Dr. Alexa and Dr. Cortana at Your Service

Dr. Alexa and Dr. Cortana at Your Service

Coke versus Pepsi. Angelina versus Jennifer. The New England Patriots versus…well, everybody. These are just a few famous rivalries throughout history all of which pale in comparison to the rivalry between Alexa and Cortana. People are fiercely opinionated about which is best – but what if you didn’t have to choose?

What if these “ladies” can improve healthcare?
Amazon and Microsoft recently announced that they will work together to make Alexa and Cortana interact. More importantly, they’re examining ways to have them work to improve healthcare and the overall patient experience. The first healthcare providers in line to use this technology are Penn Medicine in Philadelphia and Commonwealth Care Alliance in Boston:
“Amazon’s Alexa will stretch the boundaries of how people view their ability to organize their own care,” stated CCA’s John Loughnane, MD and chief of clinical innovation. “We see the possibility to learn about stress points for our patients – and address those.”
Brian Wells, the associate VP of health technology and academic computing at Penn Medicine notes, “We’re focusing on Amazon as it is a more open platform and furthest ahead in the race”.
Alexa and Cortana both bring strengths to the game, and according to Amazon CEO Jeff Bezos:
“Together, their strengths will complement each other and provide customers with a richer and even more helpful experience.”
Here are just a few things we can expect to see in the future from “the marriage”.
Drug Creation
Developing medications through clinical trials can take more than a decade and cost billions of dollars. AI technology could speed up the process and make it more cost-effective.
Assisting With Tedious Jobs
IBM launched an algorithm called Medical Sieve, which is capable of assisting with clinical decision making in radiology and cardiology. This “cognitive health assistant” can evaluate radiology images to spot and detect complications faster and more reliably. Radiologists in the future will only have to look at the most complicated cases where human supervision is useful.
Getting The Most Out Of Doctors’ Visits And Consultations
Having to wait days to see your doctor is never fun when you’re sick.
Medical Artificial Intelligence (AI) consultations based on personal medical history and common medical knowledge is the newest way to get access to medical help faster. Users can report their symptoms to an app, which checks them against a database of diseases, and then offers a suitable course of action. It is also capable of reminding patients to take their medication.
Date Management Controlled By AI
AI in healthcare is storing and safeguarding data. “Collecting it, storing it, normalizing it, tracing its lineage – it is the first step in revolutionizing the existing healthcare systems,” states Medicalfuturist.com. Google recently introduced the Deepmind Health Project, which analyzes the data of medical records in order to provide better and faster health services. They are working with the Moorfield’s Eye Hospital in London, England to help improve eye care for patients.
A Nurse Available At The Touch Of A Button
Meet Molly, the world’s first virtual nurse. Driven by the award-winning medical start-up Sensely, she has a friendly face and a kind voice. Molly’s goal is to aid people by monitoring their conditions and treatments, offering support to patients in-between doctor appointments. There is even a process that monitors whether patients are taking their medications or not. In addition to Molly, the AiCure app, which is supported by The National Institutes of Health, uses a smartphone camera along with AI to confirm that patients are following their doctor’s orders and following their prescriptions.
AI in healthcare could establish patient treatment plans and afford physicians with all the information they need to make the best decisions. AI will have a major influence on the study of genetics as well, with new technology looking for mutations and connections to disease. “Voice technology is an opportunity to provide care in conjunction with transportation, scheduling, prescription refills, reminders, and alerts,” tells Loughnane.
This new merger will create customized care based on the ability to ask Alexa things like when home health aides are scheduled to arrive, to check out wait times and schedule appointments, and to arrange transportation to get there.
Advancements in the healthcare industry will certainly lead to breakthroughs in other industries as well. When will we fully see these applications in action? Only time will tell, but some experts think it will be sooner rather than later.
The world is changing fast, and it’s a great time to be alive. One can only imagine what it will be like 20, 50 and 100 years from now. Steps taken today will improve our lives and the lives of our loved ones for years to come. “Voice has been a tremendously underutilized aspect of how healthcare views interactions,” Loughnane said. “I see a future where voice is going to be an integral part of healthcare.”

Happy Valentine’s Day: Make Sure You Feel The Love From Your IT Company Today!

Happy Valentine’s Day: Make Sure You Feel The Love From Your IT Company Today!

