Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Winter Journal

Volume 28, Issue 1

Full Contents Now Available!

Jon Seals

Upgrade service helps ensure continuous data availability at Hilo Medical Center

DALLAS, TX – BridgeHead Software, a leader in healthcare data management, today announced BridgeHead Enablement Service for MEDITECH VOEMR, a unique methodology that helps hospitals to avoid disruption during a MEDITECH 6.x application upgrade. Through this service, hospitals working with BridgeHead Healthcare Data Management solutions are enabled to work with MEDITECH VOEMR to assist in their upgrade process.

BridgeHead collaborated with MEDITECH as they developed the View-Only EMR (VOEMR) capability, and is unique in being able to provide this enablement service. BridgeHead’s expert services team is available to assist hospitals in their use of BridgeHead’s software to create the read-only database used during MEDITECH upgrades and thereby continue hospital services throughout the process. MEDITECH encourages hospitals to update their systems with each product release in order to prevent variations between its releases.

Hilo Medical Center in Hilo, HI, recently worked with the new BridgeHead Enablement Service for MEDITECH VOEMR to facilitate a MEDITECH software upgrade and anticipates using it on an on-going basis for the two to three VOEMR upgrades it performs every year.  Finding ways to avoid downtime is a priority for Hilo Medical Center, which depends on MEDITECH HCIS to serve 42,000 patients annually in its 24-hour care facility.

“We are interested in the BridgeHead Enablement Service for MEDITECH VOEMR because it helps to ensure continuous availability of information to our clinical practitioners so that the IT department has no impact on patient services,” said Money Atwal, CIO/CFO at Hilo Medical Center. “Overall, the BridgeHead services staff have been very knowledgeable and helpful in this process. We look forward to many more successful upgrades in the future, in coordination with both BridgeHead and MEDITECH.”

“As part of its ongoing commitment to MEDITECH, BridgeHead worked closely with them as they perfected the VOEMR approach and best practice. As a result BridgeHead’s ISB/IDR solution has now been upgraded to work in tandem with the MEDITECH application to facilitate these reduced impact EMR upgrades,” said Tony Cotterill, Chief Product Officer at BridgeHead Software. “BridgeHead has a long experience in working with hospitals to support them in creating copies of the EMR database for data protection. This was a logical extension to that service.”

Interactive Resources

See the VOEMR Knowledge Base, which includes a Customer FAQ document: http://www.bridgeheadsoftware.com/campaigns/voemr_knowledge_base/

Read the customer profile for Hilo Medical Center: http://www.bridgeheadsoftware.com/customers/hilo_medical_center/

Read the Enablement Service datasheet:

http://www.bridgeheadsoftware.com/resources/category/datasheets/

 

About BridgeHead Software

With 20 years’ experience in data and storage management, BridgeHead Software is trusted by over 1,000 hospitals worldwide. Today, BridgeHead Software helps healthcare facilities overcome challenges stemming from rising data volumes and increasing storage costs while delivering peace of mind around how to storeprotect and share clinical and administrative information.

BridgeHead’s Healthcare Data Management (HDM) solutions are designed to work with any hospital’s chosen applications and storage hardware, regardless of vendor, providing greater choice, flexibility and control over the way data is managed, now and in the future. For more information, visit http://www.bridgeheadsoftware.com or follow on Twitter at @BridgeHeadHDM.

Ontrack PowerControls 7.2 provides comprehensive search and restoration support for leading BLOB storage applications

EPSOM – Kroll Ontrack, the leading provider of data recovery and e-disclosure products and services, today announced the availability of Ontrack® PowerControls™ version 7.2. Adding support for StorSimple SharePoint Database Optimiser, in addition to Metalogix StoragePoint and FileStream, Ontrack PowerControls is a comprehensive tool for accessing, searching and restoring externalised Microsoft SharePoint 2013 data. It also addresses the complex challenge of reassembling shredded files directly from a SharePoint 2013 backup without needing to restore the entire database.

The StorSimple solution uses SharePoint APIs to offload large BLOBs from SharePoint databases. This helps maintain performance levels for SharePoint servers and facilitates SharePoint disaster recovery by reducing the size of the databases that must be restored. Leveraging Ontrack PowerControls 7.2 empowers IT administrators to granularly rebuild these externalised databases and shredded SharePoint files during the restore process.

