508-909-5961 [email protected]

As the saying goes, “Good things come to those who wait.” Much like bakers who patiently wait for their souffle to rise, or artists who carefully tend to their masterpieces with meticulous brushstrokes, small- and medium-sized business owners also eagerly await the latest cloud database service to shed its beta status. But aren’t cloud databases […]

2016September6_Google_BAs the saying goes, “Good things come to those who wait.” Much like bakers who patiently wait for their souffle to rise, or artists who carefully tend to their masterpieces with meticulous brushstrokes, small- and medium-sized business owners also eagerly await the latest cloud database service to shed its beta status. But aren’t cloud databases more or less the same? If so, why would Google spend over nine months testing its latest cloud-based creation? Here are some of the reasons.

Google recently came forward with an array of announcements regarding its Cloud Platform -- in particular, its various cloud database services. Major updates have been implemented to its budget cold data cloud storage service: Nearline, increasing disk volume speed and allowing users to use personal encryption keys to Cloud Storage.

On the database side, Google’s cloud database services have officially left the beta station. For example, the second generation version of Cloud SQL, a tool that aids in running and managing MySQL databases in the cloud, is now available after nine long months. Another NoSQL database, Cloud Bigtable, which focuses on large analytics and operational workloads, is now available as well.

Another service making its way out of the beta works is the API for Google Cloud Datastore, Google’s own web and mobile app workload NoSQL database. Cloud Datastore has been available for quite some time, yet developers were only able to use it as a part of the Google App Engine. With the introduction of the API, developers are able to utilize it outside of the Google App Engine as well. Favored by the likes of Snapchat, Cloud Datastore currently handles up to 15 trillion requests monthly.

Among the various additions to these services throughout the course of their betas, the one that users most look forward to is the SLA (service-level agreement) backing, which provides Cloud Datastore with 99.5% monthly uptime. Good news for those wishing to use Microsoft’s flagship database server within the Google Cloud, there are now (still in beta) SQL Server images with built-in licenses with the capability of bringing existing licenses onto its platform.

In order for Google to exceed Microsoft’s popularity in the running of cloud SQL servers, they must allow enterprise-level users to bring their existing applications and workloads to the cloud. Storage-wise, Google’s affordable cold data storage service, Nearline, is in direct competition with Amazon’s Glacier storage, which also provides low availability guarantees for an affordable price. In the past, Nearline users had to deal with data access latency of 3-5 seconds; but since the latency is gone, access is “almost real-time.”

On top of that, Google’s Persistent Disk volumes are faster with a maximum read and write IOPS (Input/Output Operations Per Second) that has risen from 15,000 to 25,000. This is useful to both database applications and other types of local data storage as well.

The Google team stated that “Today marks a major milestone in our tremendous momentum and commitment to making Google Cloud Platform the best public cloud for your enterprise database workloads.” If you thought Google wasn’t taking its Cloud Platform seriously, think again.

Published with permission from TechAdvisory.org. Source.

Read More

Is being responsible for electronic medical records a daily source of trepidation for you or your business? While the sentiment is understandable, it often results from a lack of understanding about what HIPAA compliance actually means. As industry-wide penalties continue to rise every year, it’s essential to take a closer look at who is being […]

2016September5_HealthcareArticles_BIs being responsible for electronic medical records a daily source of trepidation for you or your business? While the sentiment is understandable, it often results from a lack of understanding about what HIPAA compliance actually means. As industry-wide penalties continue to rise every year, it’s essential to take a closer look at who is being fined, and why. Keep reading for more details on the most recent case.

As the largest fully integrated healthcare system in Illinois, Advocate Health Care Network’s mismanagement of electronic medical records (EMR) came as quite a shock. Regardless of your feelings on such a sizable provider being unable to maintain secure EMRs, what can’t be argued is the precedent set by last month’s $5.5-million settlement.

How exactly did it come to such a historic penalty? The answer is threefold. Firstly, Advocate failed to perform the risk assessments mandated by HIPAA regulations -- an oversight that could have potentially prevented the other two infractions. Secondly, Chicago’s premier healthcare network failed to obtain proper written agreements with each of the business partners who had access to its data, which may have gone unnoticed if one of its associates had not been the subject of a security breach.

The final infraction, and arguably the most directly relevant to Advocate’s internal security policies, was the unsatisfactory safeguards in place on two stolen laptops with confidential medical information. While the breach of its business partner’s network only put 2,000 EMRs at risk, the stolen computers had access to almost 4 million.

So, if you’re tired of vague platitudes about ‘penalties for lax data compliance’ or the ‘liability risks of mediocre security,’ this is your answer: inadequate preventative measures, unfit business partners, and poor internal security protocols can spell millions in damages. Unfortunately, this isn’t just an aberrant case -- the total punitive damages for HIPAA noncompliance in 2015 totaled $6.2 million; after just over eight months into 2016, they currently stand at $20.3 million.

Keep your company’s name off the growing list of companies that didn’t have suitable systems in place when it mattered most. Our EMR management practices provide a full suite of care for your data records; from prevention to end-point security, your information is safe with us. Our proficiency in the healthcare IT industry spans a wide variety of experiences and know-how. Contact us today. We’d love to tell you all about it.

Published with permission from TechAdvisory.org. Source.