There are few things worse than feeling trapped in an unfulfilling relationship – especially when it’s a vital business relationship.
Technology is an integral part of everything your business does, which raises a few important questions about your current IT set up. For starters, what is your relationship like with your technology systems – rock solid, or more than a little rocky?
How about with your technology service provider – are they always there for you when you need them the most? Do you still love your technology service provider the same way that you did the day you first met? Does your relationship with them still make you happy, and leave you feeling confident and supported in everything your business does? Can you count on them to help you reach your goals and achieve your dreams for the future?

One last question – has your passion for your network faded, leaving you frustrated, disappointed, and longing for happier times? If the answer is yes, then we have some good news for you… Your IT cupid is here to help you get back that lovin’ feeling. Let {company} rekindle your passion for your business technology. Something that is such a core part of your daily life shouldn’t be a constant drag on your mood, your productivity, and your success.
You deserve better. You deserve a technology company who puts you first and treats you like you’re special. IT and IT support are in no way one-size-fits-all. Your technology infrastructure should be as unique as your individual business, and tailored to meet your specific needs. Everything from the software you use to the way your data backup system is configured should take into account the way your company operates, and what your employees need to have access to in order to be effective and efficient.
A cookie-cutter IT infrastructure can’t help your business grow and thrive. If your IT company can’t or won’t treat you like you’re not just another client, it’s time to look for someone who will be more than happy to treat you right.
If you’ve stopped feeling that spark from your tech support when you pick up the phone and call them, it’s a surefire sign that the relationship is no longer working for you. Dreading making a call to the help desk because you know that you’re going to, at best, get an apathetic response from the person on the other end of the line is not a good feeling. This is a company you’re trusting with your business’ most valuable assets, and if they can’t make your needs a priority? That’s a serious problem.
What happens when something goes seriously wrong, and you know that your emergency is going to be treated like just another service ticket? What could possibly be a worse feeling than that?
It’s time to put your foot down and stop being taken for granted by IT companies who have become complacent, thinking that you will always be there for them to come to when they feel like it. You can’t afford to be kept waiting each and every time you need something from your IT provider, and you can’t afford to leave your technology in the hands of someone who isn’t interested in helping you get the most out of your IT. Technology is evolving fast, and having someone there to help you take advantage of innovative solutions can make all the difference to your business’ future success.
Like any good relationship, your IT provider shouldn’t only pay you attention when there is something broken that needs to be fixed. They should want to spend time with you and work on building a solid, trusting rapport with you and your staff. They should want to take the time to learn what your business’ goals and values are, and connect with you without you always needing to be the one who makes the first move.
No relationship should ever be one-sided. If you’re doing all the work, then what’s the point of keeping that IT company in your life? If they’re not giving you everything you need and more, it’s time to let go, move on, and find someone who deserves your business.
Here’s our number: {phone}. Whenever you’re ready to chat with us, give us a call. We’d love to sit down with you, get to know your business better, and find out what we can do to help you get the most out of your current technology and future technology investments. We want to help you reach your business goals, and offer the best possible service to your customers.
And of course, you’re welcome to ask us anything you’d like to know about who we are, what our values are, and what we have to offer. We’re an open book.
Ready to set up that first date and talk technology with a team of professionals who truly care about your business? Give {company} a call at {phone} or email us at {email} today.

Welcome To The (Microsoft) Team!

Welcome To The (Microsoft) Team!

Collaboration isn’t just a buzzword; it’s a mindset. Team-based environments are key to the success of most major global organizations today, and Microsoft Teams wants to be the foundation of their successful future.
More and more, Fortune 500 organizations are making the leap to a distributed workforce and giving up the keys to their dedicated office space – and all the overhead and costs that go with it!
Real estate prices, utility costs, taxes, physical security, and insurance are just a handful of the financial concerns associated with ownership and operation of a brick-and-mortar enterprise. These costs only rise, never loosening their grip on the bottom line. Alternately, the increasing number of platforms catering to organizations with the goal of enhancing productivity, and thus profit, offer an attractive solution. The worst-kept secret is that the vast majority of these programs facilitate workflow for staff, regardless of their physical location. Increasing efficiency and output while decreasing cost and downtime is a no-brainer, with the greatest obstacle often being the fear of taking that first (giant) step.
 
