by Felicien | Jul 11, 2018 | Education
Recently healthcare providers have moved toward Cloud services to assist them with better service delivery. The fact is that the Cloud has gained popularity in healthcare. Some organizations that provide healthcare services are still not convinced that the Cloud is the way to go, but those that want to remain relevant have already made the worthy investment. There are different ways in which providers in healthcare depend on the Cloud in order to provide good medical services.
To start off, there is the data storage. Data is backed up in the Cloud and retrieved easily. Second, there is the Cloud app service where providers and patients can connect and have real-time conversations and consultations. These apps can be installed in different devices such as computers and phones that are powered by iOS, Android, and Windows. Lastly, the Cloud provides a platform where providers can post useful resources for reference. These resources could be researched by other physicians. They might include statistics in a given field of medicine, information explaining certain medical conditions, or maybe just simple medical articles.
What are the Benefits in Utilizing the Healthcare Cloud?
Storage
Healthcare organizations collect so much data from their patients for different reasons. The Cloud is the most efficient way of storing data because the information is not only stored in a computer but also backed up with an option of uploading it anytime anywhere. Data stored in the Cloud can be accessed from any device and if the primary computer system is compromised, the same data can be retrieved easily. The best part is that this kind of storage option helps to offload some data from the primary storage in computers and also ensure data security.
Storing and sending large files is now possible through the Cloud. Previously, files such as those containing patient genomic data could not be shared due to their size, which made it very expensive. The launch of Collaborative Cancer Cloud (CCC) has made it possible for the genomic data to be analyzed without necessarily risking health data privacy. Furthermore, CCC is aiming to improve data sharing while maintaining control of the data as explained by Eric Dishman, the Intel Fellow and General Manager of Intel Health &Life Sciences Group for HealthITSecurity.com.
Increased Security
The Cloud offers offsite storage and thus reduces the likelihood of someone stealing or interfering with sensitive data as it is not kept on a computer.
There are different ways of installing and managing Cloud services. There is the private cloud, public cloud, and also a hybrid of the two. These three kinds of Clouds offer varying security options. Private clouds can be hosted in an organization’s data center, or have the private cloud on a remote server which can be hosted by a Cloud service provider.
An on-premises private Cloud has the best security options mainly because control over the network is retained by the organization. It is a preferred option for those large organizations with IT departments equipped with staff that is well trained on cyber-security measures.
Public clouds, on the other hand, are an online platform for storage.
A hybrid of both would be a situation where there is a combination of the on-premises private cloud and third-party public services.
The Barriers to Utilizing Healthcare Cloud
Security and Privacy
Security is a legitimate concern when it comes to Cloud storage and more especially when it is patient data. Before an organization embarks on securing Cloud networks, they should ensure that security concerns are addressed from the onset. Basic data security options should be installed along with the Cloud computing. For starters, health entities can enter into some kind of agreement between them and the Cloud service providers setting out the limits of liability. Employees must also be trained in basic cybersecurity Dos and Don’ts.
Data Control
Organizations worry that with the implementation of the Cloud, they will lose control over their own data. The only way to counter this kind of fear is to create a trust relationship between the organization and managed IT service provider. This can be achieved by entering into legally binding contracts such as the Business Associate Agreement.
Organizations can still manage their own data remotely and exclude outsiders from accessing data by requiring data encryption and also using managing keys. They also have the option of deciding where they want to store specific data if they want it on only one network, several networks, or even a link.
Wrap Up
The Cloud offers great solutions with a number of benefits. At the same time, there are red lights which cannot be ignored. Most of these pitfalls have been mitigated as this technology has developed. What healthcare organizations should do is conduct thorough research before they decide to install Cloud network services. It’s important to get these services tailored to suit the specific needs of the organization.
by Felicien | Jul 11, 2018 | Education
Microsoft Office 2016 is now using artificial intelligence to make your life easier. MS has added AI to their platforms with their new Smart Lookup feature. This makes fact-finding much easier as you can look up what you need right from within the document you’re working on.
