Webinar Series: E-mail and PHI

mvp webinar

How SECURE is Your Email and Patients’ Protected Health Information (PHI)?

Thursday, December 18th from 12 – 1 p.m. 

We will cover everything you need to know about e-mail security, HIPAA requirements, how to keep your e-mail and information safe, and we will be answering the questions you most want to know! Please click the link below to register, as well as submit specific questions you have about secure e-mail and keeping personal health information safe!

REGISTER NOW!

Cryptowall

Viruses are like cobwebs in your house–you can never keep them out completely but with regular dusting you can do a lot to avoid or minimize them. Cryptowall is the latest in a string of ominous-sounding viruses making the rounds. It is a Trojan Horse, popping up as an innocuous-seeming e-mail and infecting a network by tricking people into installing it themselves.

picture1

The most important thing to remember when dealing with viruses like these is to never download attachments that you aren’t expecting. Even if the e-mail appears to be coming from someone you know, if it is vague or there isn’t a reason for them to be sending you an attachment, double check that it is legitimate. A quick phone call can save a lot of headaches down the line. There are a few common e-mails circulating to watch out for in particular. Click through the gallery to see some examples.

This slideshow requires JavaScript.

Once a computer is infected, the virus begins by establishing a network connection to remote servers where it uploads connection information like the IP address, location, and system information from the infected machine. It then creates encrypted copies of all files, deleting the originals and leaving an encrypted version in its place in an effort to extract money for the decryption key. The virus expands beyond just a local computer, hopping onto files located on other drives–such as external hard drives, butt-based storage that saves a local copy of files, and network shares (any drive that has been assigned a letter).

Once your drive has been infected, you will typically see three files in every directory with encrypted files:

  • DECRYPT_INSTRUCTION.txt
  • DECRYPT_INSTRUCTION.html
  • DECRYPT_INSTRUCTION.url

Picture3

You may also see error pop-ups or data that looks garbled when attempting to open an encrypted file. If you believe your computer has been infected by this or any virus, IMMEDIATELY DISCONNECT YOUR COMPUTER FROM THE NETWORK! Just pull the network cable right out of it. You should also perform regular backups, stored offline, and maintain your anti-virus software.

MVP Cloud Computing Best Practices

MVP Best Practice

MVP Best Practice has been developed to make sure our partners make the correct technology decisions.  The notion that it’s a good idea to move data and applications to public cloud providers, or even private clouds, is not always true. In the majority of cases, using public clouds adds a great deal of value, however, in certain instances, cloud computing doesn’t make sense.

No technology is a good fit for everything.  Yet both, people and companies, like to treat new technologies as a universal silver bullet, using it where it does not make sense — a mistake they’re repeating now with cloud computing.

How can you determine if Cloud Computing is right for your company?

For almost every small business the benefits of Cloud Computing will either streamline their operation, provide better remote access, or simply save money.  Some businesses are fortunate enough to be able to move their entire operation to the Cloud, others can only move a portion.  So the better question to ask is: 
How much of my operation can be migrated to the Cloud?

For businesses with simple operations, often their entire infrastructure can be migrated to the Cloud.  For example: if your business runs with nothing more sophisticated than email, Office documents and QuickBooks–there’s no compelling reason to maintain an in-house server: these systems can be cost effectively migrated to the Cloud.

For businesses with more sophisticated requirements, software applications that are not cloud-friendly, or high amounts of data (IE: terabytes), a hybrid-cloud solution is great way to leverage the benefits of Cloud computing without breaking the bank.  For example: a business with a high volume of large, graphically-intensive files may opt to keep this data on-premise where it can be cheaply stored and efficiently manipulated, while migrating their email, Office documents and accounting software to the Cloud to reduce the number of in-house servers to maintain.

Who we are

MVP is a technology company based in Western New York that helps its partners achieve there corporate goals through the intelligent use of technology for over 10 years. MVP helps businesses like yours create the strong communication foundations needed to ensure success. We build reliable voice and data networks that secure sensitive company data, promote organizational growth, improve team productivity, and generate competitive business advantages. 

Our goal at MVP is to provide technical consulting services that identify critical business needs and proactively develop long-term solutions that are affordable and ensure the needs of your business are put first. 

MVP area of expertise focuses on 4 areas of technology. 

1. Telephony Solutions – MVP is an AVAYA Partner and also offers HoPs (Hosted Office Phone System) 

2. Managed IT Services – MVP provides Managed IT support and maintenance for any size network with end-user help-desk support. 

3. Cloud Computing – MVP offers Public, Hybrid and Private cloud computing solutions custom tailored to your specific needs. 

4. Development Services and solutions – MVP has the development expertise in house to help you evaluate your business process and implement an ERP solution that will streamline your operations. MVP has also developed a custom hosted software solutions for the funeral business. MVP is a SAP Business One partner. 

MVP show you how your IT should be managed and converged to work together in a cohesive network environment.