Read More

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong -- passwords had been compromised as well. This new information came to light when the database was […]

2016September2_Security_BIn 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong -- passwords had been compromised as well. This new information came to light when the database was picked up by a security notification service. So if you were using Dropbox before the incident and haven’t changed your password since, you should do so right away.

Despite the unfortunate incident, Dropbox has implemented a thorough threat-monitoring analysis and investigation, and has found no indication that user accounts were improperly accessed. However, this doesn’t mean you’re 100 percent in the clear.

What you need to do

As a precaution, Dropbox has emailed all users believed to have been affected by the security breach, and completed a password-reset for them. This ensures that even if these passwords had been cracked, they couldn’t be used to access Dropbox accounts. However, if you signed up for the platform prior to mid-2012 and haven’t updated your password since, you’ll be prompted to do so the next time you sign in. All you have to do is choose a new password that meets Dropbox's minimum security requirements, a task assisted by their “strength meter.” The company also recommends using its two-step authentication feature when you reset your password.

Apart from that, if you used your Dropbox password on other sites before mid-2012 -- whether for Facebook, YouTube or any other online platform -- you should change your password on those services as well. Since most of us reuse passwords, the first thing any hacker does after acquiring stolen passwords is try them on the most popular account-based sites.

Dropbox’s ongoing security practices

Dropbox’s security team is working to improve its monitoring process for compromises, abuses, and suspicious activities. It has also implemented a broad set of controls, including independent security audits and certifications, threat intelligence, and bug bounties for white hat hackers. Bug bounties is a program whereby Dropbox provides monetary rewards, from $216 up to $10,000, to people who report vulnerabilities before malicious hackers can exploit them. Not only that, but the company has also built open-source tools such as zxcvbn, a password strength estimator, and bcrypt, a password hashing function to ensure that a similar breach doesn’t happen again.

To learn more about keeping your online accounts secure, or about how you can protect your business from today’s increasing cyber threats, give us a call and we’ll be happy to help.

Published with permission from TechAdvisory.org. Source.

Read More

The average projector lifespan is around 2,000 hours. That means it’s probably been a long time since you last went shopping for a new one. If you’re unsure what to be looking for in your next purchase, you’re not alone. With every year comes updated features and industry standards for your hardware, and we’re here […]

2016September1_Hardware_BThe average projector lifespan is around 2,000 hours. That means it’s probably been a long time since you last went shopping for a new one. If you’re unsure what to be looking for in your next purchase, you’re not alone. With every year comes updated features and industry standards for your hardware, and we’re here to clarify what that means for a new office projector. Let’s take a look.

Brightness

If you haven’t had any hands-on experience with projectors yet, brightness will undoubtedly be the first thing you notice. Although no projector will ever match the brightness of an LED or LCD television, with some informed shopping you can easily mitigate this unfortunate drawback. A ‘lumen’ is a measure of brightness listed under the specifications of any new projector. Anything over 2,000 lumens should be appropriate for small-group presentations in a low-light room. For larger meetings with more ambient light, 3,000 lumens should be able to negate any added burdens. No need to go any higher than that unless you expect to host more than 100 viewers and let a little light into the room.

Resolution

While brightness may be the first thing you notice, resolution is probably the first thing you think of. Before deciding on a resolution, give some honest consideration to how essential it is for the projector’s intended use. If the plan is to set it up in the conference room for Excel budget presentations, WXGA (or 1280x800) should be plenty clear. This resolution is the most widely compatible with the dimensions of modern laptop screens and will making swapping the content source a piece of cake. However, if you have an existing projector and/or screen, you may want to stick with your existing XGA (or 1024x768) resolution. Of course, there is always the option for the gold standard. Whether it’s an overinflated budget or true necessity, HD (1920x1080) will provide you with the best possible resolution for your projections.

Portability

Behind their bolted-in conference room companions, portable projectors are some of the most popular for business professionals. In addition to brightness and resolution comparisons, make sure to examine how valuable portability is to you. Increased portability often brings a significant reduction in image quality and may not ultimately be worth it. If you’re forging ahead with a mobile option, some of which are small enough to comfortably fit inside your pocket, make sure whatever you choose has the ability to read data from a USB or SD storage device. There’s no reason to buy a model compact enough to leave the backpack at home unless you’re utilizing all its added bonuses. This means you might have the option to purchase a mini-projector with a battery integrated into the device; just remember that it's unlikely you’ll have the picture quality or features to truly enjoy video and multimedia presentations.

Extra Features

What would any piece of hardware be without a few cool extra features? Top of the line projectors have a myriad of specialized add-ons that might be just what you need to make your final decision. We’ve already talked about USB and SD storage, but what about an iPhone or Android dock incorporated directly into the unit? And if that doesn’t tickle your fancy, cut the cords entirely with wireless-enabled projectors. Regardless of whether it’s one of these options, or something like internal storage capacity, always thoroughly test any special features before letting them factor into your final choice. There’s nothing worse than basing a decision on a total misnomer.

Our customers often forget to utilize one of our most useful service options: hardware consulting. If you’re ever in the market for new equipment at your organization, or need advice on how to get the most of what you currently have, don’t hesitate to ask. We’re an office full of gadget geeks who love the opportunity to talk about the latest and greatest the industry has to offer. Contact us today!

Published with permission from TechAdvisory.org. Source.

Read More