“Native SharePoint SQL storage is very expensive and huge database volumes can impact performance, so organisations leverage remote BLOB solutions like StorSimple to externalise BLOB data to reduce storage costs and increase performance,” said Paul Le Messurier, programme and operations manager at Kroll Ontrack. “Ontrack PowerControls 7.2 allows IT administrators to restore individual items without conducting a full database restore.”

Results from a recent Ontrack PowerControls customer survey revealed that 34 percent of respondents frequently receive requests for restoring SharePoint items, lists, libraries and folders. Forty-one percent of those surveyed went on to say they save more than 50 percent of time responding to these requests leveraging Ontrack PowerControls than using traditional restoration methods.

“Granular item restore with Ontrack PowerControls 7.2 is a game changer in how search and restoration from BLOBs is addressed, and we couldn’t be happier with the result,” said Burzin Patel, marketing director for StorSimple, Microsoft Corporation. “StorSimple customers can easily locate critical files, and restore them with ease, saving significant time.”

In addition to support for StorSimple, Ontrack PowerControls 7.2 also supports Microsoft Exchange Server 2013 Service Pack 1 (SP1), Microsoft SharePoint 2013 Service Pack 1 (SP1) and Microsoft Office 2013 Service Pack (SP1). For more information about the Ontrack PowerControls solution, visit http://www.krollontrack.co.uk/software/powercontrols.

About Kroll Ontrack Inc.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyse and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack is an industry-leading provider of data recovery, secure data destruction, electronic discovery and document review services. For more information about Kroll Ontrack and its data recovery services please visit:
http://www.krollontrack.co.uk/data-recovery, or follow @KrollOntrackUK on Twitter or subscribe to the Kroll Ontrack Data Blog.

Upgrade service helps ensure continuous data availability in healthcare organisations across EMEA

ASHTEAD, UK – BridgeHead Software, a leader in healthcare data management, today announced BridgeHead’s Enablement Service for MEDITECH View-Only EMR (VOEMR), a unique methodology that helps hospitals to avoid disruption during a MEDITECH application upgrade. Hospitals working with the BridgeHead Healthcare Data Management (HDM) Solution across EMEA are enabled to work with MEDITECH VOEMR to assist in their upgrade process.

BridgeHead collaborated with MEDITECH to develop the VOEMR capability, and is unique in being able to provide this upgrade service. BridgeHead’s expert services team is available to assist hospitals in their use of BridgeHead’s software to create the read-only database used during MEDITECH upgrades and thereby continue hospital operations throughout the process. MEDITECH encourages hospitals to update their systems with each product release in order to prevent variations between its releases.

“As part of its ongoing commitment to MEDITECH, BridgeHead worked closely with them to perfect the VOEMR approach and best practice. As a result, BridgeHead’s ISB/IDR solution now works in tandem with the MEDITECH application to facilitate these reduced impact EMR upgrades,” said Tony Cotterill, Chief Product Officer at BridgeHead Software. “BridgeHead has a long experience in working with hospitals to support them in creating copies of the EMR database for data protection. This was a logical extension to that service.”

BridgeHead’s Enablement Service for MEDITECH VOEMR will be rolled out in the UK and across EMEA effective immediately. The service has already piloted successfully in the US at the Hilo Medical Center and the healthcare organisation now anticipates using it on an on-going basis for the two to three VOEMR upgrades it performs every year. Finding ways to avoid downtime is a priority for Hilo Medical Center, which depends on MEDITECH HCIS to serve 42,000 patients annually in its 24-hour care facility.

Interactive Resources
Enablement Service for MEDITECH View-only EMR Upgrades Datasheet

About BridgeHead Software
With 20 years’ experience in data and storage management, BridgeHead Software is trusted by over 1,000 hospitals worldwide. Today, BridgeHead Software helps healthcare facilities overcome challenges stemming from rising data volumes and increasing storage costs while delivering peace of mind around how to store, protect and share clinical and administrative information.

BridgeHead’s Healthcare Data Management (HDM) solutions are designed to work with any hospital’s chosen applications and storage hardware, regardless of vendor, providing greater choice, flexibility and control over the way data is managed, now and in the future. For more information, visit http://www.bridgeheadsoftware.com or follow on Twitter at @BridgeHeadHDM.