Do you know how to use the Smart Lookup Feature Office 2016? You don’t? Well, we’re going to change that right now. And, by the way, feel free to share these “secrets” with your co-workers.
What Is Smart Lookup?
It’s a cool new feature in the Office 2016 Suite that lets you look up information quickly from the document you’re working on using the Bing Search Engine. Smart Lookup automatically finds the information you need.
To get going, open a document in your Office 2016 program of choice (Word, Excel, or PowerPoint).
Then, highlight a term or phrase in the document that you’d like to search for.
Here we’ve selected “turkey.”
Leaving the word highlighted, go to the Ribbon at the top of the window and select REVIEW > SMART LOOKUP.
Note: You can only do this once you’ve read through and acknowledged the Privacy Policy.
Microsoft will post the Privacy Policy on the right side of your screen. Read it and click “Got It” and you can proceed. You’ll only need to do this one time to activate Smart Lookup throughout your entire Office Suite of tools.
Since Microsoft sends your data to Bing, it doesn’t turn Smart Lookup on by default. You may need to contact your IT department for assistance.
If you use a Mac as I do, it’s a bit different. Instead, go to Tools at the top of your screen, and you’ll find Smart Lookup here.
The Bing search results will appear in the panel to the right. (The Insights Task Pane)
Now, take a close look at the Insight Task Pane. You’ll see two options: Explore and Define
Explore contains search results like photos and articles. Define provides a definition of the word.
Easy right? I hope this helped!
Would You Like To Learn More Office 2016 Tips?
Keep reading!
Do You Know How To Customize The Ribbon And Quick Access Toolbar?
Doing this can save you tons of time. You’ll have your favorite tools lined up in your Ribbon for easy access.
To get going, right-click on the ribbon itself and select “Customize the Ribbon.” (You can also do this from your Quick Access Toolbar which you can find in the upper left corner of your computer screen.)
Click the View Menu to open the Ribbon.
Most of the commands you’ll want to add can be found under Insert Menu. Choose the Layout tab and click the command you want for your Page Setup.
Do You Know About The “Tell Me What You Want to Do” Feature?
Actually, Word 2016 will do the work for you. In the past, you had to type in an entire phrase like: “How do I add a hyperlink?” Now, all you have to do is type the word “link” and Word will bring up options for you. Word is much smarter than it used to be!
As a matter of fact, this feature works in all of Microsoft’s solutions.
Are You Familiar With Quick Parts?
These are much like miniature macros that save content you use often (like your company’s information).
It’s easy to create a Quick Part.
Key in the phrase, sentence, or word you want to save. Highlight it and click the Insert tab in the Text group, then click Quick Parts.
Now save it to the Auto Text Gallery.
Next, you’ll need to create a New Building Block. The data is stored for you to use in the future.
Create building block names that are unique, or they won’t show up when you type the text. If you create a lot of building blocks, you can organize them in Galleries and Categories.
When you need to use your text, put your cursor where you want to insert the text and go to Quick Part>AutoText. Your text will appear.
The Building Block Organizer stores Quick Parts Auto Texts in alphabetical order. If you want to change this, go to Edit Properties. Here you’ll find pre-designed blocks of text you can insert into your document.
These Building Block galleries can be found throughout Word. They have preformatted:
Page Numbers
Text Boxes
Cover Pages
Headers
Footers
Quick Tables
Tables of Contents
Watermarks
Bibliographies
Equations
You can customize each Building Block to suit your needs. And, as mentioned, you can create custom Building Blocks and add them to their relevant galleries.
We’ve revealed quite a few Office 2016 secrets now. But there are plenty more that we’ll share in future articles.
by Felicien | Jul 10, 2018 | Education
Are You Prepared for Windows 7 End of Life?
