Knowledge Base

Knowledge Base

  • Knowledge Base HOME
    Knowledge Base HOME Where you can find all the latest articles to the Intrada Knowledge Base.
  • Categories
    Categories Displays all the different categories within the Intrada Knowledge Base.
  • Tags
    Tags Tags are setup to help find articles related to a specific focus.
  • Users
    Users Meet the Staff and see what they have to share.
Subscribe to this list via RSS Blog posts tagged in Technology
2704

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

206 Hospitals in 29 States were hacked effecting 4.5 million patient records in 2015. According to an article recently published in the Washington Post in February, a Los Angeles hospital paid $17,000 in bitcoin ransom to unload computer records.

 

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Hollywood Presbyterian Medical Center CEO Allen Stefanek said. “In the best interest of restoring normal operations, we did this.”

Digital FingerprintBut hospitals are not the only target. JPMorgan Chase, Home Depot and Target were all victims of cyber-attacks in 2014.   It is no secret that personal information is valuable; the FBI released an article that indicated that in 2013, over 2 million health care records were compromised which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial electronic health record (EHR), compared to $1 for a stolen social security number or credit card number.

What’s amazing is that most companies still don’t take cyber security serious or value the importance of properly securing customer data. Companies install door access systems, alarm systems, locked server racks and camera systems all focused on physical security, but when asked how they are securing their customer data, there is often a lack of detail. Most IT companies and computer professionals practice “General Network Management” or “Best Practices”. There are general guidelines that, when followed correctly, produce safe and secure computer networks. Where most companies struggle is how to confirm that best practices are being followed, usage policies are enforced and employees, IT staff and vendors are trained and held accountable.  

In 1996, the Federal Government created the Health Insurance Portability and Accountability Act – HIPAA. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. HIPAA focuses mainly on medical and patient rights but the same requirements located under the HIPAA Security Rule provide a solid foundation and accountability to ensure “General Network Management” or “Best Practices” are valid and are providing a solid network environment. Before, IT companies would send a network technician and tell them to secure the network. Now, they send in a network technician and say this network needs to be HIPAA or Payment Card Industry (PCI) compliant providing both the IT company and the customer with accountability.

Many companies may say, “but I don’t deal with medical so why do I need to be so secured. When IT companies are hired, they are trusted with financial information, personal information and company information. By applying a HIPAA or PCI compliance requirement to your network will force vendors and staff to be more aware and involved in both the physical and function security of information. In most cases, the cost to properly secure and manage a network is a fraction of the cost associated with a data breach or privacy violation.

Hospital-Map_20160422-145801_1.jpg

Resources:

FBI Cyber Division - April 8, 2014

The Washington Post - February 18, 2015

Cyber Attacks on U.S. Companies in 2014 - By Riley Walters - October 27, 2014

David Steele, Partner / Webmaster

djsteele@intradatech.com
570-321-7370
Facebook Twitter LinkedIn Google+ RSS Feed

Last modified on Continue reading
0
2052

b2ap3_thumbnail_QuickTime.jpgThe Department of Homeland Security (DHS) has recently released a statement informing those who use the Windows Operating System of security vulnerabilities related to Apple’s QuickTime application for Windows. While no threats or infections have been reported in relation to this vulnerability, it has been recommended by the DHS that any QuickTime application be removed from a Windows environment. If you have a Mac PC or Apple device with QuickTime installed there is no risk and no need to remove it. Apple chose NOT to release critical security updates to the QuickTime for Windows application, resulting in the vulnerabilities originally reported by Trend Micro. If you are unsure if you have QuickTime for Windows or would like to speak with a technician regarding this threat call (570) 321-7370 or visit our office at 31 Ashler Manor Drive in Muncy, PA and we would be happy to look over the PC for you.

As always, diagnostics are free at Intrada! Virus/Malware Removals start at just $69.95!

Last modified on Continue reading
0
Tagged in: News scam Technology
1768

This email was received with the following message and attachment:

 b2ap3_thumbnail_EmailContent.png

ADP provides comprehensive payroll services and human resources management solutions for businesses of all sizes.

These emails do not originate from ADP and attachments may be malicious.

Message Subject Lines:

  • Your ADP account access will soon be suspended!
  • Your ADP account will be suspended soon
  • Your ADP Payroll access will expire soon
  • Your ADP will be suspended soon
  • Payroll Tax Form

How to Report an Incident to ADP:

  • Do not click on any links or open any attachments within the message.
  • Forward the email as an attachment to abuse@adp.com
  • Delete the email.
  • If you clicked any link or opened an attachment in the email, immediately contact your IT support team for further action.

See more at: http://www.adp.com/who-we-are/data-security-and-privacy/security-alerts.aspx

Header:

  • Received: from [195.56.205.30] (mail.gordiusz95zrt.hu [195.56.205.30])
  • X-Barracuda-Envelope-From: devilishlyhlts9@adp.com
  • X-Barracuda-Apparent-Source-IP: 195.56.205.30 Received: from [211.1.78.79] (account federalists@adp.com HELO ovwedy.vkmaajeuzf.net) by mail.gordiusz95zrt.hu (Postfix)

David Steele, Partner / Webmaster

djsteele@intradatech.com
570-321-7370
Facebook Twitter LinkedIn Google+ RSS Feed

Last modified on Continue reading
0
1962

Reuters Technology News

Apple to unveil new iPads, operating system on October 21: report

Wed Sep 17, 2014 12:34pm EDT

The Apple logo hangs inside the glass entrance to the Apple Store on 5th Avenue in New York City, April 4, 2013.  REUTERS/Mike Segar

(Reuters) - Apple Inc (AAPL.O) is set to launch two new iPads and release the next version of its Mac operating system at its next event on Oct. 21, a Daily Dot report said, citing sources familiar with the matter.

The company plans to unveil the sixth generation of its iPad and the third edition of the iPad mini, as well as its operating system OS X Yosemite, which has undergone a complete visual overhaul, the Internet news website said.

The iPad is expected to have a 9.7 inch screen, while the new version of the iPad mini will have a 7.9 inch screen, Bloomberg earlier reported, citing people familiar with the matter.

Apple also unveiled its Apple Watch, two larger iPhones and a mobile payments service dubbed "Apple Pay" last week.

(Reporting by Anya George Tharakan in Bangalore; Editing by Joyjeet Das)


© 2014 Thomson Reuters. All rights reserved.

Last modified on Continue reading
0
Tagged in: News Technology

Contact Information: 
    31 Ashler Manor Drive
    Muncy, PA 17756

Hours of Operation:
    Monday to Friday 8 AM > 6 PM EST
 
 800-858-5745

Mission Statement

Intrada is built on the premise that the management of information technology for business is like legal advice or accounting. It is not a do-it-yourself job.

Smart business people who are not technically savvy need quality resources for reliable hardware, software, service, and support. Businesses rely on these vendors as trusted friends or partners in their business.

Intrada serves its clients as that trusted partner. We make sure that our clients have what they need to run their businesses, with maximum efficiency and reliability.

Many of our client's needs are mission critical. Intrada gives them the assurance that we will be there when they need us.