Pay-by-the-Drip Resources Offer Competitive Advantages to Channel Partners


DENVER, Colo. —
Peak® (formerly PeakColo)
, an enterprise-class IaaS Cloud providerfor channel partners, announces today that Daymark Solutions Inc.selects Peak’s cloud infrastructure to power its managed solutions suite, including disaster recovery, storage and cloud services. Providing a wide variety of IT solutions, Daymark Solutions helps organizations with the time-consuming, day-to-day tasks of data center management.


With cloud services powered by peak, channel partners can easily allocate resources with a click-of-the mouse versus deploying extra capacity in order to remain prepared for increasing demand and fluctuations in their clients’ requirements.


“Peak’s unique cloud platform allows Daymark Solutions to consume storage, CPU and networking resources ‘by the drip,’ making it very beneficial from a business perspective and financial model,” states Bruce Hall, Director of Managed Services for Daymark Solutions, Inc. “With Peak, you pay for just what you need instead of allocating extra resources, money and time towards infrastructure demands.”


“By white-labeling Peak’s innovative cloud platform as their own, VARs, agents, resellers and distributors can focus more on their core business,” comments Dave Woodward, SVP of Sales for Peak. “Companies like Daymark with high-touch, personalized service, need reliable IT infrastructure so they can do what they do best and leave the cloud computing architecture up to Peak.”


Peak’s reseller and white label programs are reserved for its best in breed channel partners, partners that Peak certifies to understand the cloud, the cloud marketplace and managed services. Peak resellers participate in thorough cloud training as part of their onboarding process and are provided access to wide variety of sales enablement tools, programs and campaigns – all designed to ensure partners and their customers receive a superior cloud experience.
Channel partners leveraging the cloud, powered by Peak, layer their managed offerings atop Peak’ infrastructure to support production workloads, backup and storage services, as well as disaster recovery services in the cloud.


Peak delivers reliable, on-demand cloud computing backed by N+1 cloud architecture and 100% service level agreements. With cloud nodes available in 11 unique geographies, Peak helps channel partners onboard their clients directly to the cloud quickly and seamlessly.


For more information on how to leverage the cloud for your company, please visit
www.poweredbypeak.com

 

Research reveals worrying employee behaviours exposing organisations to significant risk of insider threats

LONDON —Courion, a leading provider of intelligent identity and access management solutions, today announced the findings of a research study revealing that a third of UK professionals are likely to consider risky behaviours that endanger or undermine data protection.

The research was conducted by OnePoll and based on surveying 1000 UK employees who have access to customer data at work. The results suggest a lack of awareness of basic data protection policies and worrying behaviours such as snooping on sensitive personal information and sharing work login details with colleagues.

While the majority of the respondents recognise that hackers are criminals, 1 in 5 believe hackers do a worthwhile job by exposing security defects that should have been fixed by organisations. Notably the younger generation holds this view more than their older counterparts with a quarter of 18-24 respondents supporting this view. This age gap is significant throughout the findings with the younger Millennial generation sometimes twice as likely to be more cavalier with their access habits. For example, 30% of the 18-24 years old respondents would snoop on sensitive customer data at work compared to only 12% of the 45-54 years old employees.

“The results point to a worrying lack of understanding of the importance of adhering to strict data protection guidelines,” said Chris Zannetos, CEO and Founder of Courion.

“As organisations are opening their networks to an increasing number of external users and employees, ensuring tougher controls on how access to sensitive data is granted, monitored and controlled is vital to preventing security breaches.”

“Instead of relying on the good intentions of their employees, businesses should consider deploying technologies that can automatically enforce data protection policies and use data insight to dynamically monitor and analyse access risk,” he added.

The research also revealed that men are more reckless than women when it comes to breaching their employer’s data protection policies. Male employees are twice more likely to access the database of an old employer if they still have access rights and more likely to pass on confidential information for money or if they feel they’ve been treated unfairly (36% men vs. 21% women).

