by Felicien | May 1, 2019 | Education
Monitoring employee behavior is nothing new, as supervisors have been stalking their staff for generations. What has changed is the degree to which employee behavior is transparent in the workplace, with sophisticated monitoring solutions in play one could argue that nothing is truly sacred when it comes to being monitored by your business. It is standard practice for all phone conversations to be recorded in a customer service setting, but this is expanding dramatically into detailed tracking of websites that are visited and even emails that are being sent and received. Employees may not often think about the fact that personal emails that are being checked on business-issued phones or laptops are fair game for tracking — but they are. Whether this tracking is meant to identify underperformers or to protect the IP and sensitive data of the organization, there are laws in place to protect both the employer and the employee.
What Are You Trying to Accomplish With Monitoring?
When you are considering monitoring your staff members or contractors, the most important question to ask yourself if what you’re trying to accomplish. Do you have some underperformers, and are trying to gather information about their work habits? Do you suspect corporate espionage? Do you simply want to protect your organization from the productivity drains that occur when staff members spend an inordinate amount of time on social media? Understanding the business driver will help you more fully define the legal reason for gathering this type of information from your employees. You might even have someone who seems to be absent — even though they are technically “at work” every day. Monitoring of their access badge would fall under these same rules for electronic monitoring. As you’re defining your monitoring program, also look at the success metrics. Are you attempting to reduce the time spent on social media? If so, you also need to have in place a way to communicate that employee behavior is outside the expected norms.
Employee Notification of Online Activity Tracking is Crucial
The majority of employees are simply going about their daily work, unconcerned that their employer could be potentially tapping into conversations on email or their phones. These individuals probably have nothing to hide, because they are being good stewards of time and resources and only doing a little light shopping at lunch, for instance. Others might be extremely concerned and secretive about their online behavior, going so far as to surf in incognito mode or clear out browser activities when they close down for the day — never realizing that these steps probably don’t make a bit of difference in whether their employer can still see their activities. If your organization plans to do any kind of monitoring at all, it should be detailed for employees as they are onboarded. A safer practice would include asking employees to sign the most recent version of the policy on an annual basis to indicate that they understand and agree with the monitoring that is being done.
Handling Second-Party Notifications of Recorded Activities
In many states, there are legal standards that require that both parties to a conversation must be notified and agree that the tracking may take place before the activity is deemed legal. There are some workarounds such as a conspicuous posting on your website or an email signature that warns all parties that continuing the conversation with a staff member is considered their agreement to recording the messages. However, this remains a legal challenge in many states. As the government begins to look more deeply at personally identifiable information (PII) and exactly who has access to that data, you might run into additional legal challenges due to the various data breach notification statutes that are currently in place in 48 states.
IoT in the Workforce
Perhaps on of the most controversial conversation around employee monitoring is around connected devices, such as wearables. These items can be capturing data that is extremely personal to the employee, much of which would be considered protected health information (PHI), including things such as heart rate, miles walked, calories consumed and more. Mobile phones that are provided by the company could easily contain apps that would record the information. If you’ve installed keystroke logging on these phones, are you capturing more personal information than you intended?
While you may feel as though you can list the key legal concerns with employee monitoring, the best course of action is to engage an attorney to ensure that you are staying clear of any legal implications of your actions. This is especially true before you take action based on your monitoring findings, such as a formal employee write-up or termination. While triggers can be written to turn monitoring into an effective tool to ward off data loss, there are still plenty of pitfalls to consider before creating a widespread online activity monitoring program.
by Felicien | May 1, 2019 | Education
The red tape that normally surrounds the administration of patients in the healthcare industry is a leading cause of physician burnout, as many data experts have noted. Healthcare providers are responsible for a growing volume of paperwork and other off-patient work, and the trend towards greater bureaucracy seems to be inevitable. By some estimates, one hour of bedside patient care results in two hours of paperwork post-visit for the average physician.
Fortunately, AI-driven resources are finding new avenues for physicians to spend less time in front of mounds of paper. With new technology in tow, there are now new ways to administrate patient encounters. Physicians are able to stay in compliance with watchdogs, take smarter notes on patients and provide better overall care.
