by Felicien | Oct 17, 2019 | Education
Insert a PDF Into a Word Doc
Need to know how to add a PDF to a Word document? Head here and learn two tried-and-true techniques for seamlessly adding PDFs to any Microsoft Word doc.
Have you ever needed to insert a PDF file into a Word document?
Let’s say you’ve found a relevant chart or graph in a PDF file that you’d like to insert into a report you’re writing in Microsoft Word as a static image. Or, let’s say you want to insert an entire PDF file into a Word document as a linked object.
Below, we’ll explain just how to do both of these tasks using your Windows computer and the following versions of Word:
Word 2010
Word 2013
Word 2016
Word 2019
Word for Office 365
Before we explain these procedures, however, let’s explain what a PDF file is.
What Is a PDF file?
A PDF file is a type of file. PDF stands for portable document format. This format allows you to view a document of text, graphics, or both in a layout that appears as if it’s a printed document. Users can view PDF files on a computer or portable device, print them, or send them electronically.
How do you insert a PDF file into Word as a static image?
To insert a PDF as a static image (that is not expandable or clickable as an object or icon), you’ll first need to convert the PDF to a JPG file. Once you’ve done this, make sure you save the JPG in an easy-to-find location. The following process works best on older versions of Microsoft Word.
1. Open Microsoft Word.
2. Put your cursor in the exact place you want the PDF image to go.
3. Click “Insert” in the menu at the top of Word.
4. Click “Picture.”
5. Within the “Insert Picture” dialog box, find the JPG version of the PDF image you want to insert.
6. Click “Insert,” and the image will be inserted where you last had your cursor.
How do you insert a PDF file into Word as a linked object?
You may want to insert a link to a full PDF file in your Word document. This will result in the first page of the PDF being displayed as a preview. If the preview is clicked, it will bring the user to the full document.
1. Open Microsoft Word.
2. Put your cursor in the exact place you want the PDF file to go.
3. Click “Insert” in the menu at the top of Word.
4. Click “Text.”
5. Click “Object.”
6. Within the dialog box that appears, click “Create From File”
7. Select “Browse” and navigate to the PDF you’d like to insert.
8. Click “Link to File.”
There are other techniques for inserting PDF files into Word documents as well. If the above techniques do not work with your unique device or your specific version of Word, talk to your managed service provider to see how you should go about this procedure.
by Felicien | Oct 17, 2019 | Education
Top Ways to Handle the End of Windows 7 in the Healthcare Industry
Microsoft will end its support for Windows 7 soon. Learn how this will affect your healthcare organization and what you can do to prevent security problems.
Between the years 2009 and 2018, 189,945,874 healthcare records were either stolen or exposed because of cybersecurity breaches.
If that sounds like a lot, that’s because it is. In fact, “it equates to more than 59% of the population of the United States,” according to HIPAA Journal. Obviously, among healthcare organizations, cybersecurity has become a serious concern.
And it’s about to get worse.
In only a few months, the operating system that nearly all healthcare organizations in the United States utilize — Windows 7 — will lose support from its manufacturer, Microsoft.
Microsoft calls this the “end-of-life” for Windows 7, and it’s going to happen on January 14, 2020. The change will affect all businesses and individuals who are currently operating the Windows 7 OS, but healthcare organizations are especially at risk. That’s because this loss of support also means that the majority of Windows 7 medical devices will be running an outdated and unprotected version of Windows.
Fortunately, healthcare organizations can make changes now to avoid serious operating system and security problems in January of 2020 We’ll discuss how to transition to Windows 10 (the most up-to-date Microsoft operating system) in a moment. For now, let’s discuss what it really means that Windows 7 is losing support from Microsoft.
What Do “End-of-Life” and “Loss of Support” Really Mean?
“End-of-life” is the term Microsoft specifically uses to define the period when they will no longer provide software support for a specific application or piece of software. It’s the same as “loss of support.”
Both terms mean that “Microsoft will no longer provide the following:
Technical support for any issues
Software updates
Security updates or fixes”
Why Would Continuing to Use Windows 7 Be Bad?
Most of the precautions surrounding Windows 7’s end-of-life revolve around cybersecurity.