Windows 7 has been one of the most successful operating systems developed by Microsoft. Its resilience has been boosted by many conspiracies and controversies surrounding Windows 8. In fact, millions of organizations skipped the Windows 8 upgrade and stuck with Window 7. Many businesses are still not convinced that Windows 10 is any better than Windows 8. Even though there are numerous valid reasons to stay with Windows 7, it’s time to start preparing for the inevitable upgrade.
January 2020 will be the end of the road for Windows 7. This means that Microsoft will put an end to Windows 7 security updates, bug fixes, and all support, thereby implementing its end of life. Until then, you can enjoy the operating system’s extended support as Microsoft works on phasing it out. As of now, the manufacturer is still offering paid support for the operating system but has terminated all the complimentary updates that come with the product license.
Support Status for Windows 7
Like many Microsoft products, Windows 7 came with a predetermined support timeline. It’s good to know a product’s support lifecycle so that you know when to upgrade. The conventional mainstream support for Microsoft’s operating system stopped developing Windows 7 updates on January 13, 2015. This means that Microsoft no longer provides bug fixes and security updates for the operating system.
With that in mind, the company will still provide some security patches through the extended support phase. This extended support period will run until January 14, 2020. After this date, there will be no more security fixes and updates thereby marking the official Windows 7 End of Life.
However, there’s absolutely nothing stopping you from using Windows 7 even after its End of Life. But you should know that using an outdated operating system makes your computer vulnerable to cyber-attacks.
For instance, many organizations that stayed with Windows XP long after the expiry of its lifecycle suffered serious cyber attacks from infamous hackers like the WannaCry ransomware. There’s a good chance that attackers are already working on how they can exploit the vulnerabilities that will be created when Microsoft ends their extended support period for Windows 7.
Why Microsoft has to end Windows 7 support
Microsoft has a policy stipulating how the life of a product starts and how it ends. Normally, the life of a Microsoft product begins when it is released into the market and ends when the company stops providing support. This is how Microsoft OS lifecycles start and end.
More importantly, Microsoft needs to sell its latest operating systems, which are Windows 8 and Windows 10. To do that effectively, they must preside over the death of the older operating systems. The tech giant has already started blocking updates through some machines so it may be necessary to start preparing now for the eventuality that you may not be able to get any new updates.
What Windows 7 End of Life means to you
Imagine using a product that a company doesn’t want to take responsibility for anymore. You’ll be using the product at your own risk. This means that Microsoft will not take responsibility for loss of data due to security breaches on Windows 7.
New Malware is developed daily so it’s important to understand that anyone continuing to use Windows 7 could be more vulnerable. Without regular patches and security updates, you’re basically at the mercy of hackers. Most users don’t want to take the risk of losing important data and having to deal with a cyber breach.
Preparing for Windows 7 End of Life
Now you know that the Windows 7 OS will not be a safe product to use over the internet in a couple of years. So you have to ask yourself if you’re ready to move into the future with the more modern Windows 10 operating system. Windows 10 gets regular patches and updates to keep it secure. It will install on most devices and machines with no problems or issues, but Microsoft does have a vast array of help and support documents on their website in case you run into trouble.
For enterprise upgrades, it’s best to seek the help of an IT professional. This is a good way to ensure that everything is upgraded correctly and that all firewalls and antivirus are in place and working optimally. Depending on what type of hardware and software you’re using, you may need to take specific steps to make sure everything is fully compatible.
Wrap Up
We all dislike change; it’s just normal. But when it comes to something important like your operating system, your company and staff will benefit by having the latest Microsoft products installed. Each year, all-new features are added to Windows operating systems to make them easier to use and give users a better experience. Once your team knows how to use all these great features, they can save time while producing better documents, spreadsheets, PowerPoint displays and such.
by Felicien | Jul 10, 2018 | Education
The Cloud offers quality, timely, and affordable services by doctors to their patients. It is a platform that enables users, in this case, doctors and patients, to have real-time consultations without necessarily having to go to the doctor’s office. This is made possible due to the Cloud features that are available on most devices with an internet connection. Your computer, your phone, or even a tablet is all you need.
