Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

5 Simple Ways To Keep Your Company’s Digital Data Secure

digital secure data

5 Simple Ways To Keep Your Company’s Digital Data Secure

Cyberattacks are on the rise, and no matter how secure you think your corporate network is, you could still be vulnerable for attack. In fact, 68% of small businesses don’t have a disaster recovery plan. If this sounds like you, here are some things you can do right now to ensure you don’t become a victim.

Backup Your Data

This may sound silly, but simply backing your data up to the cloud or a physical backup server could save you from stressful, taxing data recovery if a breach ever occurs. If your data gets hacked or compromised, restoring it is as simple as pulling it from your backup server and going on with your workday as long as you have made the effort to secure it. If not, you could be looking at costly and time-intensive recovery, which could be devastating to your company.

Ensure Employees are Using the Internet Securely

If you do not have an employee Internet policy in place, now is the time to enact one. This is particularly important if your employees have the ability to browse the Internet on company computers or laptops (for remote workers) that are connected to the corporate network. It is frighteningly simple for an employee to inadvertently click on an infected link or open a dangerous email attachment that could bring down your entire network. If you don’t want to have a strict policy about which sites employees can browse on work computers, at least ensure that you educate them on the dangers of unsafe browsing. Also, ensure that all browsing sessions use strong encryption like SSL or TLS. If you are wondering what is TLS, it is a super secure protocol which provides the utmost amount of security and privacy for Internet browsing, email, and more.

Install Anti-Malware Protection

Your company’s computers likely came with a free trial of some type of security or anti-malware software. Did you use the trial until it expired and then leave your computer unprotected? Many people are guilty of forgetting to secure their computers, and many also feel like malware protection software isn’t essential because they don’t surf sketchy sites anyway. Yet, malware can be anywhere and can sneak past even the most tech-savvy person at any time. If you don’t currently have this type of software installed on every computer connected to your corporate network, it is essential that you get it installed ASAP.

Install Software Updates

Software updates can be a major pain. They always want to run at the least convenient time and can take your computer offline for hours. Yet, it is important not to ignore these updates because they can contain much more than new features that you don’t care about. Many updates actually contain bug fixes and security patches that should not be missed. Consider encouraging employees to (or have your tech team) set up automatic software updates that run at night, or when computers aren’t in use and at risk of halting productivity. Circumventing updates may seem innocent, but it’s important to let them run so you don’t put your entire company at unnecessary risk.

Turn Computers Off

Turn computers off when not in use, especially overnight. A computer left unoccupied overnight is the perfect target for hackers because they know that no one is there to stop them. A good rule of thumb is that if you will not be near your computer for a lengthy amount of time (this doesn’t mean a quick lunch break), turn it off so that no one aside from you has access. This is also a good idea if you work in an environment with other people who could see things that they shouldn’t on your monitor — innocently or not.

Keeping your digital data safe from a devastating cyberattack is easier than you think. Use these simple tips and you’ll be well-armed against any attacker that tries to breach your network.