Though you may not have realized it, for the past ten years, Microsoft has been constantly working on the security, efficiency, and fluidity of its Windows 7 operating system. The Microsoft team constantly provides updates and upgrades for Windows 7 users. Moreover, it monitors and troubleshoots possible cybersecurity issues, catching issues and breaches before they start.
Often, these patches and updates are keeping you and your healthcare organization from being breached by cybercriminals who would love to steal your money or get their hands on your data and hold it for ransom.
When Microsoft ends their support, this dam they’ve been maintaining goes away, and the influx of cybersecurity troubles may very well be at your doorstep as soon as the first day of the end of support.
How Can You Maintain Security Within your Healthcare Organization as the End-of-Life Day for Windows 7 Nears?
If your healthcare organization is still using Windows 7, you’re safe for now. But it’s time to start the transition to Windows 10 — Microsoft’s latest OS. You’ll want to start this shift as soon as possible as the change can instigate a sizable change in pace for your business and a considerable amount of expenses as well.
A good place to start is with your managed services provider. The designated IT specialists within your healthcare establishment will be able to help you transition smoothly and seamlessly from Windows 7 to Windows 10.
by Felicien | Oct 17, 2019 | Education
Safeguarding Your Computer System From Ransomware
These days, ransomware attacks are on the rise, and just one can devastate your business. Discover seven ways you can protect your company from cybercriminals.
Your business hasn’t been a victim of a ransomware attack yet?
Don’t press your luck. Ransomware poses a real threat.
The number of cases of ransomware attacks against businesses of all sizes has exploded. In fact, the number of incidents has more than doubled during the first quarter of 2019. Cybercriminals are not only targeting hospitals, municipalities, and financial institutions but businesses of all sizes. Seventy-one percent of ransomware attacks are against small businesses since they are the least likely to have adequate back-up systems in place. According to research from Beasly, the average payout cybercriminals demand from small business owners is $116,000.
This terrifying stuff, but it is something that you need to address to protect your business.
There is No Better Time to Focus on Cybersecurity Than Right Now
October is National Cybersecurity Awareness Month. Now is the perfect time for you to address ransomware and work with your staff to find ways to protect your company against this major issue.
So how can you do it at a reasonable cost?
Talk about this very real and urgent issue with your employees. Conduct informational and training workshops with your entire staff, so they are aware of the severe nature of the situation. Most importantly, tell them that they are the frontline defenses. Remember to provide them with the tools they need to help prevent ransomware attacks at your company.
Install high-quality spam filters and scan all incoming emails for possible threats. The root cause of many ransomware attacks is careless clicking on a link or downloading the wrong file. Make sure your email server is set up to prevent phishing emails and utilize security protocols like Sender Policy Framework or Domain Message Authentication Reporting to stop spoofing emails.
Restrict network administrative roles. No one should have access to administrative accounts with the ability to install or update any software unless, and only when, completely necessary. Take a hard look at the permission you grant each of your employees. Unless necessary, limit employee accounts to ‘read-only’ status, and handle all patching and updating through a single dedicated account.
Disable Remote Desktop Protocol and lock access to common ransomware disk locations. Remote Desktop Protocol allows a person to take control of your computer off-site. Unless there is a and specific reason you need this feature to be active, deactivate it immediately to prevent nefarious use by cybercriminals from accessing your system and installing ransomware. As an added precaution, enable a Software Restriction Policies to stop your network from executing files in locations where ransomware typical embeds itself like the AppData/LocalAppData folder or the temporary folders associated with browsers.
Install and maintain a firewall and limit which applications can run on your servers. Controlling what is allowed into your computer system can significantly reduce the threat of a ransomware attack. While you should set up clear guidelines on which sites your employees can visit through a company computer, a good firewall is invaluable. Consider using technology to create a whitelist of applications and websites your staff can use while blocking everything else.
Create a strict Bring Your Own Device policy or forbid the use of personal smartphones and computers. Setting up a strong defense against malicious cyber attacks is useless if you allow unregulated electronics to connect to your network. The small amount of inconvenience is worth it, and your employees will understand once you explain the reasoning behind any new rules.
Back-up your data regularly. If the worst happens, and your business suffers a ransomware attack, having a separate off-site back-up is invaluable. Make sure there is no direct connection between your primary computer system and your back-up data to maintain the highest level of security.
