Ransomware and cybercrime hacking have been two of the most common IT security threats in 2016, but many health care organizations aren’t ready to play defense: Only about 60 percent of surveyed organizations had the security capabilities in place to detect and remediate these attacks.
That’s problematic, of course, but is it surprising? After all, many health care organizations place more importance on HIPAA compliance than security, or they aren’t agile enough to protect themselves against the newest threat. Organizations tend to sink their energy into defending against the latest threat of the day, but lag on improving their entire security architecture. (more…)
Only 12.5 percent of e-waste is recycled— let’s change that.
The world’s largest IT hardware manufacturers all have recycling programs. You just need to know where to look. All of these programs strive for the same goal: Safely recycle or dispose of IT hardware and e-waste, saving it from landfills. Many businesses that sell IT equipment, as well as some states, run e-waste recycling programs, too.
Every program is a little different, depending on the manufacturer. So here are the recycling programs from six of the largest IT manufacturers, plus SHI’s “one-size-fits-all” approach to asset recovery. (more…)
Datacate, a regional colocation provider, was recently in the market for new colocation space, but had strict requirements: Space had to come at the right price, but timing was the wrinkle. The entire process – negotiating contracts, ordering hardware, constructing cages, and making everything ready for move-in — would have to be completed in just over a month while keeping costs down. That’s a tight timeframe for a full implementation when constructing cages alone often takes several weeks. (more…)
Lurking in every data center is an unseen enemy: dark data. This unstructured data causes surging storage costs and exposes organizations to a variety of risks.
Win the fight against dark data by developing an information governance program. This plan identifies what dark data exists, how different departments manage data, and when it can be archived and destroyed.
Let’s review the steps organizations must take to create an information governance framework, and learn how organizations can successfully execute it. (more…)
It’s not every day you find $21,000 lying around your office. And no, we’re not talking about fixing improper software licensing or avoiding a ransomware attack. We’re talking about your printers.
When one organization took a closer look at its printers, it uncovered 281 so-called “problem devices” – printers that were too old, too expensive, or weren’t being used to their full potential. Refreshing just 153 of those devices could save the company $21,000 a month. (more…)
This question will be on the final exam, and it’s one you don’t want to get wrong: Are you CIPA compliant?
We’re talking about the Children’s Internet Protection Act (CIPA), the federal legislation that requires schools and libraries to restrict access to obscene or harmful content on the internet.
It’s so important that eligibility for E-Rate funding hinges on schools’ and libraries’ CIPA compliance. They must certify that they’re enforcing a policies relating to internet safety, including blocking or filtering access to material considered obscene, pornographic, and harmful to minors.
Are your students protected? Does your school network fit the letter of the law? Here’s how to make sure you’re CIPA compliant. (more…)
The company had a problem: Its IT environment was so disjointed and outdated, it was a proverbial house of cards, teetering on collapse. The outdated infrastructure was unreliable and slow, which caused delays in sales and inventory reporting. If one system failed, it could shut down the entire IT infrastructure and paralyze sales management and order fulfillment.
For small and medium-sized businesses with more pressing budgetary priorities, it’s easy to see how such a situation could arise. When an external audit found that the company had severely underfunded its IT department for years, management took notice. (more…)
Big data seduces us with potential. Industries from retail to health care collect untold terabytes of data in hopes of finding correlations and connections that drive sales and improve patient health.
But beneath the depths lies dark data, or data whose value hasn’t yet been identified. We’re talking about documents, images, PDFs, videos, and other data that often aren’t work related, include sensitive information, or duplicate files many times over.
Many organizations do the right thing by regularly backing up their data (everything from email servers to file shares to individual user folders), but this process amasses tons of unnecessary unstructured data. It clogs up storage arrays and hard drives, creating big bills and unknown risks.
Is your organization hoarding this kind of unstructured data without realizing it? Let’s shine a light on dark data to uncover how you can move your organization toward better storage and improved efficiency. (more…)
Few of us would buy a car without first taking it for a test drive. But this is exactly what organizations do when they purchase new technology without completing a Proof of Concept (POC).
In the IT realm, a POC tests how potentially disruptive technology interacts or integrates with an existing environment. These experiments can give an organization the confidence to adopt new and emerging technologies, or fair warning for what challenges must be solved first.
While you don’t need a POC to buy some new laptops, you should test any significant implementation you’re planning. Here’s why. (more…)
Which causes business leaders to buy into an IT security assessment quicker: ransomware or a data breach?
Unfortunately, that’s just the situation a regional health care provider network faced a few years ago. Although the IT staff knew a review of the security of the network and file server was overdue, the C-suite remained focused on existing HIPAA compliance guidelines.
That’s when a ransomware attack hit, resulting in a data breach. A user simply clicked on a popup, ransomware was then installed on the machine, and health care records stored on the user’s hard drive were compromised.
After the breach was fixed and the damage assessed, management realized many questions needed answering: Why did this attack happen? What should be IT’s first step in protecting data? What data should be secured? How could the organization balance compliance and security to stop attacks in the future? (more…)