fbpx
Menu Close

Search Results for:

What did 2021 look like for Health IT?

So, what did 2021 look like for Health IT? For more tips and how-to’s, visit our tech blog Staff Our team has grown to 15 vaccinated geeks. Some of our staff have now been with us for 10-14 years! Danny and Chris are now managing their own teams as Project Manager and Service Manager respectively. This year we focused on our staff with a massive HR review & reform. In the review, we found that everybody agrees that Health IT is a great place to work, with solid core values and focus.  Our staff love working here and looking after…

Supply Chain Attacks in Healthcare

Supply Chain Attacks in Healthcare For more tips and how-to’s, visit our tech blog There’s a lot of chat around supply chain delays in the lead-up to Christmas, but we wanted to bring your attention to a threat with a similar name. Today, we are talking about supply chain attacks. We are going to run through what these challenges mean to your business and how you can keep your organisation secure. What is a supply chain attack? A supply chain attack transpires when a cybercriminal targets an organisation via security vulnerabilities in its supply chain. However, this vendor or provider…

New ACSC report highlights top cyber threats and trends

New ACSC report highlights top cyber threats and trends For more tips and how-to’s, visit our tech blog ACSC (Australian Cyber Security Centre) recently released their second Annual Cyber Threat Report, providing an overview of the key cyber threats affecting Australia. Below, we summarise some of the top threats to the healthcare sector, then discuss how we can protect your organisation and data. Three cyber threats you need to be aware of: Exploitation of the pandemic environment: COVID-19 provided malicious actors with the perfect backdrop to exploit the fears of everyday Australians and health organisations. Tactics included spear-phishing emails which…

Staff cybersecurity training and awareness

Staff cybersecurity training and awareness For more tips and how-to’s, visit our tech blog Last month we talked about being proactive around backups, data protection and business continuity. Another crucial step to ensuring your data is secure is regular and effective staff training and awareness. Did you know that 38% of security breaches reported to the OAIC from January to June 2020 were related to human error? You need to think of your  staff as the last line of defence against cybercriminals. If they all don’t follow safe and secure practices, then the risks of being targeted by a cyber-attack…

Why is the healthcare industry more at risk from cyber-criminals?

Why is the Healthcare industry more at risk from Cyber-criminals? For more tips and how-to’s, visit our tech blog Did you know that personal medical data is worth ten to twenty times more to a cybercriminal than any other data type? This statistic is one of the prime reasons that healthcare is the most targeted industry for hackers. However, just like you can minimise your chances of a home break-in by installing security locks, cameras or a big Doberman in the front yard, there are some easy steps that you can take to protect and back up your data to…

ASD Essential Eight

Keeping your business safe with the ASD Essential Eight What are the Essential Eight? The Essential Eight is split into 3 categories: Prevent malware delivery and execution Limit the extent of cybersecurity incidents Recover data and system availability Cybersecurity can feel overwhelming to start with, it’s filled with jargon, and then there are the fearmongering headlines in the media. As part of our core values, we’re focused on security. We do everything to protect you, your reputation, your technology infrastructure, and your patient’s privacy from day one. This focus means we have built our cyber-security and data recovery strategy around…

Phones and PBX

Yealink telephones are world class. We use and supply these at much better pricing than traditional telephony. See also our hosted PBX. Our phone solutions eliminate the need for a traditional office telephone system. The main advantage to this is reduced costs in general, but with a hosted account through our provider mVoice, you can get personal 3-digit extensions, voicemail sent straight to your email, and super-easy call transferring, parking, and conferencing. All you require are IP enabled handsets, a router and suitable broadband connection. For more info, or for Health IT to assess if IP phones are right for…

VPNs in plain English and why you would need one

Internet in tubes For more tips and how-to’s, visit our tech blog Virtual Private Networks (VPNs) have been talked about a lot lately whenever the topic of internet security comes up. Put simply, a VPN is a private connection between you and a website that can’t be spied on or tracked. Often organisations like hackers, employers, and even government will be able to see which websites you’re accessing, where you’re logging on from, and what data is being sent back and forth between your computer and the web; this might include passwords, bank details, or medical info that should remain…

Do we still need passwords?

Moving beyond the password with 2FA For more tips and how-to’s, visit our tech blog In 2013, Intel began World Password Day to promote users to keep strong passwords to protect our ever-sprawling online identities. Since then, the mindset of many tech communities has shifted. 2013 saw some of the largest data breaches in recent memory including Target Corporation and Adobe Systems. The result of these breaches and many more was even more user details leaked to online hacker communities. The immediate response is to ensure your logins are as secure as possible, and it makes sense to update your…

5G and what it means for medical practices

faster, more reliable connections For more tips and how-to’s, visit our tech blog 5G is the next step in mobile internet. Similar to how you may already use 4G mobile data, business WiFi, or ethernet cables to get your internet, 5G aims to outclass other methods of internet connection by offering faster, more reliable bandwidth. Not to be confused with speed, bandwidth is how much information you receive every second, while speed is how fast that information is received or downloaded. Let’s compare it to filling a bathtub. If the bathtub faucet has a wide opening, more water can flow at…