This month may be National Cybersecurity Awareness Month, but protecting your company’s network from those who want to co-opt it a 365-day job. If you feel you need additional assistance safeguarding your technology, speak with a cybersecurity expert today.
by Felicien | Oct 17, 2019 | Education
Cybercrime is on the rise, and every business must have cybersecurity protocols in place. Read on to learn what steps you need to take to keep hackers at bay.
Cybersecurity is a vital pillar of modern business. Hackers are shifting their attention to smaller enterprises, and data breaches can cost you time, money, and the trust of your customers. Below is a checklist of cybersecurity practices you should employ to minimize your risk of being hacked.
Use a branded email account
A branded email account exudes professionalism and gives you more control and security options than a free email service. Invest in an email provider that has the features you need, and make sure that your employees use only their business email to communicate with team members, customers, and business partners.
Keep software up to date
From operating systems to individual apps, it’s vital to install software updates in a timely manner. Outdated software may contain vulnerabilities that hackers can exploit. Rarely, an OS update may cause issues with certain programs, which brings us to our next tip.
Back up your data
Even the most comprehensive cybersecurity plan has its faults, and you’ll want a way to recover your data if the worst happens. Back up your data on a regular basis to an onsite and/or remote server. Consider investing in cloud storage or automated data backup solutions.
Educate and train employees
To maximize your company’s cybersecurity, you’ll need everyone to be on board and well-versed. Work with your IT team to design a versatile training program that caters to multiple learning styles. For example, you may have a bulleted presentation with concrete examples and a hands-on practice session. The program should teach employees daily security habits, signs of phishing, and what to do if they suspect a data breach.
Monitor all activity on your network
Data breaches can occur externally or internally, 24/7. A managed services provider (MSP) can monitor when devices connect to your network and what files are being accessed. Large data transfers or odd access times may point to a security risk.
Implement layered email security
Phishing is one of the most prolific tactics hackers use to steal data. By pretending to be a co-worker, supplier, or another person of trust, a hacker may send a malicious attachment or link to an infected website. When the victim opens the file or link, the system becomes infected with malware that may log keystrokes or encrypt files with passwords known only by the hacker. Using tools such as DKIM (DomainKeys Identified Mail), DMARC (Domain-Based Message Authentication, Reporting, and Conformance), and SPF (Sender Policy Framework), you can greatly minimize email vulnerabilities.
Manage accessibility and user permissions
It’s important to manage who can access certain files. By setting user permissions, you can grant or deny user access to certain documents. This helps prevent employees from sharing sensitive files with people outside the company or accidentally modifying a report. You’ll want to update these permissions when employees leave the company to prevent remote access.
Set password requirements
Weak passwords are a major vulnerability, especially if a hacker has done research on the account owner. Passwords should be at least eight characters in length and contain a combination of upper and lower case letters, numbers, and symbols. You should also mandate that all employees change their passwords at least
Use multi-factor authentication
Multi-factor authentication (MFA) uses multiple layers of identity verification in conjunction with the traditional username and password requirement. These might include security questions, a retinal or fingerprint scan, randomly generated PIN sent to the user’s mobile device, or a physical token that only the rightful owner of the account would have. The more layers present, the lesser the risk of a hacker getting through.
Just like the technology behind it, cybersecurity is constantly evolving. Whether you have an in-house IT team or an MSP you can trust, it takes teamwork and vigilance to keep your data safe and your customers confident in your business.
by Felicien | Oct 15, 2019 | Education
October 17 is Get To Know Your Customer Day! Knowing our clients is foundational to everything we do – do you know why?
You may have heard that industry-leading, award-winning, unbeatable IT services come down to one specific thing.
Maybe it’s offering the latest, greatest, fanciest, tech gimmicks (which also tend to be the most expensive). Maybe it’s the lowest possible monthly price (coming, of course, with a long list of addendums, conditions, nickel-and-dime fees, etc.)
But what really matters in IT? People, of course.
Why Is It Important To Know The Customer?
Understand What They Need.
It sounds simple, right? Knowing what the client actually wants out of their IT should be the first step to delivering those services, but often, the opposite is true.
