IT Solutions Blog

Top 6 Benefits of Office 365 for Business

Posted by Rose Doherty on Jun 20, 2016 1:06:45 PM

What are the Benefits of Office 365 for business?

Office 365 for Business is much more than just Microsoft Office in the cloud. Office 365 allows users to access their documents anywhere, from virtually any computer, laptop, tablet or smartphone. It also automatically updates, so you'll always be using the latest version of their products.  Modern businesses work differently, and Office 365 offers solutions that increase productivity and allow businesses to grow faster. From online meetings to sharing documents to business-class email, Office 365 delivers solutions that go way beyond the installed version of Microsoft Office.

If you are wondering how Office 365 will help you grow your business, we have narrowed down our list to the top 6 benefits that Office 365 delivers to save you money, improve productivity and allow your workforce to operate more effectively.

Read More

Topics: office 365 benefits, benefits of office 365, what is office 365, upgrade to office 365

CryptXXX ransomware is bad news for healthcare organizations

Posted by Art Gross on May 2, 2016 9:22:26 AM

New ransomware is bad news for healthcare organizations

CryptXXX Ransomware provides the scenario we feared most.  Not only does CryptXXX encrypt a victims files, but it also copies data off of the victim's computer.  This can be consideered unauthorized access, and needs to be reported as a Data Breach.  The following article is written by Art Gross, our partner at HIPAA Secure Now. Read his article to learn more about this very dangerous new ransomware, and what you can do to prevent it.

Read More

Topics: HIPAA Compliance

Video: Prevent a Ransomware Attack

Posted by Rose Doherty on Apr 27, 2016 2:23:34 PM

Learn How to Prevent a Ransomware Attack

Protect Your Network Before a Ransomware Attack 

Learn how to protect your network from a ransomware attack with this video highlighting the critical security practices you need to put in place now.  Peter Ayedun, President of IntelliSuite IT Solutions, presents the key components of a layered security strategy to help keep your network secure.  He'll educate you on the only way to guarantee you will restore your data safely, but you need to put it in place before you are attacked.  

Read More

Topics: Data Security, Internet Security

7 Questions That Will Protect Your Network from Viruses and Ransomware

Posted by Rose Doherty on Apr 22, 2016 1:57:31 PM

Train your employees to ask these 7 questions before clicking an email link. 

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Read More

Topics: Data Security, IT Security

Webinar: How to Prepare for and Respond to a Ransomware Attack

Posted by Rose Doherty on Mar 28, 2016 10:46:07 AM

Recorded Webinar Broadcast

How to Protect Your Network before a Ransomware Attack

With recent attacks on hospital data catching headlines, we believe education is critical to help businesses and medical practices keep their data safe.  We co-present this webinar with our partners at Hospital, a software company specializing in intranet and healthcare policy and procedure management systems.  Learn how to protect your network with this critical security information.

Read More

Topics: Data Security, Internet Security

3 Benefits of Online Backup Solutions

Posted by Rose Doherty on Mar 8, 2016 1:34:48 PM

Every Business Needs an Online Backup Solution 

A successful Disaster Recovery Plan or Business Continuity Plan requires that an online data and system backup solution is in place.  What are your options in choosing the best backup solution for your business.  

Read More

Topics: Data Security, Backup

3 Ways to Protect Against Ransomware

Posted by Rose Doherty on Feb 18, 2016 9:27:27 AM

California Hospital Paralyzed by Ransomware, here is how to prevent your business from falling victim.

Ransomware took center stage this week by forcing Hollywood Presbyterian Medical Center in California to declare an internal emergency. Physicians were locked out of the EHR, staff could not access email, and departments were left to communicate by fax machine.   Let's look at three key strategies that can help you prevent ransomware, or minimize the damage if you find yourself a victim.  

Read More

Topics: Data Security

Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records.

Posted by Rose Doherty on Feb 9, 2016 3:27:23 PM

Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach.  Encryption is like a Get Out of Jail Free Card!

Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record.  These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin.  The worst part is that it could have been easily prevented with one simple and inexpensive security measure.

Read More

Topics: HIPAA Compliance, Data Security

7 Reasons to Virtualize Legacy e-PHI

Posted by Rose Doherty on Feb 2, 2016 9:49:00 PM

Virtualized Data Storage provides easy access to old EHR system data.

As hospitals continue to implement new EMR systems, and medical practices merge into super practices, the decision  of what to do with the legacy data from the old system is keeping many IT Managers up at night.  There are pros and cons to every option, but virtualization is rapidly increasing in popularity for the following reasons.
Read More

Topics: Legacy Solutions

15 Things the OCR Will Ask For After a Breach.

Posted by Rose Doherty on Jan 6, 2016 3:00:00 PM

The documentation requested after a data breach may actually have prevented the breach in the first place.

2016 has just begun, yet speculators are already predicting this will be the year of the HealthCare Data Breach.  Without a doubt, implementing a strong HIPAA Compliance framework is your best plan to prevent a breach.  Understanding what the OCR will ask you for in the event of a Data Breach, and preparing all of this documentation ahead of time will give you a very good head start on HIPAA Compliance and may just prevent you from experiencing a breach.

Read More

Topics: HIPAA Compliance