What’s a modern company to do? Obviously, a remote workforce may not be the best solution for every operation, but we want to help make sure that this hesitancy isn’t preventing profitability or productivity. Given that you’re reading this article, you already have a wealth of technology at your fingertips that aids in your professional path. For those same reasons, you’re researching how to make the most of your tools – allow us to present a deeper look at Microsoft Teams and its features.
Microsoft has been an innovative mainstay in the professional arena for more than 30 years. Never allowing a product to become stale, Microsoft likes to release something completely new to its line-up every few years. When a program might otherwise start to lag in functionality behind more technologically-advanced competitors, Microsoft releases a newer-and-improved version, designed to be somewhat customizable to cater to its user base. The team mentality was nothing new when the Microsoft Teams product launched last year and took what everyone loved about Skype for Business, as well as competing products like Slack, and combined their features into one product with fanfare and promise.
With the ability to integrate with other platforms, Microsoft Teams has become a popular and stable product. As the professional environment evolves, so do Microsoft products. Microsoft Teams users are a happy bunch lately, with the latest updates to the platform. Team Owners have been happily adding Guest Users since the feature launched, allowing for a deeper level of collaboration with “external” resources being included in team Channels.
Workflows are progressing and evolving, and often it’s more cost-efficient to hire independent contractors, consultants, and other extraneous resources to support permanent staff. Microsoft Teams allows for Guest User access so that these “guests” can collaborate in a team-based environment and maintain transparency, communication, and quality. Guest Access can be granted so long as users have an email address already in an Azure Active Directory or an Office 365 work or school account. As simple as this process is, it’s important to keep a few points
in mind to avoid confusion:
By default, Guest Access is turned off. The global admin can log in to adjust this setting:

Access the portal’s dashboard: https://portal.office.com/adminportal/home
Find the left navigation menu, and expand Settings.
Select “Service and Admin” and scroll to select Office 365 Group settings.
In the menu that pops up, toggle the second option to “On,” giving Group Owners ability to add Guests, and then click “Save”.
Next, scroll through the list to find and select Microsoft Teams.
In the left navigation menu, find the “Settings by user/license type” and select “Guest” in the drop-down menu, and toggle setting to “On”, then click “Save”.

After changing these settings, Team Owners can add and manage Guest Access within their Team. The next step will be customizing the display names of Guest Users. A Guest User’s display name can be adjusted by following these steps:

In the Manage Teams section, find the Guest Permissions sub-menu.
There are two options that Team Owners can control, and both are set to “false” by default:

You can allow Guest Users to create or update existing channels.
You can allow Guest Users to delete channels.

When you add Guest Users that are not already a part of the tenant, the option will immediately appear asking if you wish to add the user as a Guest User.
Microsoft Teams doesn’t know if the Guest User is a part of the domain that can be added.

A few additional key items to remember include:

When adding a Guest User to the tenant for the first time, you can change the display name by clicking on the “edit” icon next to the Guest User’s suggested display name, at which point a drop-down editor will appear.
Only when you click “Add” can the platform verify if the Guest User can be added to a Team:

Guest Users cannot be added as a Team Owner.
Regardless of what you change the Guest User’s display name to, the word “Guest” will be added as a suffix.
If you happen to be adding a Guest User that is already a registered Guest User, their existing display name will show the suggestion:
The only way to modify this display name is to request the tenant admin modify the display name in your admin portal.

When a Guest User is added to a Team, there is a notification posted to the Team about the change. As noted above, the built-in transparency of features like this is designed to help all users in Microsoft Teams communicate more effectively, stay informed about any changes, and enable immediate collaboration. Integrating people, content, and tools are the driving force in this productivity platform, reinforcing connectivity and a team-based environment as the name states.
Is Microsoft Teams the right solution for you? There’s only one way to find out. Let us help you make 2018 your very best year yet with a deeper look at what solutions like Microsoft Teams can do for you, and how to maximize its features for your benefit – and profit!

5 Ways To Prepare For, Respond To, And Recover From A Cyberattack.

5 Ways To Prepare For, Respond To, And Recover From A Cyberattack.

Addressing cyberattack threats, breach points, policies, company readiness, and recovery.

