Healthcare Executive Commentary
-
Apple Upgrades And The Enterprise
9/6/2016
In advance of Apple’s upcoming press conference on September 7th, it’s a good time to take a look at recent announcements the company has made that are directly impacting the enterprise. Apple has been making clear and vocal shifts to increase its enterprise business over the past two years. The company now has partnerships with major enterprise players, including IBM (July 2014), Cisco (September 2015), and now SAP (May 2016). Not only do these partnerships strengthen Apple’s enterprise position, they also give the company access to hundreds of millions of potential enterprise customers.
-
Security Breaches Aren’t Just About IT
9/1/2016
When you hear about a security breach, you probably think something like, “The IT department must have missed something.” But increasingly, breaches are caused by factors outside of IT’s control. Today, a breach is just as likely to be the result of a devious email or an unwitting employee’s error as a breakdown in IT.
-
Meeting The BDR Need With Your Business Continuity Solution
8/23/2016
You cannot claim to be a solutions provider unless you offer all of the obvious necessities to your potential business clients. Part of your role as a managed IT services provider is to help each client find the best solution(s) for their business — solutions that will save them time, save them money, and help them meet desired business outcomes, such as increased profitability, optimized employee productivity, and a more streamlined technology spend.
-
Why You Should Lead Your Sales Pitch With Endpoint Security
8/23/2016
A common question asked during a job interview is whether or not the employee has an opportunity to work remotely. Not only does it benefit the employee by saving commute time, the employer benefits as there is no additional overhead or potential distraction by other employees in the office. The trend is common and software tools make it easy, but it’s possible there are too many software tools providing such services, thereby raising the level of concern for data security amongst IT professionals.
-
3 Steps To Armor Your Computer Against Hackers & Ransomware
8/18/2016
Ransomware has become a lucrative business for hackers operating worldwide with the river of money flowing into their coffers fueling a cyber security arms race — good versus criminal — and putting you squarely in the crosshairs.
-
Staffing Cybersecurity Means Managing Insanity
8/3/2016
To nurture your cybersecurity talent, prove you are working to nurture a productive workplace. By Barbara Kay, senior director of strategic solutions, Intel Security
-
Warning: What You Need To Know About Malware
7/14/2016
Most people think if they have a firewall and some kind of anti-virus program they are good, thumbs up, no need to worry about all that cyber stuff. Unfortunately, it is this kind of thinking that makes cyber criminals so wealthy and the rate of cybercrime go up. By David Nathans, director of security, SOCSoter
-
Healthcare Technologies: An Important Investment
7/13/2016
The demand for medical services is present across all geographies. By Paul Constantine, president, ScanSource POS and Barcode
-
10 Ways To Create And Retain Engagement With Process Improvement
7/13/2016
Is your business struggling to get staff involved in process improvement initiatives? If so, you can take solace in knowing you’re not alone. By Ivan Seselj, CEO, Promapp
-
Applying Machine Learning To Identify Compromised Credentials
7/8/2016
It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.