508-909-5961 [email protected]

How to disable Windows 10’s intrusive privacy settingsMost tech companies, such as Microsoft, collect certain information about their users so they can provide better, more personalized experiences. However, these companies also often use the data they gather for advertising purposes. The good thing is that as a Microsoft user, you have a fair amount of control over your own privacy. In fact, […]

The post How to disable Windows 10’s intrusive privacy settings appeared first on Complete Technology Resources, Inc..

How to disable Windows 10’s intrusive privacy settings

Most tech companies, such as Microsoft, collect certain information about their users so they can provide better, more personalized experiences. However, these companies also often use the data they gather for advertising purposes. The good thing is that as a Microsoft user, you have a fair amount of control over your own privacy. In fact, you can disable Windows 10’s intrusive privacy settings — here's how.

Turn personalized advertising off

Windows 10 assigns each user an “advertising ID” that is used for ad personalization based on your recent browsing history. If you’d rather see generic ads targeted to you based on demographics rather than your ID, we recommend turning this feature off. Here’s how to do it:

  1. Click on the search box at the bottom left of your screen. If your search bar is hidden, right-click the taskbar and select Search > Show search box.
  2. Next, type in “Privacy,” then click on Privacy Settings and select General.
  3. Turn off the option that states "Let apps use advertising ID to make ads more interesting to you based on your app activity."
  4. Lastly, open your web browser and go to this link. Once there, turn off the “Personalized ads wherever I use my Microsoft account” and “Personalized ads in this browser” options.

Following these steps resets your ad ID, letting you surf the web without targeted advertisements.

Disable Cortana

Voice-controlled digital assistants have become big business. Microsoft aims to capitalize on this market with Cortana, an incredibly resourceful built-in assistant that allows you to quickly set reminders, schedule events, and send emails, among many other intuitive features. However, the way it uses the information it collects can become overbearing at times. Here’s how to disable Cortana:

  1. Type “Task Manager” in the search box, or use the keyboard shortcut Ctrl + Shift + Esc.
  2. In Task Manager, click the Startup tab and find Cortana in the list of programs.
  3. Right-click the row and click Disable.
  4. Open the Start menu, then find Cortana under All Apps.
  5. Right-click on Cortana, select More, and click on App settings.
  6. Toggle the switch under “Runs at log-in.”

Once disabled, the Cortana option disappears and you’re now left with just a search bar, which you can use to search for things online or on your desktop.

Stop peer-to-peer file sharing

With peer-to-peer or P2P file sharing enabled, Windows 10 shares downloaded updates to your PC with other Windows 10 users in the same network by default. This helps other users update their systems faster and speeds up your upgrade downloads. However, if you are unhappy with your files being used by other users, you can turn P2P sharing off.

  1. Click the Windows icon and head over to Settings.
  2. Click on Update and Security then choose Delivery Optimization from the sidebar.
  3. Under "Allow downloads from other PCs,” switch the toggle to “Off.”

If you want to share your files with PCs on your in-house network only, leave this option on and select the option that says “PCs on my local network.” For more detailed instructions on how to stop P2P updates, click here.

Blunt Microsoft’s Edge

Microsoft Edge is chock-full of features — such as Cortana Integration and typing prediction — that send data back to Microsoft. To turn off these intrusive functionalities, open Edge and click on the three dots in the far right corner.

Then, click on Settings > Cookies and site permissions. There you have the option to disable a bunch of settings, such as those related to ads, automatic downloads, and location sharing.

These simple security tips will stop Microsoft from tracking your online activities for good. Don’t hesitate to contact us today for all matters security-related.

Published with permission from TechAdvisory.org. Source.

The post How to disable Windows 10’s intrusive privacy settings appeared first on Complete Technology Resources, Inc..

Read More

How does social media usage affect HIPAA compliance?Social media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements. However, posts that contain client or patient-specific information can have dire consequences for healthcare organizations. What social media actions violate HIPAA rules? Posting patients' protected health information on social media, even if it's accidentally, without the patients' […]

The post How does social media usage affect HIPAA compliance? appeared first on Complete Technology Resources, Inc..