When we asked businesses about cybersecurity threats, breach points, policies, company readiness, and recovery, we were surprised at the responses that we received. The most frightening response of all was the following:
“We have no formal process for assessing readiness to deal with a cyber attack of any sort.”
Hindsight is always 20/20 – how many times has something happened that you could have and should have prevented? There are five questions every company should ask themselves, at least twice a year:

What are our current cybersecurity threats?
What are common breach points within our company?
What are our current cybersecurity policies?
What is our company’s readiness for a cyber attack?
What are our recovery policies in response to a cyber attack?

Cybersecurity Threats
It’s easy to sit back and think that threats and attacks only happen to other people and other businesses, but not to ourselves. Living in a state of paranoia can be beneficial to the security of your company. Former Intel CEO, Andrew Grove, once stated that “Only the paranoid survive”. Knowing all you can about current and possible future attacks helps you to understand why and how you need to be prepared.
With 2 million new malware attacks launching every day, we need to be constantly alert. Recent examples of extremely dangerous cyber threats are the Meltdown and Spectre bugs, which allow potential attackers to access to private data. Forbes magazine reports that the five cyber threats to look out for in 2018 are ransomware attacks, crypto jacking, education and healthcare cybercriminals, and malware attacks.
Cyberattack Sources Of Breaches
Cyber attacks could threaten your business through a few different sources. For example, employee mobile devices make up for 51% of all cybersecurity breaches, which is extremely troubling, given that there are nearly as many employee cell phones as there are employees themselves. Another possible source of a breach is Internet of Things devices. Together they make up 87% of all the cybersecurity breaches.
Cybersecurity Policies
Cybersecurity policies should be in place to ensure that the company as a whole is all in agreement on what the threats are, how to avoid them, and how to respond to one. Employees should be trained to know how to report a possible cyber attack, as well as how to prevent one.
For example, employees should be taught to always look for e-mails that are suspicious, such as those that include simple grammar mistakes or excessive punctuation. Employees should have policies in place such as how to flag or report a suspicious e-mail. Additionally, employees should all be trained on the importance of avoiding opening or clicking on suspicious e-mails or links. Spectre and Meltdown use these emails as vehicles to reach your prized data. If you limit their transportation, you’ll better protect your data.
Cyber Security Attack Readiness
To check your business for its readiness to handle a cyber attack you should see which of the four main categories your company falls into. Is your organization’s readiness passive, reactive, proactive, or progressive? Passive means that your business is not prepared for a cyber attack – you just hope that it won’t happen. Reactive means that while you aren’t ready to protect against a cyber attack, your business is prepared to react to one. Thirdly, your business is proactive if you are prepared to respond, while also seeking to avoid future attacks. Lastly, your company is progressive if it has deep cyber attack prevention, protection, and reactive capabilities in place.
Recovery From Cyberattacks
Once a cyber attack has occurred, you need to have a policy in place to immediately begin recovery. Cyber attacks have four main effects. In the aftermath, most businesses will see a reduction in their operational abilities, downtime, reputation, and revenue. After a cyber attack, 39% of companies reported a decrease in operational capability as their leading complaint. Downtime came in second with 37% of businesses reporting it as the primary effect on their company. Effects on the operation, and downtime, ultimately result in lost profits. It’s reported that 44% of companies estimate that they could lose over $10,000 within just one hour of downtime.
To protect your business, you need to look at the problem from all sides. Ensure that you and your staff are well trained, and remain vigilant against any cyber attack that could affect your company. Have policies in place, to ensure that staff is proactively working to protect the business’ data, staff, and clients. Should a cyber attack occur, your business should be ready to not only combat it but also recover from it?
 

Will 2018 Bring The Rise Or Fall Of Cybersecurity?

Will 2018 Bring The Rise Or Fall Of Cybersecurity?

A relatively new set of guidelines enacted in the European Union requires many global organizations to reconsider their security practices and update their protective measures.