AI in the Medical Marketplace
One such technology, Suki, is a voice-enabled digital assistant that is made specifically for professionals in the medical industry. Suki is designed to help doctors with patient documentation, giving them more time to focus on the bedside. The technology has the ability to respond to complex voice commands, using those commands to create notes that are clinically accurate. The program also has the ability to enter those notes directly into an electronic health record (EHR) system.
No voice technology is able to completely replace direct input, but it does reduce the need for it immensely. AI also reduces the instance of human error in the data input stage during medical transcription and dictation. The result is a significant time savings when creating and organizing medical documents.
Where the technology succeeds most is in leveraging AI to “teach” the program the idiosyncrasies of the physician that is using it. Eventually, the Suki that is used by an individual physician will become a digital scribe that is unique to that person, fully capable of note taking with very low input from the physician himself. Suki is based on successful commercial digital assistants like Alexa, but the nod to the medical industry is an essential one. Currently, commercial digital assistants do not have the ability to learn from esoteric medical terms or organize records in a way that is specific to medical watchdog standards.
Other speech recognition systems that are focused on medicine include Sopris Health, Deepgram, Saykara, Dragon Medical Practice Edition and Nuance.
The Link Between AI and EHR
Digital assistants for the medical industry must be specific to the industry for another reason – the mandatory use of the EHR in the industry. HIPAA standards now require EHRs to form a significant part of each provider’s data infrastructure. Any note-taking or administration program that claims to help the medical industry must follow the protocols set forth in HIPAA standards.
The fact that Suki and other AI driven technologies kept these standards in mind allowed them to more easily implement new features that are relevant to physicians. These features include customer-facing options such as imaging and X-ray integration and supply-side improvements like improved end-user response times.
EHR technology gives the physician room to dictate data on a patient while in the room seamlessly, but only with the right process in place. Having a digital assistant that is geared to dictate medical records saves huge amounts of time. Many doctors in the orthopedic and sports medicine industries report that they are saving up to an hour of administration time per patient.
With AI and EHR in tow, doctors have the choice to document the patient during the visit or after. This saves a huge amount of time during the initial visit, a time that is usually spent gathering the entire patient history. Experts believe that doctors will save even more time when patients begin to become aware of these technologies. As patients become more open to their use, more doctors will implement them with greater levels of comfort.
Patients can also take command of the notetaking process when AI and EHR are used correctly. As notes are being taken, some doctors actually encourage patients to chime in if there is a point of clarification or some information that has not been considered.
Patient and Clinician Satisfaction
It is well known that doctors are judged by their bedside manner just as much as their technical skill or knowledge of medicine. One of the major benefits of AI is the ability to reduce physician burnout, a phenomenon that reduces the ability of physicians to present a warm, empathetic bedside manner.
Initial studies on Suki show an average note completion time of 1.5 minutes, down from 4.8 minutes per note without Suki or any other voice assistant tech. This adds up to approximately one hour of time saved per day. More importantly, it increases the time that doctors can spend truly connecting with patients during the encounter.
Future Success
Although the advantages of AI are well documented, its success depends on a number of factors. Experts have stated that vendor support is essential for more widespread adaptation of the technology. There must also be more attention paid to the unique needs of the physician practice.
by Felicien | May 1, 2019 | Education
All notifications are not created equally, especially when it comes to business hours. That becomes apparent when sifting through multiple items on your iPhone or iPad. You want the alert from a peer letting you know about the receipt of a critical signed document, but not constant annoying pings about the latest updates to Candy Crush.
With a few tweaks to your iOS settings, you can avoid these annoyances in the future by taking control of what pops up while you are working.
Make Use of Do Not Disturb
There are times that you want to eliminate all distractions during business hours. It could be while preparing to sit down with a potential new client or when you are going over the implementation of a new organizational strategy with your employees. The last thing you want is to have your iPhone or iPad continually going off at critical points.
The latest iOS 12 updates make it a snap to go into your settings and silence your notifications during crucial junctures like these. Just swipe up from the bottom of your iPhone screen (or down from the top right on your iPad screen) to bring up a moon icon. All you need to do is click it to silence all your notifications.
