Small Business Technical Checkup for the 21st Century

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Disaster Recovery The People Dimension. Today’s Agenda Why bother with any Disaster Recovery/Business Continuity Planning? Importance of the People Factor.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Risk Overview Lynne Shoemaker, RHIA, CHP, CHC OCHIN Integrity Officer Daniel M. Briley, CISSP, CIPP Summit Security Group.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
© HIPAA Continuity Planners HIPAA Mandates a PLAN! (beyond hardware and software) Presented in Partnership with.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Controls Definition: Process of exercising a restraining or guiding influence over the activities of an object, organism, or system.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Steps to Compliance: Risk Assessment PRESENTED BY.
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.
Welcome to iDOC Corp. DocHost Solution Online Document Management DocHost 14 Day Free Trial
SEC835 Database and Web application security Information Security Architecture.
The Cost of Cheap Understanding Your IT Investment Options.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Dr.Backup Online Backup Service (888) (toll free)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Cyber Security & Fraud – The impact on small businesses.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Small Business Security Keith Slagle April 24, 2007.
Frontline Enterprise Security
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
Secure Your Small Business With The Best IT SupportIT Support.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Managed IT Services JND Consulting Group LLC
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Michael Wright • Chief Security Officer • Tech Lock
Technology and Business Continuity
3 Do you monitor for unauthorized intrusion activity?
Avenues International Inc.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Current ‘Hot Topics’ in Information Security Governance Auditing
Information Technology (IT) Department
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Gmail Password Support Customer Service Numebr
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
General Data Protection Regulation
12 STEPS TO A GDPR AWARE NETWORK
Drew Hunt Network Security Analyst Valley Medical Center
Increase and Improve your PC management with Windows Intune
Understanding the issues related to the use of information
The MobileIron® Threat Detection difference:
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
3 Do you monitor for unauthorized intrusion activity?
Capitalize on Your Business’s Technology
Introduction to the PACS Security
6. Application Software Security
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

Small Business Technical Checkup for the 21st Century Hello and welcome to this short webinar on the topic of small business technology for the 21st century. Today we will touch on today’s office technologies, network security, Managed IT and Backup and Disaster recovery.

Introductions Jose Morelos Technical Support II Technician My name is Jose Morelos and I’m a Technical Support Technician II with Arvig. I work with…

Agenda Office Technologies Network Security Backup and Disaster Recovery Q & A

Office Technology Today Download speeds are high but upload is inadequate Printers work but are unsupported Local servers and local email Computers are not up-to-date

Office Technology for the 21st Century Internet Uploads Are Close To Matching Download (or at least high enough to meet the business need)

Printers

Cloud Services

Office Tech For 21st Century

Managed IT Service Benefits 24/7 Protection Proactive Approach More Affordable & Reliable Compared to Break-Fix

Network Security Today Simple passwords Unsure of compliance (HIPAA, PCI) Network is not documented Dated or no firewall

Passwords Passwords

HIPAA

HIPAA Develop & Implement Policies Control Access Manage Mobile Devices Ensure Data Protection Train Your Workforce Conduct a HIPAA Assessment

HIPAA Tier 1: Entity or individual did not know (and by exercising reasonable diligence would not have known) the act was a HIPAA violation. PENALTY: $100 - $50,000 per violation, up to an annual maximum of $1.5 million for repeat violations. Tier 4: HIPAA violation due to willful neglect and not corrected. PENALTY: $50,000 or more per violation, up to an annual maximum of $1.5 million for repeat violations. Civil Monetary Fines 4 Tiers: Tier 1: Entity or individual did not know (and by exercising reasonable diligence would not have known) the act was a HIPAA violation. PENALTY: $100 - $50,000 per violation, up to an annual maximum of $1.5 million for repeat violations Tier 2: HIPAA violation due to reasonable cause and was not due to willful neglect. PENALTY: $1,000 - $50,000 per violation, up to an annual maximum of $1.5 million for repeat violations. Tier 3: HIPAA violation due to willful neglect, but violation was corrected within required time period. PENALTY: $ 10,000 - $50,000 per violation, up to an annual maximum of $1.5 million for repeat violations. Tier 4: HIPAA violation due to willful neglect and not corrected. PENALTY: $50,000 or more per violation, up to an annual maximum of $1.5 million for repeat violations

Document Your Network

What the wiring should look like...

Security

Firewalls Keep your business safe Let good in and keep bad out Stop hidden threats

The Golden Question What if.....tomorrow your business network and/or data is lost? How will you start again?

FACTS 50% of small and medium sized businesses have no backup or disaster recovery plan. 93% of companies fail within 5 years of data loss, even if they can recover in the short term. 43% of companies never recover from large-scale data loss and go out of business within one year of suffering data loss. Survival rate for companies without a disaster recovery plan is less than 10%.

BDR Protects Against

Q&A I can come up with long, complex passwords, but how can I keep track of them? (Password generator, apps) How can you document your network? And then how do you suggest to monitor it? How would Backup and Disaster recovery better protect my business?

THANK YOU Jose Morelos Technical Support II Technician Thank you for joining us today to learn more about how to keep your business’ technology up-to-date and secure.