How does social media usage affect HIPAA compliance?

Social media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements. However, posts that contain client or patient-specific information can have dire consequences for healthcare organizations.

What social media actions violate HIPAA rules?

Posting patients' protected health information on social media, even if it's accidentally, without the patients' permission or authority is a violation of HIPAA regulations. This includes actions like:

  • Sharing pictures (like a team lunch in the workplace) with patient information visible in the background
  • Sharing any form of PHI (such as images or videos)
  • Posting any information that could identify an individual
  • Sharing gossip about a patient, even if the patient’s name is not mentioned

What are the consequences of violating HIPAA?

People in the healthcare industry should not treat HIPAA violations lightly. If an employee is found guilty of breaking a HIPAA rule, they could face fines between $100 and $1,500,000 depending on the severity of the violation. They could also face a 10-year jail sentence, lawsuits, job termination, and revocation of their medical license.

How can healthcare organizations prevent violations?

There are simple ways to avoid HIPAA violations while using social media:

  • Don’t post stories about patients on social media. Even if the patient’s name is omitted, the patient could still be identified by their diagnosis or treatment.
  • Check the background of photos before posting. Make sure there are policies that prohibit employees from posting photos of a patient or their information.
  • Prohibit employees from offering medical advice on social media. It's best practice to refrain from posting diagnosis or treatment plans on social media, even if a patient asks for medical advice.
  • Always get written permission. Sometimes, a patient’s story is too great not to share. Maybe they made an astonishing recovery or exhibited great strength in the face of adversity and you want to share their accomplishment. In cases like these, ask for written permission from the patient before posting anything on social media.
  • Undergo training on HIPAA security and HIPAA privacy procedures and policies. Make sure to discuss topics such as workstation use, workstation security, and using personal devices for work. These procedures ensure that employees comply with HIPAA rules and are protecting patient information, whether it be electronic, written, or oral.

Do you work in the healthcare industry and need help managing IT and privacy issues? Feel free to call us today!

Published with permission from TechAdvisory.org. Source.

The post How does social media usage affect HIPAA compliance? appeared first on Complete Technology Resources, Inc..

Read More

How does social media usage affect HIPAA compliance?Social media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements. However, posts that contain client or patient-specific information can have dire consequences for healthcare organizations. What social media actions violate HIPAA rules? Posting patients' protected health information on social media, even if it's accidentally, without the patients' […]

The post How does social media usage affect HIPAA compliance? appeared first on Complete Technology Resources, Inc..

How does social media usage affect HIPAA compliance?

Social media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements. However, posts that contain client or patient-specific information can have dire consequences for healthcare organizations.

What social media actions violate HIPAA rules?

Posting patients' protected health information on social media, even if it's accidentally, without the patients' permission or authority is a violation of HIPAA regulations. This includes actions like:

  • Sharing pictures (like a team lunch in the workplace) with patient information visible in the background
  • Sharing any form of PHI (such as images or videos)
  • Posting any information that could identify an individual
  • Sharing gossip about a patient, even if the patient’s name is not mentioned

What are the consequences of violating HIPAA?

People in the healthcare industry should not treat HIPAA violations lightly. If an employee is found guilty of breaking a HIPAA rule, they could face fines between $100 and $1,500,000 depending on the severity of the violation. They could also face a 10-year jail sentence, lawsuits, job termination, and revocation of their medical license.

How can healthcare organizations prevent violations?

There are simple ways to avoid HIPAA violations while using social media:

  • Don’t post stories about patients on social media. Even if the patient’s name is omitted, the patient could still be identified by their diagnosis or treatment.
  • Check the background of photos before posting. Make sure there are policies that prohibit employees from posting photos of a patient or their information.
  • Prohibit employees from offering medical advice on social media. It's best practice to refrain from posting diagnosis or treatment plans on social media, even if a patient asks for medical advice.
  • Always get written permission. Sometimes, a patient’s story is too great not to share. Maybe they made an astonishing recovery or exhibited great strength in the face of adversity and you want to share their accomplishment. In cases like these, ask for written permission from the patient before posting anything on social media.
  • Undergo training on HIPAA security and HIPAA privacy procedures and policies. Make sure to discuss topics such as workstation use, workstation security, and using personal devices for work. These procedures ensure that employees comply with HIPAA rules and are protecting patient information, whether it be electronic, written, or oral.

