IT Solutions Blog

Video: Prevent a Ransomware Attack

Posted by Rose Doherty on Apr 27, 2016 2:23:34 PM

Learn How to Prevent a Ransomware Attack

Protect Your Network Before a Ransomware Attack 

Learn how to protect your network from a ransomware attack with this video highlighting the critical security practices you need to put in place now.  Peter Ayedun, President of IntelliSuite IT Solutions, presents the key components of a layered security strategy to help keep your network secure.  He'll educate you on the only way to guarantee you will restore your data safely, but you need to put it in place before you are attacked.  

Read More

Topics: Data Security, Internet Security

7 Questions That Will Protect Your Network from Viruses and Ransomware

Posted by Rose Doherty on Apr 22, 2016 1:57:31 PM

Train your employees to ask these 7 questions before clicking an email link. 

The fastest and easiest way for cybercriminals to steal your confidential data or paralyze your network with ransomware is to send an email to your employees and get just one of them to click on a link or open an attachment.  That is all they have to do, and once anyone on the network clicks, they criminal has been invited in to do whatever damage they want.  Employee education is the key to your corporate security.  Teaching them to ask these questions before clicking is one of the most effective security strategies you could implement.

Read More

Topics: Data Security, IT Security

Webinar: How to Prepare for and Respond to a Ransomware Attack

Posted by Rose Doherty on Mar 28, 2016 10:46:07 AM

Recorded Webinar Broadcast

How to Protect Your Network before a Ransomware Attack

With recent attacks on hospital data catching headlines, we believe education is critical to help businesses and medical practices keep their data safe.  We co-present this webinar with our partners at Hospital, a software company specializing in intranet and healthcare policy and procedure management systems.  Learn how to protect your network with this critical security information.

Read More

Topics: Data Security, Internet Security

3 Benefits of Online Backup Solutions

Posted by Rose Doherty on Mar 8, 2016 1:34:48 PM

Every Business Needs an Online Backup Solution 

A successful Disaster Recovery Plan or Business Continuity Plan requires that an online data and system backup solution is in place.  What are your options in choosing the best backup solution for your business.  

Read More

Topics: Data Security, Backup

3 Ways to Protect Against Ransomware

Posted by Rose Doherty on Feb 18, 2016 9:27:27 AM

California Hospital Paralyzed by Ransomware, here is how to prevent your business from falling victim.

Ransomware took center stage this week by forcing Hollywood Presbyterian Medical Center in California to declare an internal emergency. Physicians were locked out of the EHR, staff could not access email, and departments were left to communicate by fax machine.   Let's look at three key strategies that can help you prevent ransomware, or minimize the damage if you find yourself a victim.  

Read More

Topics: Data Security

Encryption Could Have Prevented Centene's Data Breach of 950,000 Patient Records.

Posted by Rose Doherty on Feb 9, 2016 3:27:23 PM

Encrypted Devices with PHI can be lost or stolen and it is not considered a Data Breach.  Encryption is like a Get Out of Jail Free Card!

Health Insurance credentials sell for $20 each on the black market, but when supplemented with personally identifiable information (PII) such as birth date, place of birth, social security number, it can yield over $1000 per record.  These are scary times, and Centene, a St. louis based health insurer is the latest victim of a data breach that will make your head spin.  The worst part is that it could have been easily prevented with one simple and inexpensive security measure.

Read More

Topics: HIPAA Compliance, Data Security

7 Reasons to Virtualize Legacy e-PHI

Posted by Rose Doherty on Feb 2, 2016 9:49:00 PM

Virtualized Data Storage provides easy access to old EHR system data.

As hospitals continue to implement new EMR systems, and medical practices merge into super practices, the decision  of what to do with the legacy data from the old system is keeping many IT Managers up at night.  There are pros and cons to every option, but virtualization is rapidly increasing in popularity for the following reasons.
Read More

Topics: Legacy Solutions

15 Things the OCR Will Ask For After a Breach.

Posted by Rose Doherty on Jan 6, 2016 3:00:00 PM

The documentation requested after a data breach may actually have prevented the breach in the first place.

2016 has just begun, yet speculators are already predicting this will be the year of the HealthCare Data Breach.  Without a doubt, implementing a strong HIPAA Compliance framework is your best plan to prevent a breach.  Understanding what the OCR will ask you for in the event of a Data Breach, and preparing all of this documentation ahead of time will give you a very good head start on HIPAA Compliance and may just prevent you from experiencing a breach.

Read More

Topics: HIPAA Compliance

What is a Business Associate?

Posted by Rose Doherty on Jan 4, 2016 1:55:38 PM

How to determine if a vendor needs to sign a Business Associates Agreement.

The HIPAA Privacy Rule allows covered entities and health plans to disclose protected health information (PHI) to business associates, but only if the business associate signs a Business Associate Agreement in which it assures that it will appropriately safeguard the PHI it receives or creates on behalf of the covered entity.  So, which of your vendors need to sign a B.A. Agreement?  Here is a helpful list of vendors that need to sign your Business Associates Agreement.  You may be suprised!

Read More

Topics: HIPAA Compliance

IT Security Best Practice for Mobile Device Use

Posted by Rose Doherty on Dec 21, 2015 8:00:00 AM

4 Smart Tips For Mobile Device Use


If you’re planning on heading out of town – or simply to the coffee shop to work – you will want to keep these tips in mind to keep your data secure.

Read More

Topics: Data Security, IT Security