A quick review of 2017 suggests that it was the worst year on record for cybersecurity – phrases like “data breach“, “phishing”, and “hackers” were uttered in the news so often that we numbed to the shock factor. Checking our credit reports and changing our passwords yet again for banking, credit cards, email, and everything else that impacts daily life is now nearly a quarterly requirement.
What makes cybersecurity such a complex concept is that it’s something we can’t see and that most consumers can’t even fully understand. These are the very elements that put consumers at the greatest risk because fighting an enemy when we don’t know its weaknesses seems challenging, but when the enemy knows ours, it’s terrifying. Cybercriminals are always working to stay one step ahead of the latest steps that consumers take to protect themselves.
What can we expect in 2018? It’s safe to assume that things may get worse before they get better. In many ways, organizations are still playing catch-up when it comes to cybersecurity. Hackers continue to outthink the latest developments in cybersecurity – and how? Because we make it too easy.
Yes, we make it easy – a breakdown in the corporate communication chain, not enough allocations in the budget, and inefficiencies in our security personnel or protocol are just a few of the factors that contribute to why we can’t keep up with hackers.
Is tech about to become all doom and gloom? Not a chance – and those fighting back are doing so with a vengeance. It’s true that governing bodies can’t pass legislation fast enough to keep up with hackers, but it’s also true that we can’t expect hackers to fear the law or those who enforce it.
Have you heard of the General Data Protection Regulation (GDPR)? If your organization has ever done business in Europe, you’ve either heard of it, or you will very soon. In early 2016, the European Parliament began mandating that companies who operate in, do business with, or ultimately collect data on citizens in EU countries will be subject to strict rules enacted to protect these consumers.

While the GDPR is meant to simplify regulations with exceptional standards of consumer data protection throughout 28 EU member nations, the burden falls on hundreds, possibly thousands of businesses employing innumerable IT security personnel responsible for overseeing the implementation of updated standards to meet new requirements.

Now, you may read this and say to yourself, “I don’t do business in Europe or with citizens of EU countries, so this doesn’t apply to me”. Wrong!
While technically these rules may not apply to you, it’s likely that these rules and guidelines will swiftly spread and become the basis for consumer data protection and cybersecurity in general. Initially, regulators are not likely to audit organizations for compliance to GDPR regulations, and leniency is expected in the event of a data breach if the company can detail cybersecurity measures following these rules that were taken to protect consumer data. As with every data breach you’ve read about in the last several months, this will initially be a reactive measure, but it’s still indicative of new cybersecurity standards.
With the May 25 deadline looming, the question is if IT staff at affected organizations have spent the last 18 months properly preparing. That being said, there are several impacts we can predict for 2018:
 

Many, if not most, U.S. companies will not meet GDPR compliance by the deadline
American organizations have certain expectations that have long-since been established by our federal government, and we employ an arsenal of auditors and legal experts to read through thousands of sheets of fine print to understand complex guidelines. The GDPR will be no different.
International law does not add clarity to the situation, and where regulations contradict established laws or expectations based on domestic operations, the cost to continue business will be weighed against the benefits – and the risks.
It’s quite common in the U.S. to apply for an extension to a deadline, but that’s not likely to be an option in this case.
GDPR regulators will quickly make an example of an organization
Those that have not made every effort to comply with guidelines will be dealt with more harshly in an attempt to reinforce the strong position that American companies need to take action.
The decline of password-only protection will accelerate
Even situations where passwords require capital and lowercase letters, numbers, special characters and a minimum character count are becoming obsolete.
The same as how recent versions of Apple’s iPhone required Touch ID, and the latest version incorporates facial recognition, we can expect much higher levels of security to access personally identifiable information (PII).
Attacks via compromised IoT devices will get worse
Physical devices that connect to the Internet can still be hacked. This network connectivity is what makes these devices so attractive, in that they allow the collection and exchange of personal data – that needs to be secure. For the most part, we will be reactive until manufacturers build devices that are “unhackable”.
Automation of some threat-detection tasks will increase
Automation is our best friend and our worst enemy, simultaneously. When the idea of writing code to automate the ability to perform tasks first exploded — given the appeal of efficiency and cost-cutting capability — we opened ourselves to being hacked, and offer yet another entry point due to a cybersecurity vulnerability.

Consider the last time you received an email from a friend or colleague that seemed like their email address was compromised. It was likely a message promoting hair growth vitamins, or from someone claiming to be from Google who recommended you reset your password immediately – but neither the web link nor the “from” email address had anything to do with Google. These seemed like obvious threats that are easy enough to ignore.
What happens if a hacker gains access to the webcam on your laptop and read your personal data through the reflection in your eyeglasses? This seemed far-fetched a decade ago, but today? It’s a genuine concern. Imagine that type of scenario but a hundredfold in complexity, and with access to global consumer data – what do you need to do to be ready?
Knowledge is power: arm yourself with an arsenal of information and be transparent in all professional relationships. We’ll face 2018 together, and emerge stronger in 2019 – together.