How HIPAA Impacts Social Media Usage

Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization. On April 14, 2003, the “Health Insurance Portability and Accountability Act” (HIPAA) became law with the goal of protecting the privacy of patient medical records, hospitals, doctors, and health plans. The regulations set forth by this legislation allowed patients to freely access their medical records and gave them more control over the disclosure and use of their private health information. Billions of…

Read more

OneNote excluded from Office 2019

Microsoft is pushing its users to use the UWP (Universal Windows Platform) app of OneNote which will be included in Microsoft Office 2019 and Office 365. This means the OneNote desktop app will no longer be packed with future versions of Office. Microsoft’s OneNote desktop application is nearing the end of its journey, as the software giant will stop developing the product line past the 2016 edition. But don’t panic just yet, OneNote 2016 will share the same lifecycle as Microsoft Office 2016. The desktop app will receive security patches and updates until October 14, 2025. Developers are directing their…

Read more

The Facebook data breach scandal explained

Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn’t guard the information you’ve given it? How does this affect its users? Last month, news broke that a firm known as Cambridge Analytica collected private data from over 50 million Facebook users. The British company supposedly used this information in 2016 to influence voter behavior during the US presidential election and UK’s Brexit campaign. How did they harvest the data? In 2015, a Facebook personality quiz app called “This is Your Digital…

Read more

The importance of strong iPhone passcodes

Now is the right time to shift to a stronger passcode for iPhone users, with police departments, federal agencies, and possible criminals, lining up to buy technology that can bypass your phone’s security. Experts say technology for unlocking iPhones is very much in circulation, so here’s everything you need to know. The problem According to reports, at least two companies, Israel-based technology vendor Cellebrite and Atlanta-based Grayshift, have both developed relatively inexpensive technology for unlocking iPhones. Reportedly, local and regional U.S. police departments as well as the federal government have been purchasing the technologies. Grayshift’s GrayKey box is a de-encrypting…

Read more

Chrome, Edge, Firefox to Support Biometrics

Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication. The leading internet browsers are expected to allow users to sign into online profiles through fingerprint scanners, voice authentication, facial recognition, and the like. Online biometric authentication through these browsers requires no additional software. Authenticate Your Profile on Your Mobile Device Chrome OS, Windows, and MacOS, Linux, and Android are all adding features to help users safely log in using biometric identification via USB, Bluetooth, and NFC devices connected to smartphones and tablets. With such convenience, users can verify their accounts on the go. Preventing Cyber Attacks…

Read more

Tips for optimizing your mobile hotspot

Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on how to use them. A mobile hotspot usually provides faster Internet connection and better security compared with public Wi-Fi. But if this kind of mobile networking is not utilized well, it will accumulate expensive data charges. The following tricks will maximize the efficiency of mobile…

Read more

Mobile devices in the field

Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes in. Here’s how to ensure connectivity for these workers. The ability to manage the workforce out in the field requires a modern support infrastructure called mobile performance management. It includes the top five tips to keep field workers connected: optimizing traffic, applying control, measuring performance…

Read more

Android phones miss vital security patches

Android manufacturers routinely update their products with the latest security patches to keep users safe from all manner of threats. Or so they would have you believe. According to recent reports, Android phone manufacturers may have accidentally missed a few critical patches. Here’s everything you need to know. Missed patches Every month, Google rolls out a new batch of Android bug fixes and critical security updates. These patches are available to Google Pixel phones almost immediately, but many third-party manufacturers are often months behind. When it does arrive, you should theoretically be protected from every recently discovered threat. After extensively…

Read more

The management drawbacks of virtualization

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating a robust backup system in a virtualized setting can become a huge challenge. You’d have to determine which data you want to store and how often it should be backed up. You would then have to decide whether you should back up all your virtual machines or just some vital…

Read more

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection. Files Restore in OneDrive Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware…

Read more