Wednesday, May 27, 2015


New Verizon DBIR Report

Quantify the impact of a data breach with
NEW DATA FROM THE 2015 DBIR.

The 2015 Data Breach Investigative Report (DBIR) from Verizon is now available for download.  The report is created every year with data from 70 different IT security companies.   The report found that breaches map to error and misuse and most breaches are a result of known compromises that have remedies known for a year or more.  This suggests that businesses need to rethink their patching strategies.  The primary successful attacks were through phishing, misuse of credentials and malware.  Mobile risk and the internet of things, although a concern, have yet to be a significant attack vector. 

 

http://www.verizonenterprise.com/DBIR/2015/ 

 


Yes. Microsoft® Office 365 provides all the capabilities you need to satisfy the technology requirements for HIPAA and HITECH compliance.  These regulations require that organizations establish and document procedures that govern:

·        Restrict access to patient data.

·        How patient data is handled.

·        How stored patient data is kept secure.

·        How to secure patient data when it’s transmitted.

Meeting these general guidelines requires lots of time and attention to detail. Office 365 helps you meet these requirements with less time and cost than you might think

 

Friday, May 22, 2015


For those organizations who’ve been planning on upgrading some of your legacy Windows Servers, especially the 2003 variety, but just haven’t found a compelling enough reason to do so, you’ll want to go ahead and put those upgrade plans in high gear!
In July of this year there will no longer be any more security updates for this server. Unlike the retirement of XP, where Microsoft continued with anti-malware definitions, in this case when the server goes out of support and becomes an unsupported product Microsoft will NOT be issuing any anti-malware protections.
The ‘so-called’ security updates will end on July 14, 2015. Microsoft is recommending that organizations not rely on what they deem as ‘up to date’ security patches as Microsoft has found them not to be ‘secure enough’ or effective enough for out of date/support operating systems. If you’d like to know what your migration options are and what makes sense for your organization we are always ready, willing and able to help you figure out your next move.

Wednesday, May 13, 2015



OneDrive for Business is an Outlook email storage application that is utilized by many Office 365 clients. While the application has been available to Mac users, the ability to sync files and take them offline was limited until now. With the new OneDrive for Business sync client, users can now access their files across all devices by downloading the iOS application and the Mac Sync Client from Microsoft Download Center.




Accessibility is Key

Users have been able to utilize Android and Windows apps to sync their OneDrive files since late 2014, but the iOS application took a little longer to develop. In late January 2015, Microsoft finally released the OneDrive app, giving iPhone users the same accessibility. The application features new capabilities for viewing, managing, and sharing photos as well as the option to connect multiple OneDrive accounts. Previous versions separated the business and personal use files but the new OneDrive for Business allows users to access all files through the same app interface.

Business users can access all saved files and shared files, as well as the most recently viewed files. Additionally, there is a recovery option for files that were accidentally sent to the Recycle Bin. The new OneDrive features an upload option as well as “search” and “share” features making it easy to interact with business and personal files on the go. With this application comes enterprise-grade security with compliance and control by Office 365.

Monday, May 11, 2015

IT Priorities for 2015

Top 5 IT Priorities aggregated from surveys by NetworkWorld and ComputerWorld:

1. Security
2. Cloud
3. Analytics and Data Management
4. Mobility and Wireless
5. Clients - Desktop, Laptop