Updating your technology on a regular basis is an important part of keeping your employees productive and efficient as well as protecting your company from cyber security threats. But keeping employees up to date on how to use all this new tech can be a challenge. Here are 7 tips to help you train more tech savvy employees and keep your business moving forward.
Know why –Most people resist change. It’s just human nature. But if you can explain WHY it’s worth their time and effort to learn and use this new tech, you’ll find your employees will be a lot more cooperative. And maybe even excited.
Recruit inside– Some employees will naturally be more apt and more interested in the new tech. Recruit them to help you train the others. This will help bridge the knowledge gap as well as getting everyone involved on the project together.
Get hands-on –As often as possible, have your employees learn by doing. The more engaged they are, the more likely they are to retain the information.
Documentation –Ever wish there was a manual for that? So do your employees. Give them written instructions (preferably with screenshots) whenever possible. This will help them learn more quickly and provide a handy reference guide for later.
Keep it small –Breaking your employees into smaller groups for tech training gives them more opportunities to ask questions and engage with the instructor, helping them learn more quickly.
Everyone is different –Some employees will pick up the new tech and run with it right away, but others will require more time and effort to get them going. Be prepared for differing rates of progress and be patient.
Get their thoughts –Your employees can provide you will valuable feedback on the learning process and how the new tech is impacting the company, if you ask and are open to listening. Do this during the transition and afterwards to help keep tabs on the bigger picture.
Durango, CO, May 20, 2019 –CRN®, a brand of The Channel Company, has named Melissa Glick, CEO of Think Network Technologies, to its prestigious 2019 Women of the Channel list. The leaders on this annual list are from all areas of the IT channel ecosystem; representing technology suppliers, distributors, solution providers, and other IT organizations. Each is recognized for her contributions to channel advocacy, channel growth and visionary leadership.
CRN editors choose the list from a multitude of channel leadership applicants and select the final honorees based on their professional accomplishments, demonstrated expertise, and ongoing dedication to the IT channel.
“CRN’s 2019 Women of the Channel list honors influential leaders who are accelerating channel growth through mutually-beneficial partnerships, incredible leadership, strategic vision, and unique contributions in their field,” said Bob Skelley, CEO of The Channel Company. “This accomplished group of leaders is driving channel success and we are proud to honor their achievements.”
“It’s an honor to be included in such an accomplished group of women,” said Glick “Technology is such an influential and important field, and it’s encouraging to see so much positive growth and change happening from year to year.”
The 2019 Women of the Channel list will be featured in the June issue of CRN Magazine and online at www.CRN.com/WOTC.
Two members of our staff and 3 of our clients were targeted by this phishing scam last month. You should know about it.
Have you seen the latest email phishing scam?
It looks like a quick email from your boss. They’re in a meeting and can’t talk, but could you stop and pick up some gift cards?
If you reply saying you will get the cards, the next email says to pick up $1,800 of Walmart gift cards and just take a picture of the numbers on the back of the card and email them back.
Which is where they really get you. Once you’ve sent the scammers the numbers on the back of the card, they have access to the money. And you have no way to get it back.
This scam is designed to take advantage of the fast-paced and informal nature of a lot of business communication. As well as the trust we place in our superiors. Two of the employees here at Think were targeted by this phishing attempt. A combination of cybersecurity knowledge and a good email filter helped ensure that neither of them fell for the scam. But others haven’t been so fortunate.
You can protect your business and your employees from phishing attempts with a few simple steps:
Education – talk to your staff about what phishing is and what to watch for.
Awareness – make sure your staff is looking at the sender and the contents of an email closely before clicking on links or replying.
Protection – a good email filter will flag emails from outside senders, helping your employees identify untrustworthy sources more easily.
Phishing is one of the leading cybersecurity vulnerabilities for a business. Take steps to protect your business and don’t get caught!
If you lost all your business data today, how long would it take for your business to recover? What steps would you take to get everything up and running again? How would it impact you financially? Knowing the answers to these questions is all part of being prepared. Just like having a back up and recovery plan. Here is some more compelling evidence that this is a necessary part of any business today:
1. Data is Easy to Lose – not just major events, a lot of it is human error. This is especially true in a BYOD culture where you may have business data being stored on personal laptops or in personal cloud accounts of your employees.
2. Cyber Attacks Keep Coming – the average cost of an attack for a company with 10 – 24 employees is over $38,000, and it just goes up from there. It doesn’t matter what type of business or the size, hackers will target anything they can profit from.
3. Downtime – loss of data can bring your entire business to a grinding halt. And if that data can’t be recovered, it takes even more time to replace (if that’s even an option).
4. Irreplaceable Data – some documents or files are truly invaluable. Everything from client lists and research to files on upcoming projects. If all that disappeared in one day, where would your business be?
5. Reputation – do you hold any sensitive or personal data on for your clients or customers? Or data that your clients will need to access in the future, like health care records or financial information. How would telling them it was all gone impact your relationship with them? Or your reputation in the business community?
A variety of back up and recovery options are available and can be customized to suit your business. Contact one of our engineers today if you would like to learn more about your options or get an expert’s perspective on developing your own backup and recovery plan.
What is email encryption? Why would you use it? What about security for your business phones? Are you protecting sensitive data?
Today I want to jump into a topic that most of Think’s competitors seem to be missing. I walk into businesses every day that are not taking the necessary steps to protect patient, client, customer, and employee information. Email encryption is a simple a la cart service that Think Network Technologies provides.
HIPAA, PCI Compliance, and Email Encryption
Why does it take the urgency of regulatory requirements (HIPAA Compliance, PCI Compliance, or other laws) to get a company to purchase a product that is a socially and ethically responsible business practice? Encrypted communication should be a standard piece of every company’s infrastructure in 2018.
