Steps toward BYOD Defense

As Hospitals and Medical Facilities extend wireless access, it is essential to develop a robust BYOD defense plan. The public nature of hospitals and the large traffic of visitors, professionals and staff increases the risk of exposing data, violating patient privacy, and malicious attacks. The recent attacks at Target and Neiman Marcus expose the sophisticated […]

Technology Adoption and Utilization in Healthcare

Technology adoption and utilization remains one of the primary challenges facing practicing physicians according to The Physicians Foundation, a non-profit seeking to advance the work of practicing physicians and help facilitate the delivery of healthcare to patients. In their 2014 watch list The Physicians Foundation has listed five critical challenges facing practicing physicians. Practice and Insurance […]

Making Big Data Pay

Successful business leaders are learning ways to leverage big data within the organization. According to an independent study by the the Economist Intelligence Unit, the business landscape is dramatically changing based on the massive level of data being collected each daily. While effective use of big data can be daunting, some businesses have effectively utilized […]

Security and Longline Phishing Attacks

Just as new technologies are changing the workplace, new technologies and methodologies are also advancing among cybercriminals. The recent attacks at Target, Neiman Marcus and others utilized a combination of highly-sophisticated attacks that incorporated social engineering, parsing malware, and more. More and more businesses face the threat of advanced attacks like longline phishing. Proofpoint coined […]

Four Steps in Transforming Your Digital Strategy

Developing an integrated digital strategy can play a key role in planning your business’s long-term future. It not only helps align your technology investment strategy, it may may also help you consider the future of processes and product/service lines within your business. As your business considers developing an integrated digital strategy, McKinsey & Company suggests […]

Developing an Integrated Digital Technology Strategy

What’s your digital technology strategy? While businesses from large to small use technology in almost every level of business, not many business think in terms of an integrated digital technology strategy. The analysts at McKinsey & Company developed an digital technology matrix that can help businesses think about how technology is integrated at every level […]

9 Out of 10 Mobile Apps are Vulnerable

According to a recent HP Research Report, nine out of 10 mobile apps have vulnerabilities that could pose a security threat. HP Security Research tested a representative sampling of mobile applications that included reviewing the security of 2,107 applications by 601 companies listed in the Fortune Global 2000.[1] About 97 percent of the mobile apps […]

Offering Seniors Digital Health Tools

Seniors are increasingly interested in utilizing digital health tools to manage their healthcare. According to a recent study by Accenture 57 percent of American seniors are interested in using digital options for managing their health services remotely.[1] Currently only about one-third of medical facilities are offering digital health tools. How are senior adults interested in […]

The Four Phases of BYOD

Mobility is driving change in your organization whether you recognize it or not. In a recent press release, Gartner Research indicates that the utilization of mobiles devices will transform information security as we know it. [1] Some organizations are still attempting to ignore the BYOD issue, but it’s not going away. According to Gartner, the […]