Why healthcare providers have turned to the Cloud
The Cloud is a less expensive alternative because users don’t have to pay consultation fees to access the services of a doctor. It is faster because you can access the services online at any time 24/7. These services are becoming much more prevalent today because doctors and their patients lead such busy lives. In addition, Cloud services adhere to HIPAA regulations, so this protects both the patient and the doctor.
Providers are pressed with the need to reduce their operational costs. In today’s world, the cost of everything is rising, including employee wages and day-to-day expenses. More providers are moving toward offering Cloud services to cut back their expenditures and save time. Doctors can see more patients and they still get the quality care they deserve.
Patients seem to like the added convenience of having these kinds of treatment options available. Nowadays people are so much more involved in the management of their own healthcare. Using the Internet, it’s easy to check online for treatment of certain conditions. Though this can be helpful, it is also risky because there’s a lot of information out there and someone might get the wrong facts and make their condition worse.
Advantages of using the Cloud in healthcare
Cloud computing solutions are relatively cost-effective when compared with traditional IT costs. Using the Cloud, companies can choose a line of services that best suits their business needs. Even storage options are completely scalable. The Cloud offers automatic upgrades when new software and firmware becomes available. This type of flexibility is an attractive feature for most healthcare providers. When they sign up for the Cloud, they can select from a range of packages where services are bundled to save money.
Using the Cloud, millions of patient records and other data can be stored online where it’s accessible from any device or location. That gives clinicians many advantages over old-fashioned storage methods. From test results to pharmacy information, a doctor can consult with a specialist sharing things that can help to lead to a better diagnosis for his patients. Data can be shared in real time. This is much more effective than exchanging emails and phone calls with other doctors.
Disadvantages of using the Cloud
The Cloud relies heavily on the internet and downtime is a challenge associated with internet services. This will temporarily make information unavailable or take a longer time to gain access to the right records.
Bandwidth is another issue. If too many users are trying to access the same site at the same time, traffic may slow down. This can cripple accessibility.
Security is another major issue when you have your data stored on online platforms. Providers need to have multiple layers of security installed. Many doctors have gotten used to conferring with specialists while they’re on the move. Public broadband connections lack the security requirements of HIPAA. Though the Cloud is easy and convenient for a doctor and his staff, it’s very important to make sure that everyone knows the importance of security. You can’t access the network from unsecured public locations and many healthcare workers may not comply with Best Practices.
Services offered by Cloud
Basically, users can take advantage of various types of cloud services including private, public, and hybrid Clouds. The private cloud deals with an on-premises environment, where data is generated and stored within the network system of an organization. A public cloud is more or less the kind of data that is uploaded to an online platform and can be accessed by just anybody. Health facilities use the public cloud to upload medical resources such as medical articles, research statistics, and the likes. A hybrid Cloud offers both private and third-party cloud services. It’s like having the best of both worlds.
New WANs in Healthcare
A Wide Area Network (WAN) is another technology made up of multiple Local Area Networks (LANs) and the two are interconnected using a router or any other device that is multifunctional. Innovators in healthcare technology are trying to establish new WANs based on broadband connections supplemented by software overlays.
This is because broadband connections are cheaper when compared to private lines. The new innovation will enable providers to expand their bandwidth according to their needs and even allow them to use other kinds of connection technology such as wireless networking. Installing the new WANs will not affect the existing IT infrastructures. This will automatically help improve cloud services.
Wrap Up
Cloud services for the healthcare industry are trying to meet the immediate demands of both the providers and the users by offering access to IT resources such as greater storage options and more versatile applications. The best part of opting to go with cloud services is that the organization will not need to install or manage any software or hardware. Cloud services can be accessed from anywhere giving both the providers and healthcare users greater convenience.
by Felicien | Jul 9, 2018 | Education
Exactis Data Leak Reveals the Dangers of Less Efficient Security Measures around People’s Data
The new data leak at Exactis, a marketing and data-aggregation firm based in Florida, presents a great many opportunities for cybercriminals to launch any number of attacks on unsuspecting victims over the next several months.
