Managing cybersecurity in an evolving landscape

As stories of large scale cyberattacks like the recent T-Mobile data breach become more frequent, cybersecurity and security infrastructure is more important than ever. While it may seem like a “big business” problem, according to the Verizon 2019 Data Breach Investigations Report (DBIR), 43% of cyber-attacks target small businesses. Most ransomware doesn’t know who it’s attacking or have specific targets. Attempts are mostly automated and sent out in large numbers aiming to hit the most people possible looking for an easy target.  Michael Kaiser, executive director of the nonprofit National Cyber Security Alliance said “Businesses and organizations that don’t take cybersecurity seriously are leaving themselves vulnerable to attack and risk significant impact to their operations,”.

In the modern world, network security isn’t an option, it’s a necessity.

Many small businesses don’t have the resources to manage their network themselves. The solution to this is partnering with a managed technical service provider. While the managed IT market has become saturated, those providers are often mediocre at best. Most providers fix something once it is broken. The correct company’s approach will aim to fix the issue proactively, and focus on the cause of issue to help your system run smoothly and reliably. This limits recurring issues saving your organization headaches, inefficiency and frustration.

After nearly a decade of requests from our customers, Metro Sales Inc (MSI) has launched our Managed Technical Services department. We took extra time to understand the layers of security needed and how they interact with each other. This includes education of the user base to prevent the most common type of attacks, including the types of phishing that lead to most ransomware attacks. We employ not just a single solution, but a full Managed Technical Service plan with cybersecurity tailored to your organization’s needs.

Metro has combined our legacy of service with the most trusted and comprehensive IT solutions to partner with you, allowing your business focus to stay on what you do best. We’re uniquely positioned to service start-ups all the way up to large scale multiple office organizations. Our offering is able to grow with you as your business needs change, and to help you best navigate the options available. Our process ensures that you will feel confident in every dollar spent.

For more information on Metro’s Managed Technical Services offering, email mts@metrosales.com.

How to create a HIPAA Compliant Office: Printers & Copiers

HIPAA Compliance

Unfortunately, one of the biggest shortcomings we see when working with healthcare organizations is a lack of attention to the role that printing technology plays in HIPAA compliance. In fact, office printing technology is often the weakest link in an organization’s HIPAA compliance efforts. Here are three ways you can improve the security of your print fleet and move closer to HIPAA compliance.

Note: This post is for informational purposes only and is not legal advice.

Secure physical access

Where your devices are located should be your first consideration. Ideally, your devices should be in a location where they are only accessible to team members who are authorized to see protected information. Creating different spheres of access for HIPAA-regulated information will prevent inadvertent exposure to non-approved team members.

Hard Drive Destruction/Removal

Most multifunctional printers, copiers and fax machines have hard drives that store images of the documents you print, scan or fax. Unfortunately, this can often create security vulnerabilities. When your device is returned to a leasing company, disposed of, or sold, there is a risk that someone could the images on that hard drive. There are two steps you can take to prevent this. First, use encryption to secure access these images. Second, when you finish using your device or the hard drive within it, make sure to wipe the hard drive and/or destroy it.

If you are leasing your device, ask your office technology provider what their policy is for hard drive security. Usually, vendors working with healthcare organizations have a special selection of printers that meet HIPAA security standards and a policy about destroying used hard drives.

Secure print release

Secure print release offers another form of security, especially if restricting physical access to shared devices is impossible. With secure print release, you can set up your printers to only print documents when someone enters their individual access code or swipes a security badge/fob.

Is your office technology the weakest link in your HIPAA compliance? We are ready to help! Our team of healthcare document management experts will audit your current processes and develop a custom solution to maximize the security of your documents. Get in touch by filling out our contact form or calling us at 612-861-4000.