BEI has been selected to provide IT support for the staff of the Montgomery County Medical Society. BEI has been a Premier Partner of the Montgomery County Medical Society since 2012, and we are very excited about adding IT support to our relationship.
Susan D’Antoni, Executive Director of MCMS, commented, “We are excited about this new relationship with BEI. We look forward to working with them to bring even more value to our own association and to our physician members.”
News broke recently about a new vulnerability called Bash Bug (also known as Shellshock), which exploits a bug in software that runs on many web servers and Apple computers that run OS X operating systems. It will NOT affect Apple iOS users like the iPad or iPhones nor will it affect Microsoft Windows operating systems.
The real techies can see the details from the NIST National Cyber Awareness System here; the rest of us can read this article. The recommended solution path as provided by WatchGuard firewalls is to download and deploy patches from your vendors immediately. See the full article from WatchGuard here. Most BEI clients don’t have any action to take – just be aware that this issue is out there. The real problem could come with Internet connected devices such as wireless routers, security cameras or appliances if they have a web- based interface. If you have any questions please give us a call, and we’ll send out updates if they seem relevant to our clients.
Most of us have sent emails that were embarrassing in one way or another. Maybe there was a misspelling or we replied all when we didn’t mean to. This article will make most of us feel better – it detail some spectacular mistakes that had seriously humiliating consequences. It is worth reading as it may make you a little more cautious the next time you click “send”!
This might seem to go a little far afield as a tech tip, but we thought they were worth sharing. This article includes tips such as:
• How to check expiration dates (did you know that not all titles are permanent on Netflix?)
• Managing multiple profiles on one account
• How to know who is watching on your account
• A website that shows the most popular movies and TV shows as well as the Rotten Tomatoes ranking when it is available
This website is terrific at conveying information about data breaches – where are they from, how big, when, and more. Say you want to look at data breaches in the financial industry over the last year that were the result of an inside job. Or healthcare data breaches that were the result of lost or stolen computers. It is all there – and more details can be found by clicking on the individual bubbles. See below for an example.
Ever wonder what a particular hashtag meant? This website does a pretty good job of translating. Here are a couple of random examples:
• #smh – shaking my head
• #igers – people who use Instagram
• #yolo – you only live once
• #nats – Washington Nationals
Ready to survive a cyber attack? Then skip this lunch…
Wildfire Grill, Tysons Galleria
Tuesday, October 7, noon – 2 pm
The average data breach costs $3.5 million – a huge monetary and time cost for any organization. Prudent steps should be taken to avoid these issues. Most businesses avoid thinking about data security because they have too many other things to do. If you are hit with a breach, it is too late!
Every day we wake up and read about a new data breach – Target, Home Depot, Apple, Sony are just a few recent examples. Small businesses get hacked too –they just generally don’t make the news. Is your IT staff taking the right steps to protect sensitive client and employee information against hacking, carelessness and theft? And does your insurance cover you when those measures are not enough?
Cybercrime is increasing (global losses are estimated at $500 billion/year) as is the amount of sensitive electronic information that we all store. Attend this seminar to learn what you can do to protect your sensitive information, prepare for what might happen, and persevere in the face of rapidly growing threats.
Sponsored by BEI and AHT Insurance, this seminar is designed for companies’ security officers, senior executive and business owner who are worried about the growing risks to their business.
Mike Jennings is President of BEI and leads BEI’s technical staff, including network design, implementation and client support. Mike and the staff at BEI have developed a multi-tiered security strategy that employs layers of security, robust backup and disaster recovery as well as end-user education. This strategy has been effectively used in hundreds of small and medium sized client networks to minimize security incidents over the past several years.
David Schaefer is a Principal and Executive Vice President of AHT Insurance, where he is the leader of AHT’s technology and government contractor insurance practice groups. David is co-author of Understanding Insurance and Risk Management for Government Contracts, a research project funded by a grant from the Chubb Group of Insurance Cos.
Please note that space is limited to two individuals from each organization.
Tuesday, October 7, noon – 2 pm
Wildfire Tysons Galleria
Questions? Email firstname.lastname@example.org
The Northern Chapter of Virginia Society of Certified Public Accountants Cyber-Security and How to Protect Yourself from Data Breaches & Fraud is sponsoring the following seminar:
NCVSCPA Accounting Trends and Technology
Come hear from a panel of professionals share tips and best cyber-security practices to protect you and your clients.
Panel consists of:
• Mike Jennings, President of Business Engineering Inc.
• Bill Aiton, President of SSi Consulting
• Dave Karakashian, Senior Manager with WithumSmith+Brown, CPAs and Consultants, CPA, CFE, CISA, CITP
October 22nd, 2014, 5 to 7 pm [Registration begins at 4:30 pm
Please RSVP to email@example.com by 5pm, 10/17/14
In the late afternoon of August 29 – the Friday before Labor Day – CMS published a final rule that affects most physicians participating in the Meaningful Use program. The final rule is not materially different than the proposed rule, which was issued back in May. CMS made these changes because very few hospitals and physicians had attested to Meaningful Use Stage 2 by May 2014. The big problem was that EHR vendors could not get their products past the certification bodies in time for reasonable 2014 deployments. There are implications for everyone – we suggest that you review this article and then let us know if you have specific questions.
This article has a long list of cool tricks – chances are that there is one you don’t know! Here is a sampling:
- Shake to undo. If you make a mistake while typing or editing a picture just give your phone a little shake and you’ll be asked if want to “undo” your typing.
- Recharge your battery faster by switching to airplane mode – this works for many devices.
- Find out what flights are overhead – ask Siri “What flights are above me” or “Planes overhead”. A real time waster, but pretty cool.