Relevant Technology • Raving Results®

Our Locations  |  501.603.3000501.603.3000  |  Client Login

The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Healthcare Organizations Need a Roadmap to Navigate Cybersecurity

It cannot be a one-time snapshot, or a one-time risk assessment. It has to be a continuous, ongoing process." -  Navin Balakrishnaraja, National Practice Director, Healthcare IT Services for All Covered (IT Services, Konica Minolta)

All organizations are guilty of just “going through the motions” at times.

A client services specialist leaning too heavily on his company script. The sales representative who meets her quota but fails to concentrate on continued professional development (aka, the learning zone). There are countless scenarios within a work place where crucial tasks are tackled without enthusiasm or a particular level of involvement.

But few, if any, carry the level of risk of a healthcare facility just going through the motions with its cybersecurity plan. The organization must navigate this landscape carefully, and with a trusted map that leads to long-term security and compliance for the unpredictable journey ahead.

Topics: Security Healthcare Solutions HIPAA Network Security Cybersecurity

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

The Elephant in the (Waiting) Room: Why Your Healthcare Facility Needs a Security Risk Analysis Now

Whether they are complying with HIPAA or attesting to the Merit-based Incentive Payment System (MIPS) under MACRA for positive incentives, healthcare professionals cannot avoid (and certainly cannot AFFORD to avoid) the Security Risk Analysis.

For many health organizations, the elephant in the waiting room is still seated there, anxiously anticipating when it might be acknowledged or tended to.

That elephant is the Security Risk Analysis (SRA). Originally mandated by HIPAA and subsequently further enforced by government programs such as Meaningful Use and now the Medicare Access and CHIP Reauthorization Act (MACRA), the SRA is a vital component to both healthcare facilities’ ultimate livelihood and the confidential information of their clients.

Topics: Security Healthcare Solutions HIPAA Cybersecurity

7 Things Every SMB Must Know About Cybersecurity

Do you think your business' size will protect you from cybercriminals. It won't.

Simple fact: cybercriminals are coming for you.

That's anyone reading this – individuals, 2-person businesses, Fortune 1000, or the mom and pop store on the corner.

All businesses have customer and other data that can be hacked. Criminals want that data.

Most SMBs attempt to secure themselves. However, they don't have the money or access to expertise that larger companies do. Their defenses aren't as strong as larger companies.

It's a lot easier to pick the lock on a doorknob (just to be 100% clear, this is you SMBs) than on a maximum security safe. Who do you think cybercriminals are going to target? 

Here are seven things every SMB must know about cybersecurity.

Topics: Information Technology Managed Network Services Security Digital Security Network Management Cybersecurity

Four Things You Should Know About HIPAA Compliance

Complying with HIPAA is impossible if you don't know where to start. These four business tips will help you get started AND help your business.

With so many rules and acronyms, maintaining a HIPAA-compliant medical office can be a daunting task. Here’s a high-level recap so you can keep your eye on patient care. 

Topics: Security Digital Copiers Digital Security Healthcare Solutions Privacy Document Management Network Management Document Security Cloud Cybersecurity

Who Needs a Cybersecurity Risk Assessment? You.

You want to be HIPAA-compliant? You need to perform a risk assessment with the help of a Certified HIPAA Professional (CHP).

It's impossible to watch the news without weekly revelations of some new data breach – Target, Equifax, the WannaCry virus, and even teddy bears have been in the news.

As cybercrime continues to pay, attacks and breaches will continue and will especially affect unprepared businesses.

One industry is squarely in the crosshairs of hackers – healthcare.

Topics: Digital Security Healthcare Solutions Privacy Network Management Document Security HIPAA Network Security Cybersecurity

Healthcare Provider? Cure Your IT Ailments with Business Continuity

Keeping your patient data properly backed up and protected will help you focus on what matters most the patients you care for.

As a healthcare provider, you know your patients are the number one priority. Part of your obligation to them is to keep their health-related information as confidential as possible.

Topics: Managed Network Services Healthcare Solutions Network Management Cloud Business Continuity Disaster Recovery Cybersecurity

Keeping Your Digital Copiers Secure in a Healthcare Office

The multifunction copier is covered in the Information Technology for Economic and Clinical Health (HITECH) Act and the HIPAA Security Rule. It's considered a machine that stores, transmits, receives, or creates protected health information.

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is 20 years old, so you have a lot of experience with following its requirements. Your healthcare office has several security measures in place to stay HIPAA compliant, but you may be overlooking a key area: your digital copiers. Here are a few ways you could be compromising your patients' health information due to this oversight.

Topics: Healthcare Solutions Office Equipment Cybersecurity Managed Compliance Services

7 Ways to Be HIPAA Compliant

Being HIPAA compliant doesn't just protect you from fines; it helps protect your patients' trust in you.

The federal government requires all organizations and individuals who handle patient health information to be HIPAA compliant. Office managers must work to ensure that all confidential patient information is only viewed by authorized personnel and is protected against theft.

The HIPAA rules that apply to medical offices take up 115 pages. It is absolutely vital that you read through all the rules to ensure that you are in compliance. In 2013, HIPAA policy changed. After reading through those changes, Medical Economics identified seven potential violations that could leave your office open to fines that range from $100 to $50,000. Here are those seven issues and how to ensure you are HIPAA compliant.

Topics: Healthcare Solutions HIPAA Cybersecurity