Spring World 2018

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 30, Issue 3

Full Contents Now Available!

The Problem with Emails

Emails. How many do you get each day? How often do you check them? When I say “check,” I mean read. The average time spent reading an email is 11.1 seconds and only five seconds for a text. With instant communications available via texting, instant messaging and social media, email is rapidly losing its charm, particularly amongst millennials.Email still has its place in the work environment for non-urgent messages and regular communications with vendors, customers or other businesses, but is it really the most effective way to notify employees of an urgent situation? Likely not.

There are several problems with emails, such as the sheer number of them we receive each day, (an average of 88, per one study), sending and receiving isn’t always instantaneous, and there is no guarantee the receiver will take the time to open and read it. If there is a network outage, you may never get your message across as it sits in your outbox indefinitely.

When it comes to emergencies, emails simply do not convey a sense of urgency. People assume they can get to an email whenever they get the chance, and only 30 percent of them ever get read. Few emails garner the same level of attention as a text alert or similar form of communication.

...

https://www.alertmedia.com/why-you-cant-just-send-an-email/

Friday, 20 October 2017 14:42

WHY YOU CAN’T JUST SEND AN EMAIL

While MSPs do not need a reminder to practice good cybersecurity habits, we cannot always say the same for end users. That being said, National Cybersecurity Awareness Month is a great opportunity to ensure your customers are up-to-date on the latest best practices with a cybersecurity training program.

The nature of your business will dictate the specific cybersecurity training schedule you choose. However, a good start is to ensure new employees receive training as part of onboarding and all employees receive training on a regular basis. It’s important to have a formalized plan in place to keep security front of mind and keep employees informed about new threats.

Unfortunately, there’s no single product that will solve all of your cybersecurity problems. In today’s world, it takes many technologies and processes to provide comprehensive risk and security management. Total data protection requires a multi-pronged approach:

...

http://mspmentor.net/blog/how-prepare-your-customers-national-cybersecurity-awareness-month

(TNS) - Dr. Scott Witt kept close behind the ambulance carrying the newborns. On his motorcycle, he drove over and ducked under downed power lines. He swerved around embers blowing onto the highway.

Sutter Santa Rosa Regional Hospital, where Witt oversees the neonatal intensive care unit, was being evacuated Oct. 9 because of wildfires that would become the deadliest in California history.

But Witt couldn’t call the doctors who would be caring for the babies because there was no power. The physicians at the other hospital also had no way of accessing Witt’s medical records online to know what treatment was needed.

“I knew if I didn’t leave then, there would be no way I could take care of the babies,” he said.

As the blaze grew feet away, Witt tailed the ambulance through smoke and debris.

The Northern California wildfires created what some described as an unprecedented health care crisis that has served as a wake-up call in the region. Not only were two major hospitals evacuated hours into the disaster, but the chaos continued for days after.

...

http://www.govtech.com/em/disaster/Wildfires-Stressed-the-Wine-Countrys-Health-Care-System-Creating-a-Crisis-and-a-Warning-for-Future.html

It has been nearly three years since an Amazon Web Services senior executive said “Cloud is the new normal”.  Since that time, the momentum behind cloud migrations has become unstoppable as enterprises look to take advantage of the agility, scalability and cost benefits of the cloud.  

In its 2017 State of the Hybrid Cloud report, Microsoft found that 63 percent of large and midsized enterprises have already implemented a hybrid cloud environment, consisting of on-premise and public cloud infrastructures.  Cisco’s latest Global Cloud Index predicted that 92 percent of enterprise workloads will be processed in public and private cloud data centers, and just 8 percent in physical data centers, by 2020.  

So the future is cloudy, with enterprises adopting hybrid cloud strategies using services from a mix of providers.  But irrespective of the cloud services they use, or the sector in which they operate, all enterprises share common goals:  they want their business applications to deliver a quality user experience under all conditions; they want those applications to be secure and resilient; and they want them to run as efficiently as possible.

...

http://www.datacenterknowledge.com/industry-perspectives/testing-1-2-3-three-reasons-why-cloud-testing-matters

Compliance with the Health Insurance Portability and Accountability Act--or HIPAA--often keeps healthcare professionals up at night. Indeed, there is a great deal of misunderstanding and confusion on the topic.

HIPAA requires healthcare organizations to comply with specific security, privacy and breach notification rules for the storage and transmission of protected health information (PHI), including electronic data. Healthcare professionals should have a solid knowledge of HIPAA requirements. But healthcare providers who establish their own smaller practices need to understand the regulatory framework. This is important when it comes to transmitting sensitive information via email.

Many healthcare organizations are concerned about a governing body initiating a HIPAA audit. However, there are many ways that practices can come under scrutiny for email-related HIPAA compliance violations. For example, an audit can originate from a patient or an orthodontist reporting an unencrypted email, or an email server might be hacked.

