big data and telecommuting continue to intensify, security professionals have increasingly urged leaders to understand the importance of enhanced access control. Up until this point, simple passwords have been the most common means of authenticating users and allowing individuals to use and share sensitive corporate information through a range of platforms, websites and devices. However, the...
Blog Post

Data Analytics Raises Health Care IT Security Concerns

David Bailey ·
Health care providers have been somewhat under the gun when it comes to the integrity, security and privacy of patient data for more than a decade now, while breaches have increased in prevalence and damage. The onus has been decisively placed on individual medical firms to begin making more progressive changes to their IT security and general data management strategies, but the entirety of the sector is increasingly expected to invest more time and resources into these endeavors.
Blog Post

4 trends that heighten the need for stronger healthcare IT security

David Bailey (Guest) ·
IT security has been - and should be - the central focus for corporate decision-makers in virtually every segment of the private and public sectors today, as the rate of these events and the size of subsequent damages have both skyrocketed. Several...
Blog Post

5 Steps Toward Stronger Email Security and HIPAA Compliance

David Bailey (Guest) ·
Email security has been a relatively major pain point for organizations across industries and sectors in the past few years, as this immensely popular communication medium tends to be an easy entry point for hackers and other threats. Unfortunately,...
Blog Post

The Continuing Issue of Reactionary IT Security in Health Care

David Bailey ·
Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others...
Blog Post

Health Care Email Security Still Needs Improving

David Bailey ·
Despite the fact that so many data breaches have impacted the health care sector in the past few years, and a high percentage of them have been traced back to poor email security, it does not seem as though industry players are really rising to the...
Blog Post

What Does Comprehensive Data Security Look Like?

David Bailey ·
Information security has become one of the most widely discussed topics among boardroom members, public sector officials and consumer advocates in the past few years, as identity theft has ravaged the U.S. economy. Although progress has been made in this regard, firms are still struggling to really strike the right chords with their security programs, and the biggest problem appears to be a lack of comprehension, leading to vulnerabilities that can be capitalized upon by threats. Hackers and...
Blog Post

IT Security, Compliance Become a Difficult Balancing Act

David Bailey ·
Organizations in health care and virtually every sector have been challenged significantly of late when it comes to protecting information from breach, exposure, theft and loss, as so many threats have emerged in such a small period of time. The cost of experiencing a major data breach is going up quickly as the years pass, and the rate of entities (healthcare providers) to not have been impacted by one of these events is falling fast as well. These are some of the many reasons why...
Blog Post

When Will the Breach Threat Subside?

David Bailey ·
In the past several years, the cybersecurity arena has been moving in the wrong direction, to say the least, and it does not really seem as though the story will change any time soon. Healthcare providers, retailers, payment processors, banks and government agencies have been frequently targeted by hackers of late, while insider threats and employee negligence have actually moved into the lead for the most common causes of data breach, and consumers are suffering as a result. Identity theft...
Blog Post

Is Healthcare Prepared for Internet of Things?

David Bailey ·
The Internet of Things has been among the more widely discussed and hyped trends in corporate computing throughout the past few years, and is only continuing to gain steam given the explosion of new devices entering the market. Considering the fact that health care firms have thus far struggled to get a handle on enterprise mobility, which only entails smartphones, tablets and portable computer, leaders need to begin planning for the IoT as soon as possible with a specific focus on security.
Blog Post

New Survey Reveals Consistent Failures in Healthcare IT Security

David Bailey (Guest) ·
It might seem as though journalists and analysts have been beating a dead horse with the information on healthcare's severe IT security struggles, but awareness is critical in the fight against modern cybercrime. This is especially true given the...
Blog Post

The BYOD Side of Health Care IT Security

David Bailey ·
In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late. Lost or stolen devices, rogue IT, poor control over access, no governance and...
Blog Post

How can healthcare organizations choose and use email encryption?

Art Post ·
Email Encryption has become an important asset for healthcare organizations in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email...
Blog Post

Healthcare organizations at risk of Shellshock vulnerability

Art Post ·
Security threats are growing in abundance as more health organizations choose to host large quantities of patients' personal and medical information in data centers, locally and across the country. A recent study from McAfee discovered over 31 million...
Blog Post

Cloud security considerations for healthcare organizations

Art Post ·
Cloud computing has numerous benefits for organizations in the healthcare industry, as many departments can find applications and data to host in the cloud environment, making resource provisioning easier and allowing employees to use less physical...
Blog Post

Planning for the Future with DocuWare

DocuWare (Guest) ·
Planning for the Future with DocuWare   Third-party retirement plan administrator, ADMIN Partners is using DocuWare to transform their business processes from paper-based to completely digital workflows, increasing efficiency and transparency...
Blog Post

