Healthcare Executive Commentary

  1. Meeting The BDR Need With Your Business Continuity Solution
    8/23/2016

    You cannot claim to be a solutions provider unless you offer all of the obvious necessities to your potential business clients. Part of your role as a managed IT services provider is to help each client find the best solution(s) for their business — solutions that will save them time, save them money, and help them meet desired business outcomes, such as increased profitability, optimized employee productivity, and a more streamlined technology spend.

  2. Why You Should Lead Your Sales Pitch With Endpoint Security
    8/23/2016

    A common question asked during a job interview is whether or not the employee has an opportunity to work remotely. Not only does it benefit the employee by saving commute time, the employer benefits as there is no additional overhead or potential distraction by other employees in the office. The trend is common and software tools make it easy, but it’s possible there are too many software tools providing such services, thereby raising the level of concern for data security amongst IT professionals.

  3. 3 Steps To Armor Your Computer Against Hackers & Ransomware
    8/18/2016

    Ransomware has become a lucrative business for hackers operating worldwide with the river of money flowing into their coffers fueling a cyber security arms race — good versus criminal — and putting you squarely in the crosshairs.

  4. Staffing Cybersecurity Means Managing Insanity
    8/3/2016

    To nurture your cybersecurity talent, prove you are working to nurture a productive workplace. By Barbara Kay, senior director of strategic solutions, Intel Security

  5. Warning: What You Need To Know About Malware
    7/14/2016

    Most people think if they have a firewall and some kind of anti-virus program they are good, thumbs up, no need to worry about all that cyber stuff. Unfortunately, it is this kind of thinking that makes cyber criminals so wealthy and the rate of cybercrime go up. By David Nathans, director of security, SOCSoter

  6. Healthcare Technologies: An Important Investment
    7/13/2016

    The demand for medical services is present across all geographies. By Paul Constantine, president, ScanSource POS and Barcode

  7. 10 Ways To Create And Retain Engagement With Process Improvement
    7/13/2016

    Is your business struggling to get staff involved in process improvement initiatives? If so, you can take solace in knowing you’re not alone. By Ivan Seselj, CEO, Promapp

  8. Applying Machine Learning To Identify Compromised Credentials
    7/8/2016

    It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.

  9. Cyber-threats In 2016: Evolution, Potential, And Overcoming Them
    6/29/2016

    The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes for those who are Internet of Things (IoT) ready and prepared to embrace Big Data. However, there are some apprehensions about this more connected, omnipresent, and easily accessible data — it opens many doors to hackers, creating room for Cyber threats to seep in.

  10. Cyber-Security’s Weakest Link: People
    6/27/2016

    A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.