Additional data from the research revealed that:

  • 27% of UK professionals believe that the Morrisons employee was right to steal payroll data in the security breach that took place in March this year
  • 30% of employees would pass on confidential information about their employer if they suspected they were involved in illegal activity
  • 39% of people share work login details with colleagues despite the regular warnings about protecting passwords
  • A third (33%) of UK professionals would consider accessing a previous employer’s data to help them with a new job
  • A third (33%) would access or download information from a previous employer using an old password
  • 21% of UK professionals would snoop on sensitive personal data if they have access to it

About Courion

With deep experience and more than 600 customers, Courion is the market leader in Identity and Access Management (IAM), from provisioning to governance to Identity and Access Intelligence (IAI). Courion provides insight from analyzing the big data generated from an organization’s identity and access relationships so users can efficiently and accurately provision, identify and minimize risks, and maintain continuous compliance. As a result, IT costs are reduced and audits expedited. With Courion, you can confidently provide open and compliant access to all while also protecting critical company data and assets from unauthorized access.

For more information, please visit www.courion.com or read http://blog.courion.com.

The increasingly crucial nature of building engaging relationships with customers is also changing the relationship between CIOs and chief marketing officers. The role of the latter has become so core to the business that it might well make sense for the CIO to report to him.

That was one of the takeaways from a recent interview with Larry Weber, CEO of online marketing services agency Racepoint Global, who is also the founder of  Weber Shandwick, the granddaddy of tech PR firms. I wrote about Weber earlier this month in the context of the Alibaba IPO filing; here, I want to share what he had to say about the evolution of the CIO’s role in a business world that’s being transformed by social media.

I asked Weber for his thoughts on the changing relationship between today’s CIO and CMO. He said CIOs may not like his answer:

...

http://www.itbusinessedge.com/blogs/from-under-the-rug/should-the-cio-report-to-the-chief-marketing-officer.html

A staggering 822 million records were exposed by data breaches in 2013, according to research from Risk Based Security. The frequency and risk of data breaches compels companies to look at their network infrastructure and security processes and take appropriate actions to guard against inadvertent data leaks.

An often overlooked area vulnerable to unintentional data leaks is through the use of free online file sharing and syncing solutions. While most employees never consider using a non-corporate sponsored email system, those same employees would readily collaborate through a free file-sharing tool, because it is easier to use than what is available from their employer. Another risky situation arises when a group collaborates by sharing documents and files over email. Version control quickly spins out of control as the volume of email exchanges skyrockets due to the complexity and volume of the edits and to the number of people involved. Project groups then turn to free, ad-hoc file-sharing and collaboration services, which can lead to serious data leakage problems as content is copied onto non-secure public cloud servers.

...

http://www.corporatecomplianceinsights.com/avoid-data-leaks-make-content-sharing-safe-and-compliant/

The latest business continuity related standard is now available from bsi.BS 11200:2014 ‘Crisis management - Guidance and good practice’ sets out good practice for the provision of an effective crisis management response.

The new standard aims to help organizations:

  • Understand the context and challenges of crisis management
  • Develop crisis management planning and training
  • Recognize the complexities facing a crisis team in action
  • Communicate successfully during a crisis.

More details.

The Software Engineering Institute has published version two of its ‘A Taxonomy of Operational Cyber Security Risks’ report. This updates a document first published in 2010, presenting a taxonomy of operational cyber security risks.

A Taxonomy of Operational Cyber Security Risks attempts to identify and organize the sources of operational cyber security risk into four classes:

(1) Actions of people,
(2) Systems and technology failures,
(3) Failed internal processes, and
(4) External events.

It discusses the harmonization of the taxonomy with other risk and security activities, particularly those described by the Federal Information Security Management Act (FISMA), the National Institute of Standards and Technology (NIST) Special Publications, and the CERT Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE®) method.

Obtain A Taxonomy of Operational Cyber Security Risks.

CIO — CAMBRIDGE, Mass. — The debate about technology in the enterprise used to focus on hope vs. fear. Now it's fear vs. fear — specifically, the fear of becoming the next Target vs. the fear that technology will eat your lunch, says Narinder Singh, president of [topcoder] and chief strategy officer at Appirio.

Just as we recognized that MIT Sloan CIO Symposium also suggest that digitization drives innovation. As one example, Peter Weill, chairman of the MIT Center for Information Systems Research, points to Orange Money, which lets Orange mobile phone customers in rural, developing nations access previously off-limits financial services.

...

http://www.cio.com/article/753256/7_Ways_CIOs_Should_Prepare_for_the_Digital_Enterprise