This topic came to light for me recently when I had a lawyer I was working with on a project send me an email. It was addressed from [email protected] (Names have been changed to conserve the privacy of individuals in this story.) I was in disbelief and appalled that an attorney was utilizing a Gmail account, so I decided to look into whether or not it was even legal.
What I found was that it does not comply with the new American Bar Association guidelines, and in some cases can actually be a breach of attorney-client confidentiality. Take a moment to consider your own methods. How do you handle potentially sensitive information? Are you sending personal health information over an insecure connection? Are your client phone calls secure?
VOIP and Phone Encryption
The key to ensuring secure voice communication is to use VOIP (Voice Over Internet Protocol). Even using VOIP it is very important to understand the difference between transport encryption, and end to end encryption. Popular services like Skype and Google Voice can’t guarantee compliance and privacy. They may be cheap and easy to use, but you need to consider the consequences of having those communications intercepted. Would the cost of a privacy breach be worth the “convenience” of using a free service?
The Electronic Frontier Foundation has created a simple and short guide detailing secure communications. You can read the details here. No time for that? It’s okay, because we have you covered.
Secure Communications Solutions
Think Network Technologies has a full suite of cost-effective solutions for health care providers, legal firms, manufacturing, financial organizations, and many other companies who are mandated to utilize encrypted communications. We also have options for our clients who want to be responsible when sending client, employee, and confidential information via email. Let Think Network Technologies secure your communications today with our Secure Communications Suite of products.
Get in Touch!
Are you not sure whether you are in compliance? Are you interested in an audit of your business practices? Call or email today for a consultation.
The world of business IT solutions can be complicated. Not only are there many services to think about, but there are dozens of options for each service. Of course, it’s great to have so many things to choose from, but it can be overwhelming. That’s where T-Cloud can make a big difference for your business.
T-Cloud Includes 20+ IT Services
Every business needs phones, email, computers, data storage, and information security. Think’s T-Cloud suite of services has those covered, and we do it in an easily managed package. Here are some of our most popular business IT solutions.
Your business needs technology solutions, but you may not need or want a full IT department. Think can manage your IT needs for you, from software updates to server backups. We can take care of your technology, so you can focus on the core of your business.
Microsoft® Exchange is the world’s leading platform for unifying a business’s email, calendar and contacts. More than 470 million mailboxes worldwide leverage Exchange to communicate, collaborate and compete at a Fortune 500 level. With Hosted Exchange, your Exchange server is installed and managed in the cloud, as a service, with no fees upfront. You get all the functionality of Exchange with none of the overhead.
With Hosted Exchange you’ll enjoy:
Free migration performed by our experts
24/7 support with typical hold times of <60 seconds
99.999% uptime guarantee
Hosted PBX is a complete business communications system and service. With over 40 calling features, Hosted PBX delivers Fortune 500 style capabilities to small and mid-sized businesses. This powerful cloud-based phones system uses a company’s existing data connection and wiring. Best of all, onsite PBX hardware is not required!
With Hosted PBX you’ll enjoy:
Savings up to 50% on your phone bill
Rich, enterprise-grade calling features
A powerful web-based control panel
24/7 support and a 99.999% uptime guarantee
ShareSync is a 2-in-1 solution that makes backup and file sharing easy to use and secure. With ShareSync, users can back up their files to a powerful enterprise-class data center with a 99.999% uptime guarantee and file redundancy while having the added benefits of file sharing and collaboration.
With ShareSync®, you’ll enjoy:
Real-time backup & sync for PCs and Mac®
Simple and secure file sharing with colleagues and customers
Access to files from any device
Leading data encryption and protection to ensure security
Encrypted Email automatically filters and scans your emails to help protect your company against data loss. It also helps you comply with HIPAA, SOX, GLBA, California’s Security Breach Notification Act, the Massachusetts Encryption Law and more.
With our email encryption, you get:
Content filtering and scanning of outbound email
Centralized control over policies
Reduced risk of confidential data loss
Improved facilitation of compliance with regulations
Data Backup and Recovery
What would happen if you lost all of your digital information? Even if you are backing up all of your data onto a server, there is still a chance that the data can be lost. To truly back up your data, you must move it offsite. We provide physical and cloud storage solutions that make it safer and easier to restore information in case of a disaster. This data is also made available via applications or direct secure URL for realtime remote data access.
Our expert network engineers and systems administrators have the training and experience to serve as your virtual Chief Technology Officer. If your business deals with regulatory requirements, such as HIPAA, Sarbanes-Oxley, or PCI, Think can help make sure your business IT solutions meet the requirements of those laws.
Call for a consultation (888-98-THINK) or contact us when you need recommendations, audit or budget planning.
November 27th, 2017 Posted by MarketingSecurity
0 thoughts on “HIPAA Compliance Solutions”
Medical providers and healthcare organizations need to be careful about compliance. It can be intimidating trying to navigate the world of HIPAA and other rules, but it doesn’t have to be too complicated. In a nutshell…
Protected Health Information
Healthcare organizations that are “Covered Entities” under HIPAA are expected to secure protected health information (PHI) sent by email using reasonable and appropriate encryption technology. And in the event that PHI is lost or stolen, encrypted data is exempted from fines and consumer and agency notification by most regulations.
We have the expertise and resources to help you comply, and our service will automatically encrypt messages and attachments that contain PHI. This is done automatically, which is important, because most breaches of PHI are accidental.
With our expert services, you can be compliant very quickly.
Automatic Email Encryption
Protect your patients’ privacy, and protect your company from possible penalties. Get in touch to learn more about automatic encryption for email. Contact us, or give us a call at 888-98-THINK.