Pressing and holding the moon icon for a few seconds more brings up additional options that control how long you silence your notifications. You can also press the “Settings” button at the bottom of the list for more detailed control over the length of your DND period.
Manage Alerts Through the Notifications Center
The Notifications Center allows you to make more permanent changes when it comes to managing your alerts. You can activate the Notification Center by swiping down from the top of your iPhone screen (or the top left/center of your iPad screen). Notifications can be viewed as a single entity or in multiple batches.
There are two ways to activate notification management. You can drag the notification from left to right and reveal the “Manage” option. Selecting “Manage” provides you with new options. Or, do a long press on a notification to bring it to the forefront. Select the three-dot icon at the top to bring up the same options.
Deliver Quietly — You will still be able to see your notifications within Notification Center but will not see them on your lock screen. The alerts will also not make sounds, show a banner, or badge the app icon.
Turn Off — Pressing this button allows you to turn off all notifications from a specific app.
Settings — Pressing this button takes you to the notification settings for the app that sent the alert.
Going this route allows you to silence some notifications while allowing others through. That means essential Skype meeting notifications still gets seen, while updates on your favorite sports team wait until you have time to review them.
Controlling Notifications Via Settings
You can also maintain your alerts the old-fashioned way through your settings icon. Clicking on it will bring up a list of options you can select, including one labeled Notifications. The Notification Style section allows you to choose any app and view selections enabling you to control when and how it sends you notifications. Those choices include:
Allowing or disallowing notifications from an app
Choose the way you wish to be notified by an application
Change the appearance of banners that appear for alerts
Imagine that you have separate apps controlling your business and personal emails. You can use the settings to prevent alerts from your non-work email account while still allowing business emails to come through. The Settings section also let you decide whether you want to group important notifications or see previews of relevant messages.
Thanks to the iOS 12 update, you have a variety of possibilities at your fingertips. So take some time to explore your notification controls and ensure that only essential items come through during business hours.
by Felicien | Apr 30, 2019 | Education
Whether you are a cybersecurity expert or not, there are some security risks that every business leader needs to be aware of—and UEFI rootkits definitely fall into that category. These nasty computer viruses are uniquely dangerous to your computer systems because they do not get wiped out when you reformat your hard drive or reinstall your operating system. Instead, they stick around in your computer’s flash memory and pop right back up again when you try to start using the machine. It is important that everyone be aware of UEFI rootkits to minimize their spread and limit the damage they can do to your systems.
UEFI Basics
To understand what makes UEFI rootkits so difficult to deal with, you first need to understand the basics of how modern computers are set up. You have probably heard the term BIOS before. The basic input/output system was the firmware used for decades to start your computer up, among other functions. But in recent years BIOS was replaced by Unified Extensible Firmware Interface or UEFI. UEFI is also used to boot up your operating system, among other tasks. Because it needs to be able to start up everything else, UEFI resides in your flash memory—the same place that the UEFI rootkit resides once it infects your computer.
What UEFI Rootkits Do
The genius of the UEFI rootkit is that it is placed in the one area where you are unlikely to get rid of it using normal security measures. It infiltrates your UEFI on your flash memory. The specific location of the virus is ideal to keep it coming back again and again. The antivirus does not find it. Even wiping the hard drive does not touch it. Only a very targeted effort to remove it from your UEFI will eliminate the problem from your machine.
The Challenge of Getting Rid of a UEFI Rootkit
For most computer users, the basics of security begin with running antivirus and antimalware products. But the majority of these products will not even look at your UEFI, which means they are not going to find a UEFI rootkit. The next step, which is typically considered quite drastic, is to wipe your hard drive and reinstall your operating system. Almost every computer virus can be eliminated by taking this step. Once you wipe the hard drive, you wipe out the virus. Yes, you have to go through the inconvenience of reinstalling everything—which can be very inconvenient, depending on what your business computers have installed and the kind of work you are doing. But it is usually a surefire way to eliminate a virus.
What can be so frustrating for businesses is that even taking the drastic measure of wiping and reinstalling does not solve the problem. You can even swap out the hard drive and install a brand new hard drive. When you consider that applying all of these fixes could take days for companies with tens or even hundreds of computers, you can appreciate how maddening it would be to have the problem persist.
