Login 

Call Us Now:

Weston Technology Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.

Security

Mobile Device ManagementAs a business owner, you’re likely familiar with locking down the data on your corporate-owned computers. With technologies like disk encryption and strong password policies and other security measures, you can assure that it will be pretty difficult to access data that shouldn’t be accessed.

But what about those computers in your employees’ pockets, the fancy smartphones they carry around? Have they ever used them to access company email, files, documents, calendars, or contacts? It is certainly very convenient and can increase productivity to have access to that data with you at all times. What would happen if they were to lose that phone or if the employee left? Would your data or access to your company’s data fall into the wrong hands?

Not if they were secured by WestonSecureMobile, powered by IBM MaaS360. Previously, if you wanted full control of your employee’s mobile access, you’d have to buy them all phones and lock them down. With WestonSecureMobile, you can allow them to bring their own personal devices and you won’t have to worry.

WestonSecureMobile uses industry-leading technologies to allow your employees to access company resources on their mobile devices securely without putting their personal or your corporate data at risk. WestonSecureMobile is a suite of secure applications that gets installed on your phone that keeps your corporate data access secure and separate from the personal data on your phone. It provides centralized management of the devices, allowing you to selectively control access to corporate data, much as you would with your Windows Server back at the office.

If a phone is lost or an employee leaves, you can wipe and lock down portions of the phone that were accessing that data so the user’s personal data is left alone. It also allows tracking of the devices if they are lost or stolen.

It’s certainly cheaper to allow your employees to bring their own devices. With WestonSecureMobile, you can be assured that bringing their own device won’t compromise your company’s data or put it at risk. Contact us today for more information and pricing.

healthcareIT2The U.S. Department of Health and Human Services (HHS) has launched a revised breach portal (or “Wall of Shame” as it’s known in the healthcare industry). The newly designed tool can be found here. According to Healthcare Informatics, This redesign features improved navigation for both those looking for information on breaches and ease-of-use for organizations reporting incidents. What that means for you is that, yes, your life as a HIPAA security officer will be easier as you’ll be able to submit breach notices easier. However, as a clinic manager, it also means your patients can find breach notifications easier, making it easier to find out if you messed up or are currently under investigation by the Office of Civil Rights.

It’s best to keep yourself from ever being on the Wall Of Shame in the first place, and Weston can help. We have a variety of HIPAA-friendly services that will help secure your environment, train your employees, assess your compliance and vulnerabilities, and keep you from hopefully ever having to visit that site. 

twofactorWe’ve obviously chatted about passwords and passphrases and tips for managing too many passwords. Obviously, strong passwords are very important in protecting your online accounts, but there is an additional way you can protect many of your accounts: two-factor authentication. What is it and why should you use it? Read on for all the details.

seccompRansomware, a type of malware that encrypts data on infected systems, has become a lucrative option for cyber extortionists. When the malware is run, it locks victim’s files and allows criminals to demand payment to release them.

Unless you’ve been living under a rock, you are probably well aware that ransomware is a hot topic in the news these days. Organizations of all types and sizes have been impacted, but small businesses can be particularly vulnerable to attacks. And ransomware is on the rise. In a recent study conducted by security software vendor McAfee Labs, researchers identified more than 4 million samples of ransomware in Q2 of 2015, including 1.2 million new samples. That compares with fewer than 1.5 million total samples in Q3 of 2013 (400,000 new). Ransomware is distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.

There are ways to protect your business against ransomware attacks. In this e-book you’ll learn how the malware is spread, the different types of ransomware proliferating today, and what you can do to avoid or recover from an attack. Hiding your head in the sand won’t work, because today’s ransom seekers play dirty. Make sure your organization is prepared with our ransomware guide for your business.

Have You Signed BAAs with your Vendors?

Posted by on in Security

healthcareIT2If you are a HIPAA-regulated business or deal with HIPAA-regulated industries, you really have to trust your vendors. A security breach at a vendor’s office may as well be a breach in your office, as far as HIPAA is concerned. You need to have a business-associate agreement (BAA) signed with those vendors. And if that vendor has no idea what a BAA is, you might want to reconsider your relationship with them, for your own protection. In a recent news story, an Illinois-based clinic was fined $31,000 because they didn’t have a BAA signed with a vendor hired to store paper records containing patients’ protected health information (PHI) (that vendor is the focus of other investigations). You can read the full cautionary tale here. If you need any assistance with your vendors or other HIPAA regulations, don’t hesitate to contact your local Weston office today.