According to a recent Websense report, phishing campaigns dropped to 0.5 percent in 2013 (from 1.12 in 2012), but the campaigns have also become more sophisticated and targeted. [1] Phishing emails lure the receiver to respond by clicking a link and giving personal information to what appears to be a trusted source. These campaigns are […]
Reducing EHR Risk
Reducing EHR risk must be integrated into transition planning, implementation and follow-up in order to avoid EHR failure, according to Dean F. Sittig, Ph.D., professor, School of Biomedical Informatics at the University of Texas Health Science Center at Houston. “The potential consequences of an EHR failure become of increasing concern as large-scale EHR systems are […]
Small Data Centers for SMBs
As SMBs realize the need for processing, analyzing and protecting data, they face the challenge of effectively managing and developing a small data center within the organization. Managing a data center in an SMB context often means juggling a range of challenges like budget constraints, cultural boundaries and perceptions, and spacial limitations. IT World recently […]
Challenges of EHR Adoption
Satisfaction with EHR implementations has dropped over the past two years, and new implementations are slowing according to recent study by American EHR.[1] One big problem highlighted by this study is reduced productivity due to the lacking usability. Think about ease of use for a moment. Every day over one billion people visit Facebook through […]
Network Protection through Asset Inventory Control
Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]
Smart Steps to Improve Network Performance
Solving IT challenges in “rapid growth” organizations requires more than just cash flow. Integracon helps organizations address challenges with cost-effective strategic solutions that improve network performance without breaking the bank. One of our clients, a rapidly expanding church, asked us to help them solve some of the performance problems in their network. Integracon developed and […]
Password Reminder
If you’re not using a password reminder, then it’s likely that you’re using the same memorable passwords for several websites; either that, or you have a stack of stickies hanging by your desk. In both cases, you may not be keeping your online information secure. Lack of password complexity as well as lack of multi-factor […]
Security: Are Software Companies to Blame?
A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]
BYOD and Containerization
Some organizations are turning to containerization as way of managing personal wireless devices that interact with company networks. When the University Hospitals Health System in Shaker Heights, Ohio introduced BYOD, they needed a robust MDM solution. Ryan Terry, division CIO and chief security officer, saw problems with many traditional MDM options because he felt that […]
Importance of Changing Passwords
Weak Passwords If a user has a weak password that is based on a simple pattern, then a password-cracking device may parse through a list of words and word variations quickly guessing that password. Some examples of weak passwords include (list below is adapted from Wikipedia): Default passwords like “password.” Words found in the dictionary. […]