Exactis, which collects loads of personal data on nearly every U.S. adult, recently leaked detailed information on both people and businesses in the country, according to an exposé by a security researcher.
The exact number of people that this breach has affected remains unknown, but reports indicate that about 340 million records were involved in the leak on the company’s publicly available server.
The Florida-based data aggregation company claims to be in possession of data on a whopping 218 million U.S. adults, including some 110 million households. It further has some 3.5 billion records (digital, consumer, and business records).
Exactis data leak a lesser threat?
Many potential victims may take comfort in the fact that Exactis does not collect people’s payment information such as credit or debit card data, nor their Social Security Numbers. The marketing firm is largely interested in personal information – including names, addresses, and other very basic and specific details about people’s private lives such as hobbies, religion, and individual preferences.
Additionally, unlike the Equifax data breach that involved massive loss of people’s payment information into the hands of cybercriminals, no evidence has come to light yet indicating that the leaked data on the Exactis server actually fell in the hands of anyone with malicious intent.
According to the individual who discovered the breach, Exactis has since taken protective measures to secure the data.
However, this is not a guarantee that there’s no need for alarm. There is no way to tell just how long the individuals who infiltrated the server might have stayed there undetected. Neither does anyone know the details of their exact intent nor the kind of information they might be interested in.
What is now public knowledge, however, is that the exposed information also included home addresses, email addresses, and phone numbers – which can be a time bomb in the hands of a bad actor.
What was the mistake that led to the Exactis server leak?
The data leak at Exactis was possible because the company left the information up on a public server without any protection around it. This way of storing information in the company left the massive collection exposed for anyone who cared to access and use it. There’s no denying how tempting something like this would be for a data thief, as the database had information about “pretty much every U.S. citizen in it.”
While Vinny Troia, the security expert who exposed this leak admits to not knowing where Exactis obtains all their data, he confirms that the database is truly one of the most comprehensive information resources available of its kind.
Should this data security breach and the numbers associated with it be anything to go by, it would be one of the most detrimental to hit the U.S. in a while. This data leak would beat 2017’s Equifax breach hands down. The Equifax breach has held the record as being one of the most devastating security data breaches to date. It affected the highest number of consumers – up to an estimated total of 145.5 million individuals.
What potential risks are victims of this breach are facing?
The damage is done, so what are the repercussions? What does this mean to the individuals and businesses whose details have been breached? What possible solutions do they have at their disposal?
Spam emails
Persons whose personal details are now out there can expect to receive streams of annoying spam emails in their inboxes.
If spammers got hold of someone’s personal information from the Exactis data leak, this would mean a fresh new list of email addresses to send unsolicited offers to. This class of cybercriminals makes money off signals such as website pop-up ad impressions or email response rates. Clicking on their unsolicited emails would be generating money for them without intending to.
Phishing attacks
A direr possibility, the data might fall into the hands of identity thieves. These criminals could use the email addresses obtained from the leaked collection to create any number of phishing schemes.
The consumers who have lost their personal information, therefore, run the risk of being targeted by phishing attack emails, which involve criminals impersonating legitimate senders attempting to trick them (unsuspecting recipients) into clicking malicious links in these emails. Clicking such malicious links would trigger the download of malware onto these victims’ computers.
Attackers may also trick these victims whose emails they (attackers) have gathered, into giving out some confidential and more valuable information such as usernames and passwords, credit card data, and even Social Security numbers.
Wrap up
Knowing what to expect is the first step in preparing for the consequences of this breach. At the end of the day, you must protect yourself. It is utterly important that you do not open any email that originates from an untrusted source. Better still, consider using a suitable email authentication service to protect you from interacting with malicious emails. Watch for phishing schemes—expect them to come to your inbox and be prepared. Don’t be fooled by emails that seem a bit too urgent. Cybercriminals always use fear to get you to click on their bad links.