What Can Businesses Do to Prevent UEFI Rootkits?
There are a few things that businesses can do to prevent these nasty viruses from showing their ugly heads:
1. Educate those that need to know.
Whatever IT staff you have, even if it is just a computer-savvy employee that keeps things going smoothly, should be educated on UEFI rootkits. When people know about them, it becomes much easier to address the problem. If you have taken the normal steps to eliminate the virus and it keeps popping up, you could have a UEFI rootkit problem on your hands.
2. Consider getting new hardware if you do not have Secure Boot capabilities or something similar.
Secure Boot is a solution used on modern computer systems to prevent unauthorized access to the firmware. It requires that anything attempting to make a change to the computer’s firmware have a security code to make changes. If it does not have the security credentials, no changes can be made. Older machines do not have Secure Boot capabilities.
3. Verify that your Secure Boot configuration is properly set up.
Secure Boot is not a fix all. It does need to be properly configured to work as intended. Make sure that all of your Secure Boot systems are properly configured to prevent anyone from accessing your firmware when they should not.
by Felicien | Apr 30, 2019 | Education
Evaluating information technology can be a challenging aspect of the CFO role. Your organization is likely inundated with requests for new IT features, and understanding the true value of many of them requires technical knowledge you may not have. The spending possibilities are nearly endless, and many CFOs have reason to be cautious. Perhaps you’ve been burned in the past, too, convinced by your CIO to sign off an expensive software package that failed to deliver.
In this arena, there are competing fears. You want to avoid spending money on IT solutions that don’t ultimately deliver the promised benefit or that cause unneeded disruption. You also can’t afford to reject an IT request that would have given you a competitive advantage (or worse, one that allows your competitor to gain the upper hand).
Evaluating IT is a tricky business. Here’s our CFO’s guide to evaluating information technology.
Communication Is Key
Communication from the CIO or the tech team is one of the big pain points CFOs face. There are a few reasons for this.
Apples and Oranges
The first communication difficulty is one of dialect. It feels like the IT folks are speaking a completely different language than the finance folks. To a certain degree, they probably are. Your IT group is focused on enabling the company to do more through technology and on increasing your business’s capabilities. Your group spends its time considering the financial aspects of the business. There can be inherent tension there.
Unhealthy Shortsightedness
In some businesses, it’s even worse. In unhealthy businesses, the CIO and IT team pursue technology innovations that don’t truly align with the company’s needs. They lobby to purchase software that adds capability you don’t need and solves problems you don’t have. Similarly, the CFO and the finance team in an unhealthy organization can fail to see the value of a spend or defer a purchase long enough that a competitor gains an advantage.
Either side of the equation—IT or finance—can become too narrowly focused on its own objectives. When this happens, the company loses out.
Finding Common Ground
CFOs and CIOs need to find common ground, a shared language that focuses both on the ultimate goal: making the company succeed. Ask bigger questions. Which of the company’s (not the department’s) goals will this IT spend help achieve? Is there a less expensive alternative that will still meet the company’s goals? What metrics will we gain by implementing this solution, and how will those benefit the company? Are there any metrics that can show how the proposed investment will improve a process? If those metrics show that an investment is failing to deliver, can we get out of the contract?
Questions like these are all rooted in a “what’s best for the company” mentality. Find a common language using questions like these, and avoid conversations that only benefit finance or IT.
Establish a Clear Approval Structure
The likelihood of conflict between the CFO and CIO increases greatly in organizations without a clear approval structure. To determine whether that’s your organization, mentally answer the following questions.
Do you (or your reports) approve every IT spend?
If not, who else can approve?
What criteria determine which requests require CFO approval? Dollar amount? Subscription/lease entanglements? What else?
Is there an established, documented appeal process when you deny an IT spend?
Depending on the size of your organization it may not be sensible for the CFO to approve every spend. Individual projects may have their own needs and budgets. If that’s the case, a clear approval structure is still crucial. Who on the team can make purchasing decisions? What criteria kick the decision up to a higher level?
In the end, to have a clear approval structure your business needs both a clear vision and strong, clear communication between the finance and tech teams and their leaders.