It can be easy to think that whatever services being offered are everything that a client could need. But the truth is that often a given client is really interested in one specific service or solution – an answer to their problem that got them looking for a new IT support provider in the first place.
It seems obvious, but it’s crucially important to good service: once you know what’s needed, you can ensure it’s provided.
Understand How They Communicate.
We’re very careful about the technical jargon that technicians and engineers are prone to use when talking shop. While it’s acceptable around coworkers, that kind of high-level, incomprehensible language won’t be very helpful to the client during a support call.
Also, we make sure not to forget to take into account the medium in which our clients prefer to get in touch. More and more these days, when someone has to get in touch, they do so via text or email instead of over the phone.
Understand Their Goals.
Lastly, for long-term success in service, we need to know where the client is headed – or, at least, where they’re trying to get to.
After all, no business can get stagnant. It’s vital that they continue to grow and improve, and their IT environment is a big part of that.
In our preliminary discussions with the client, we want to be sure to find out what they’re plans are for the next year, five years, and so on, and what role their technology could play in that plan.
Bottom line: the user experience is the single measurement for the quality of any given solution or service, and that includes IT services. That’s why Get To Know Your Customer Day is such special day!
by Felicien | Oct 15, 2019 | Education
Is HIPAA Compliance Enough for Absolute Security?
HIPAA is designed to help healthcare organizations keep patient information secure, but is it enough? Find out where HIPAA could be lacking and what needs to be done for absolute protection.
The Health Insurance Portability and Accountability Act (HIPAA) is in place specifically to protect sensitive information in the healthcare operation. With a complex and diverse listing of standards regarding how information can be handled, how systems should function, and how things should be done within an organization, HIPAA does do a lot to protect patient information. While most organizations stick closely to these standards, there is no real way to certify you are actually compliant.
Sadly, the inability to check compliance and the lacking aspects of HIPAA compliance can lead to a cyber-attack or major data breach. Healthcare cyber-attacks cost as much as $1.4 million in recovery, so making sure compliance is where it needs to be and considering whether more needs to be done is important.
Reasons Why HIPAA Compliance Alone May Not Be Enough
Even though HIPAA policies and standards are generated to protect private and sensitive information in the healthcare industry, the truth of the matter is, HIPAA alone does not address every security concern. It is unfortunately not uncommon for a healthcare industry manager to foolheartedly put all of their faith in HIPAA compliance and completely miss that certain security defenses are missing.
In the most basic terms, HIPAA standards are designed to provide the most basic security setup in the healthcare industry. There is nothing stating that following these minimum standards will protect your healthcare business from every single threat there is where information security is concerned. Furthermore, cybersecurity threats evolve and develop so quickly that HIPAA doesn’t catch up fast enough to make much of a difference. Pair this with the fact that many healthcare organizations already struggle to keep up with newly developing security concerns associated with cloud data storage and the Internet of Things (IoT), and you have a lot of looming risk to speak of.
Rely On More Than Just HIPAA Compliance and Amp Up Security Efforts
Of course, HIPAA compliance is important, but it never hurts to up the efforts to make sure every aspect of the digital operation is secure and safe. There are multiple areas where security must be address in a healthcare organization’s digital infrastructure according to Health IT Outcomes, including:
Controlling access to the system in a way that yields sensitive information only to those who would need to see it within the company
Maintaining a stable protocol that dictates how risks are identified and handled on a daily basis
Having an excellent security plan in place that acts as a go-to guideline for proper security practices
Maintaining assets in a way that carefully documents the existing location of all assets, data, and other components of a system
Implementing an information security incident management plan
Controlling the physical hardware and keeping it secure at all times
Organizing security plans that work for all aspects of the organization
Naturally, handling HIPAA compliance is also part of what is necessary, but as you can see by this detailed list, it is only one part of ensuring network security. It is not the only process to be considered for absolute security.
Final Thoughts On HIPAA Compliance and True Security
Even though HIPAA sets forth decent standards, the process of applying these standards to put them to work within a healthcare operation can vary considerably. Furthermore, some HIPAA compliance standards only cover the basic necessities of having a secure system. Unfortunately, these two facts can leave a healthcare facility with digital security concerns they have no idea exist. It is always a better idea to take things further than even HIPAA recommends to secure the system properly with the help of an IT managed services company and make sure all aspects are covered.