The Complexity is Real in Health Care Security

David Bailey (Guest) ·
The average organization, regardless of size or industry, is under a greater threat of data breach than ever before, as digital risks continue to propagate and the defenses to avoid them lag. As a result, the frequency and subsequent damages...
Blog Post

Email security has transcended into ridiculousness

David Bailey (Guest) ·
While it is never good to make light of a serious situation such as IT security, businesses as well as health care providers and government agencies have been making it quite difficult to keep a lid on hilarity. That was meant to evoke "Hillary," in...
Blog Post

Health Care Still Struggling with Email Security

Art Post ·
The health care sector has come under fire of late due to an increased prevalence of data breaches, privacy failures and more, while many of the more damaging events have actually been the result of relatively simple mistakes. Although the retail...
Blog Post

How dentists should comply with HIPAA

David Bailey (Guest) ·
Dentists should ensure their methods of HIPAA compliance are up to date. According to Dentistry IQ, all positions within the dental field have to know how to approach the legislation, including receptionists, assistants, dental hygienists and IT...
Blog Post

5 Internet and secure email tips

Art Post ·
Hillary Clinton has certainly been under fire in the news recently for her insecure email usage. However, there are many strategies businesses can teach their employees and learn from Clinton's mistakes to ensure safe technology use in the workplace....
Blog Post

Two severe Windows vulnerabilities addressed, another two unpatched

Art Post ·
Windows users might have noticed that on the morning of Nov. 13, they were greeted with a large number of updates for their systems. This is all too common of a problem for IT departments as they scramble to patch servers, desktop computers and...
Blog Post

Health care industry is No. 1 for cyberattacks

Art Post ·
The FBI has warned that cyberattacks are on the rise - and health care companies are often the target hackers seek. An attack that took place in August on Community Health Systems Inc., the No. 2 publicly traded U.S. hospital group, compounded concern...
Blog Post

Sophisticated hacker group FIN4 strikes Wall Street

Art Post ·
Imagine receiving an email that claims another employee is talking about you in a public forum, and forwarding a link to the forum as proof. It looks legitimate enough, as the email is from a longtime client with whom you recently discussed business....
Blog Post

A Closer Look at Data Breach Avoidance & Response

Art Post ·
Data breaches have become some of the more dangerous and frequent threats to corporate continuity in the past few years, as many organizations have struggled to either avoid or recovery from major instances of information loss and exposure. In many...
Blog Post

Where Big Data and Health Care Security Meet

Art Post ·
There is no denying that the average health care organization is becoming far more digitally centric with the passing of each year, driven by the rapid proliferation of new tools and trends that set the bar higher for each competitor in the field....
Blog Post

Email Security is Moving Into More Prominent Positions

Art Post ·
Boardroom executives have had to be exceptionally agile when developing and releasing new forms of security controls for their information technology and communications frameworks, especially as the frequency of damage associated with breaches...
Blog Post

One More Piece of Evidence that Security Needs More Attention

Art Post ·
In many ways, the war between hackers and victims has moved into a more farcical position in the past few years, with fraudsters finding ways to break into the most heavily guarded and protected systems, stealing information and causing hundreds of...
Blog Post

The Heavy Toll of Poor Data Security in Healthcare

Art Post ·
In what has become a farce of sorts, health care providers appear to remain far behind the learning curve when it comes to data, network and email security, as breaches have been on a torridly rising path in the past few months. Although retailers...
Blog Post

In Focus: Email Security, Management

Art Post ·
In many instances, business leaders believe that email security is among the least of their concerns when it comes to data management and protection, focusing the entirety of their efforts on other communications tools, infrastructure components,...
Blog Post

Do Not Avoid the Cloud: Get a Managed Service and Capitalize

Art Post ·
Businesses continue to become more interested in the power of the cloud, though recent data breaches have appeared to reignite fears that this technology is simply impossible to secure. Although this should be common knowledge by now, cloud computing...
Blog Post

A Broad Scope of Health Care Data Security

Art Post ·
The health care security arena has become more complex and challenging in recent years, driven by all different types of stressors, pain points, new technologies, compliance overhauls and more. In many ways, patient information has been widely viewed...
Blog Post

A Few Reasons Why You Need to Enabling Secure Printing

Art Post ·
Lurking in the shadows of your office is a disgruntled employee, he or she has already interviewed for other sales jobs and last week accepted a sales job at a competitor. But this sneaky son of bitch negotiated that he or she can't start...
Blog Post

5 Predictions for 2017 About ECM and the Future of Digital Documents

Nicole Puhala ·
5 predictions for 2017 about ECM and optimizing workflow processes.
 
×
×
×
×
×