Do you work in the healthcare industry and need help managing IT and privacy issues? Feel free to call us today!

Published with permission from TechAdvisory.org. Source.

The post How does social media usage affect HIPAA compliance? appeared first on Complete Technology Resources, Inc..

Read More

BYOD tips to improve securityLax bring your own device (BYOD) policies are a growing concern for businesses. If you're not managing your organization's BYOD policy properly, it can pose a host of security risks to your company. Below are some of the inherent security risks of BYOD. Loss or theft of devices – Employees often bring their personal devices […]

The post BYOD tips to improve security appeared first on Complete Technology Resources, Inc..

BYOD tips to improve security

Lax bring your own device (BYOD) policies are a growing concern for businesses. If you're not managing your organization's BYOD policy properly, it can pose a host of security risks to your company. Below are some of the inherent security risks of BYOD.

  • Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, as well as the data stored in them, being lost or stolen.
  • Man-in-the-middle (MITM) attacks – Cybercriminals can intercept information transmitted from employees’ devices if these are connected to poorly secured public Wi-Fi networks.
  • Jailbroken devices – Jailbreaking is the process of removing the restrictions imposed by the manufacturer of a device, typically to allow the installation of unauthorized third-party software. This increases the risk of an employee inadvertently installing malicious software on a personal device.
  • Security vulnerabilities – If employees have outdated operating systems and software on their devices, cybercriminals can exploit unpatched vulnerabilities to gain unfettered access to company systems
  • Malware – A personal device that has been infected with malware can spread that malware to other devices that are connected to the company network and cause data loss and downtime.

To mitigate these risks, you must devise a BYOD security policy that works for the needs of your business as well as the needs of your employees. Here’s what you need to do:

1. Set passwords on all BYOD devices

Prevent unauthorized access to company data by enforcing the use of passwords on all employee devices and accounts. Passwords should be unique; contain letters, numbers, and symbols; and are at least 12 characters long. It’s also a good idea to implement multifactor authentication to add another method of identity verification such as fingerprint scans or temporary passcodes sent via email.

2. Blacklist unsanctioned applications

Blacklisting involves prohibiting the installation of certain applications on BYOD devices that are used for work purposes. This includes applications like games, social networking apps, and third-party file sharing platforms. The simplest way to blacklist applications is through a mobile device management platform that enables IT administrators to secure and enforce policies on enrolled devices.

3. Restrict data access

Adopt the principle of least privilege on both BYOD and company devices. This means that a user is able to access only the data and software required to do their job. This can reduce the effects of certain types of malware and limit the fallout in the event of a data breach.

4. Invest in anti-malware software

Anti-malware software identifies and removes malware before they cause irreparable harm to a device. The best anti-malware programs are often backed by the latest threat intelligence databases and use behavior-based detection techniques to pick up any traces of malware.

5. Backing up device data

A well-thought-out BYOD policy can go a long way toward minimizing the risk of a security breach, but if something manages to slip past your defenses, you need to have backups prepared. Back up your data in off-site servers and in the cloud to ensure that any data stored locally on a device can be quickly recovered.

6. Educate your staff about security

The vast majority of BYOD-related security risks involve human error. This is why you should educate your employees about proper mobile safety. Train them on spotting apps that could contain malware, sharing security threat updates, and securing their devices beyond enabling default security settings.

You should also approach us if you need assistance with protecting your BYOD environment. As a professional managed IT services provider, we keep tabs on the latest trends and innovations related to BYOD and will recommend solutions that work for your company. Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

The post BYOD tips to improve security appeared first on Complete Technology Resources, Inc..

Read More