Visualize your Strengths and Vulnerabilities
Another central problem with evaluating information technologies is prioritization. Everyone wants a piece of the budgetary pie, and it’s your job to allocate it. You need a way to determine where your priorities ought to lie. This is challenging in complex organizations due to the number of requests and the varied nature of those requests.
Creating a visualization of your IT strengths and weaknesses can help you plan and prioritize. What can IT presently do for you? What are the known vulnerabilities? What systems or programs are on their way toward obsolescence? What functions or abilities does the organization view as needful but doesn’t have currently? Are there information technology solutions for those functions or abilities?
Mapping out your strengths and weaknesses gives you a clearer picture of which moves are strategic.
Conclusion
That’s it for our quick CFO’s guide on how to evaluate IT spends. If you want to learn more on this topic, or for assistance with a wide range of IT-related questions, contact us today.
by Felicien | Apr 30, 2019 | Education
For several years now, sporadic attacks that interrupt major networks’ daily programming have been occurring around the world as hackers try to break in and succeed at their digital violence.
In April 2019, the victim was The Weather Channel. The network found itself having to broadcast pre-recorded material while an internal plan to regain channel access was quickly developed and put into place. Because this happened during some peak air morning air time—between 6 A.M. and 7:40 A.M. EDT—a significant number of viewers were affected. Aside from money the network needed to spend on emergency tech measures to get their channel back and rebuild it to a more secure form for the future, this event must have cost them reputation points as it likely didn’t sit well with advertisers.
While the network publicly announced that malware was at play in the attack, there has been speculation about whether this was the result of ransomware. With ransomware, the disruptive effects of malicious software persist until a specified amount of money has been paid. And although the malware attack itself may seem senseless, this stands as a good opportunity for your business to take some precautions to protect itself.
Back-up your machines and networks. Having multiple layers of back-ups in place—both locally as well as in the cloud—can help easily restore your systems should a ransomware attack strike. Part of this also includes making sure you set back-ups to happen regularly; this ensures that you have fixed and reasonably recent recovery points to draw upon in the event of an emergency.
Break up network access by different machines and user groups. Odds are that very few users if any need to have access to everything in the business; why leave full access open to anyone? They’d be a source of major vulnerability since, should a hacker gain access to their account, everything would be up-for-grabs. Leveraging the limited access of specific user groups or permissions helps contain an attack should one arise, and prevent damage from spreading business-wide. You and anyone on your team might be the exception to this in that you all need total access to be possible somehow. Fortunately, you can always construct a solution, such as several different administrative users with limited permissions, to give you the tools you need for your job while still maintaining high security.
Train employees and enforce best practices. Make sure that everyone working at your business understands what steps they can take to protect their computers from hackers as well as how some of the most common types of threats work. Empower your people to set up strong passwords and to know when to trust an attachment or link. Make sure they follow through on some of these precautions by requiring them to take measures such as setting up multi-factor authentication on their accounts. Don’t let weak security be a possibility!
Install software to secure your machines and scan for attacks—and make sure you keep it up-to-date. First off, you want to try to make sure your machines and networks are fortified against attacks. Use a well-constructed firewall as a central part of your protection plan. But don’t rely entirely on a strong structure to protect your business, particularly given how rapidly tech evolves. Make sure you have systems in place that anticipate vulnerabilities and keep an eye out for attacks. Some businesses even opt for honeypots, which are like dummy vulnerabilities to bait potential attackers and keep a digital weathervane in place to tell if hackers are likely to try something. Regularly update these scanning tools to ensure they are up-to-speed with the latest hacker trends and potential aggressors.
Malware attacks cost businesses large amounts of money, accounting for as much as about one-third of global cyber attack costs in recent years. In fact, cybercrime in the United States is estimated to cost enterprise companies an average of $27.4 million per year, a number that is only continuing to climb over time. If you’ve been fortunate enough to not experience any recent spikes in malware attack attempts, don’t let that lull your business into a false sense of security. After all, 85% of companies polled had experienced a social engineering or phishing attack in the past year, while 75% had at least one web-based attack. Regardless of your company’s size, remaining vigilant for possible threats and attacks is important to ensure that daily business operations can continue to flow as usual, uninterrupted and uncompromised.