...

http://mspmentor.net/blog/hipaa-compliance-101-understanding-email-security-healthcare-industry

Recommended four consecutive years by NSS Labs

HONG KONG, CHINA – The need for strong and reliable threat defense is critical to everyday operations and becomes more important as high profile attacks continue to increase. Trend Micro Incorporated (TYO: 4704) (TSE: 4704), a global leader in cybersecurity solutions, attained a perfect breach detection rating of 100 percent in the NSS Lab's Breach Detection System report. This marks the fourth consecutive year that NSS Labs has recommended Trend Micro.

A critical way to compare solution vendors is by their detection rate of evasions, an area in which five of the seven companies tested by NSS struggled. Trend Micro posted a 100 percent evasion detection rating, establishing the company in the top of the breach detection quadrant. NSS Labs results prove that Trend Micro reliably equips customers with the protection needed to keep critical data safe, and detect threats moving inbound, outbound or laterally across the network.

"The data speaks for itself, we are very proud that our customers benefit from the protection and peace of mind that come from using our solutions," said Steve Quane, executive vice president of network defense and hybrid cloud security, Trend Micro. "We remain focused on leading the industry in threat prevention, evasion protection and remediation."

CEO of NSS Labs, Inc., Vikram Phatak said, "Trend Micro's Deep Discovery achieved a 100% security effectiveness rating with the fastest time to detect attacks amongst all tested products," said Vikram Phatak, CEO of NSS Labs. "There is no question that Deep Discovery should be on the short list for everyone considering a Breach Detection solution."

With its layered security approach, Trend Micro, and specifically Deep Discovery Inspector™, has continually improved effectiveness and significantly lowered total cost of ownership. Over the last few years, costs dropped from $240 per protected Mbps to under $40 per protected Mbps on average.

The ultimate recipe for integrated advanced threat prevention calls for two essential ingredients, Deep Discovery coupled with the TippingPoint Next-Generation Intrusion Protection System. Together these protect critical data, applications, and infrastructure from known, unknown, and undisclosed attacks stemming from endpoints to data centers and networks.

To access the NSS Labs Breach Detection System report, click here.

About Trend Micro
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With more than 5,000 employees in over 50 countries and the world's most advanced global threat intelligence, Trend Micro enables users to enjoy their digital lives safely. For more information, visit www.trendmicro.com.hk.

It’s a fact of business life that customers, markets, and industry commentators only see your brand, and not the suppliers who provide the materials, components, or products behind it.

Naturally, that’s what many enterprises want, so that they can build their brand image and reap the benefits of more revenues and bigger margins.

The flip side is that if a material, component, or brand is bad or if a vendor exposes your confidential business information, then people still only see your brand.

They then consider your enterprise alone to be the culprit, putting your business continuity in danger. Companies can check up on their vendors to make sure they have preventative procedures in place.

...

http://www.opscentre.com/far-back-go-business-continuity/

Don’t worry, this isn’t another one of those articles that says, “multi-cloud is coming!” We all know multi-cloud is already here, right? In fact, in its “2017 State of the Cloud” report, Rightscale found that approximately 85 percent of organizations have a multi-cloud strategy. Further, companies in the cloud are utilizing, on average, 1.8 public clouds and 2.3 private clouds.

We also know the reasons why companies have been moving to the multi-cloud model. Making use of many cloud platforms helps you avoid vendor lock-in and choose the right cloud for each app and it’s data.

One thing many companies can’t quite explain, however, is why their multi-cloud projects aren’t staying within budget. One of the major reasons to move to the cloud is the cost savings it promises, so this problem is particularly frustrating for IT departments – and budget makers.

...

http://www.datacenterknowledge.com/industry-perspectives/how-keep-your-multi-cloud-projects-budget-now-and-future

In today’s high-pressure and limited-resource environment, it’s easy for a BCM practitioner to be overrun with just managing the program and addressing external influences. Audit requests and questionnaires can pull you in all directions and before you know it, you’ve had to push back everything you planned to do that day, week or even month.

How do you address this state of things? How do you prioritize your task list?

We’ve put together a 6-step process for taking control of, organizing, and simplifying your BCM program workflow; effectively streamlining your BCM program without creating any gaps.

...

https://www.mha-it.com/2017/10/streamlining-bcm-program/

(TNS) - The morning after Hurricane Harvey struck Victoria, Texas, Councilman Jeff Bauknight started getting calls from residents. But there was a problem.

"A lot of citizens were calling," said Bauknight. "And I had no idea - I absolutely had no idea of what to tell them."

Like some Victoria residents, Bauknight was having trouble getting information after electricity and the internet crashed. After the storm, the city largely relied on Facebook to push out updates, but that became a problem for residents who didn't use social media.

...

http://www.govtech.com/em/disaster/City-Discusses-How-to-Improve-After-Harvey.html