508-909-5961 [email protected]

MR to be removed from Google search

Google has recently made changes to its personal information policy, including a major one for the healthcare industry. The search giant has begun removing private medical records from its search results, preventing cybercriminals from taking advantage of these resources that were previously available after only a few keystrokes.

The post MR to be removed from Google search appeared first on Complete Technology Resources, Inc..

MR to be removed from Google search

Google has recently made changes to its personal information policy, including a major one for the healthcare industry. The search giant has begun removing private medical records from its search results, preventing cybercriminals from taking advantage of these resources that were previously available after only a few keystrokes.

If an individual's medical records were leaked, that could be both emotionally and financially damaging. For example, hackers that use ransomware to extort money from hospitals can gain access to private medical data and hold it for ransom. Whether the ransom is paid or not, they could still release it online, where Google’s search engine would pick it up.

Traditionally, Google had a hands-off policy to search results and rely on its algorithm to do the work instead. In the past, this policy was heavily scrutinized for releasing fake news and other forms of false information. All of this changed when Google combed through the search results and removed private medical information.

Before making potentially sensitive information available on search results, Google now assesses their level of sensitivity using this series of questions:

  • Is it a government-issued identification number?
  • Is it confidential, or is it publicly available information?
  • Can it be used for common financial transactions?
  • Can it be used to obtain more information about an individual that would result in financial harm or identity theft?
  • Is it a personally identifiable nude or sexually explicit photo or video shared without consent?

Ensuring the security of private data is paramount to the success of businesses operating in every industry. Whether it be on-site or online, if data were to fall into the wrong hands, not only could that cause financial and reputational ruin, it could even close down your business for good. If you want to know more about how to keep your data safe, feel free to call or email us!

Published with permission from TechAdvisory.org. Source.

The post MR to be removed from Google search appeared first on Complete Technology Resources, Inc..

Read More

How to keep Mac computers safe

When it comes to Mac devices, data privacy and security should be your #1 priority, not an afterthought. Without implementing sufficient security measures, you’re leaving the door open for cybercriminals to ransack your sensitive data. Keep your bases covered and fortify Mac security with these six tips:

The basics
Let’s start with the basics and head over to the Security & Privacy pane in System Preferences.

The post How to keep Mac computers safe appeared first on Complete Technology Resources, Inc..

How to keep Mac computers safe

When it comes to Mac devices, data privacy and security should be your #1 priority, not an afterthought. Without implementing sufficient security measures, you’re leaving the door open for cybercriminals to ransack your sensitive data. Keep your bases covered and fortify Mac security with these six tips:

The basics
Let’s start with the basics and head over to the Security & Privacy pane in System Preferences. Here, you’ll find four tabs -- General, FileVault, Firewall, and Privacy -- that control various aspects of security. To change your security settings, click on the padlock on the bottom of the screen and type in your username and password.

Firewall
Enabling the firewall will block unwanted incoming network connections. Many think it is enabled by default, but often it’s not. All you need to do is click the Firewall tab in the System Preferences > Security & Privacy pane, click the padlock icon on the bottom left, enter your username and password, and click the ‘Turn On Firewall’ button. Don’t forget to enable Stealth Mode by clicking the Firewall Options button and then clicking Enable Stealth Mode in the dialog box -- this makes your computer invisible on public networks.

Passwords
Make sure to set strong passwords for your user accounts if you don't already have one. To do this, go back to the 'General' section of the Security & Privacy settings. In this section, you should also consider setting the Require Password field to 'immediately.' This makes it so that you'll need to re-enter your login credentials to unlock your Mac when it goes to sleep or when a screen saver begins.

Automatic login
It’s best to disable this function, especially if you are using a mobile Mac. If your Mac gets stolen, you don’t want to give thieves a free pass to your private data.

Applications
At the bottom of the General Settings tab, there are three options that authorize which apps can run on your Mac. The safest option is to allow only apps from the App Store to run, and the least secure option is to allow apps from anywhere. Get the best of both worlds by choosing the option of running apps from the App Store and from developers known to Apple.

FileVault
The FileVault tab enables you to encrypt all the files in your user account. To decrypt them, you must enter either your account password or the recovery key you created when you switched FileVault on. It might be tedious to type in a password every time to access a file, but it helps keep your vital data under lock and key.

In this digital age, ensuring the protection of all your devices is crucial to your business’s success. Because all it takes is a tiny leak to sink your ship. Feel free to give us a call and we'll help prepare your business for choppy waters.

Published with permission from TechAdvisory.org. Source.

The post How to keep Mac computers safe appeared first on Complete Technology Resources, Inc..

Read More