With Office and OneDrive or SharePoint Online, you can work together with other folks in your office at the same time on the same document. That feature is called co-authoring, and here’s how you get going on it.
Modern technologies are certainly making it easier for an organization to minimize risk and detect and prevent security breaches when they occur. Between intrusion detection systems, next generation firewall systems, threat management solutions, data encryption solutions, there are a lot of ways to help your organization. However, the basics of security are just as important. If you look at the HIPAA data breach portal, you’ll find a pile of examples of breaches caused by simple errors and security mistakes.
While the FTC doesn’t cover enforcement of HIPAA-covered entities, their latest blog post for business is a must read for your business, no matter if you’re HIPAA-regulated or not. Start with Security: A Guide for Business covers the following aspects of data security in an easy-to-follow format:
While this is an especially important issue to regulated industries, the advice is good for any business to follow.
In any business, keeping operational when you’re supposed to be is always the goal. But what if something happens to keep you from functioning properly? This is especially important in healthcare where timely access to critical health information can literally mean life or death. Is your IT infrastructure ready for worst-case scenario? Do you have a business continuity plan in-place?
The National Institute of Standards and Technology (NIST) has updated its Digital Identity Guidelines (see NIST Special Publication 800-63B). The guide includes a variety of recommendations that can (and many times should) be implemented to improve the security on your network.
One of the things that this update covers is two-factor authentication, which we went over recently. We recommend using it whenever reasonably possible.
They suggest a minimum of 8 characters in your passwords, but they encourage much longer passwords of 64 characters (within reason) and that use of UNICODE, special characters, and spaces should be allowed in passwords. While spaces doesn’t necessarily add to password complexity, it does help folks begin using passphrases instead of passwords (there is a difference). Passphrases in general are much harder to break with brute-force automated techniques, but are easier to remember by users.
Long story short, make sure your password policies are kept up-to-date and that they are secure. Contact us for more information on running a network assessment on your environment to see how your policy is setup (among many other items that we look for).