Technology Advisor Blog



Texting, eMail, and HIPAA

Posted by Ann Westerheim on 3/12/18 1:15 PM

At the HIMSS Healthcare IT Conference last week in Las Vegas, Roger Severino, Director of the US Department of Health and Human Services Office for Civil Rights (OCR), the HIPAA enforcement agency, made some news when he said that health care providers may share Protected Health Information (PHI) with patients through standard text messages. Providers must first warn their patients that texting is not secure, gain the patients’ authorization, and document the patients’ consent.  Note that this only applies to communications with patients.

Read More

Tags: Compliance, cybersecurity, data security, HIPAA





Technology, Patience, and Wireless Displays... Lesson Learned.

Posted by Ann Westerheim on 3/2/18 2:15 PM

I love technology!  It's amazing that I can project the screen of my laptop across the room to a large TV ... through the air!  No cables or connections needed.  Wow!

Read More

Tags: Microsoft Display Adapter





What's the difference between Internet providers?

Posted by Ann Westerheim on 1/22/18 12:44 PM

Internet Speed.jpgWe're often asked about the different options available for Internet access.  You may be moving your office, or perhaps you need an upgrade in speed and reliability because you're going with a VoIP phone system.  You may also have moved to a cloud-based mission critical business application and you want a secondary connection for redundancy.  

Read More

Tags: Internet Outage





10 Ransomware Statistics ALL Businesses MUST Know

Posted by Ann Westerheim on 1/2/18 1:56 PM

It's a new year, and a great time to evaluate what's working well in your business and what could be better.  If you don't have a robust Cybersecurity plan in place for your business, now is the time to get started.   

Read More




Don't Let Cyber Crime ruin your holiday!

Posted by Ann Westerheim on 11/27/17 3:29 PM

Today is Cyber Monday, and that means that billions of transactions will occur on line.  That also means, as TransUnion puts it, "what's convenient for shoppers can also be a huge opportunity for savvy identity thieves, who steal information provided on Internet transactions for their own monetary gain."  

Read More

Tags: cybersecurity





Internet Outages Across the Country Yesterday - What Happened?

Posted by Ann Westerheim on 11/7/17 8:36 AM

Yesterday afternoon users across the country lost Internet access for about two hours.  Some users had intermittent outages and slow downs, and some lost connectivity altogether.  All our clients with Comcast Internet were affected and we were on the phone non-stop talking to businesses who were disrupted by the outage.  The map above from downdetector.com shows the impact was nationwide.

Read More

Tags: disaster recovery, Internet Outage, Comcast





Tech Tip: How to easily document computer steps

Posted by Ann Westerheim on 11/1/17 10:51 AM

Here's an awesome Microsoft Windows feature you probably didn't know about.  The Windows Steps Recorder can be used to record your screens and document the steps taken for a specific computer task. With this feature, you can create how-to documents or document problems for you or someone else to refer to later.  If you're trying to help someone solve a computer problem, this is also an easy way for them to show you what they're having trouble with - identifying the exact steps.  What a great tool!

Read More

Tags: Computer Tip, Windows Steps Recorder





WPA2 Wireless Security Vulnerability - What You Need to Know

Posted by Ann Westerheim on 10/17/17 8:47 AM

A new wireless security vulnerability related to WPA2 encryption puts almost every WIFI device at risk for hijacking and eavesdropping.  This was the major headline yesterday and we've been busy updating security on our managed clients.  

Read More

Tags: Wireless Network, cybersecurity, WPA2





You need to know this before you sell or donate your old computer

Posted by Ann Westerheim on 8/28/17 1:54 PM

If you just got a new computer you might think its a good idea to sell or donate your old computer.  Why not make a few bucks or do a good deed?  

Read More

Tags: data security





Train Your Workforce so They Don't Get Caught by a Phish!

Posted by Ann Westerheim on 8/2/17 11:21 AM

The US Department of Health and Human Services Office for Civil Rights July #Cybersecurity update reminds you to train your workforce so they don't get caught by a phish!  This statement is specifically targeted to healthcare "covered entities" but really applies to all businesses and computer users.

Read More

Tags: Cybersecurity, email scams, training





Subscribe by Email





    Browse by Tag

    See all tags...


    Posts by Month

    See all months...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.