Category Archives: Uncategorized

Top 2017 Breaches That Could Affect Any Business!

Organizations with unused, exposed websites and unencrypted storage drivers have been a huge target for hackers in recent years, now in 2017 this trend of stealing valuable information is still running rampant on the dark web. Many of these breaches occurred within the healthcare industry, which had a huge network with very rich patient data. The mistakes made by these organizations can help the many businesses who have not yet been affected take a proactive step to ensure that they will not fall victim to these cyber crimes.

Let us take a look at some of the numbers…

 

14 Million Customers: Verizon Data Breach

After a user mistake which caused the database to go public online, close to 14 million customers of the company were exposed.

4.8 million patients: Molina Healthcare

Discovered that their patient portal had a huge security flaw which could allow any Molina patient to access other patients medical claims by just changing a single number in the URL.

1.1 Million enrolled in Indiana Medicaid & CHIP 

Indiana’s Health Coverage Program released that patient data was left wide open through a live hyperlink to an IHCP report. Their IT service provider discovered the link on May 10th and reported that link contained patient data including name, Medicaid ID number, address of doctors treating patients, patient numbers, procedure costs, and the amount Medicaid paid to doctors or providers.

1 Million Personal Data Files: Washington State University

Washington State University discovered a hard drive containing personal data of about 1 million people was stolen from a locked safe that it was contained in. The hard drive contained Social Security numbers, names and some personal health data.

500,000 Patients: Michigan based 

 

Airway Oxygen

The medical supplier was hit with ransomware that shut employees out of the system where personal health information was stored.

 

Each of these breaches showcase how many people could be at risk of their personal information being completely exposed just because of one or two simple mistakes. In the case if Indiana Medicaid, if it wasn’t for their IT services provider, they may have not found the issue in a reasonable time and had major issues down the line with their business information. The main lesson for business owners to take away is that you MUST stay proactive and make sure you have backups and precautions set in place for your network to continue running smoothly, and securely.

 

ECMSI – Service in 19 min or less!!!

330.750.9412

 

 

 

What Does your Business IT and Car have in Common?

THEY BOTH NEED TO BE INSURED!

When we talk about car insurance the dark thoughts and questions begin to arise. What if I get into an accident? What if I’m travelling and left on the side of the road? What if someone hits me without my control? While all of these thoughts are very pessimistic, these things do happen, sadly, more often than we would like them to. This makes driving without some sort of car insurance seem completely ludicrous. So why should your business IT be any different?

Think about your business IT as the “vehicle” that keeps your company running. What if your network “crashes”, what if your employees are working and your computers decides to leave them on the side of the road? Or what if a hacker “hits” your network with ransomware or the many other hundreds/thousands of malicious malware that is out there today?

When talking about business IT “insurance”, we mean something a little bit different. You need to make sure that the technology in your business is secure, protected and keeps your employees as productive as possible in order for your business to stay viable. Like a car, you have to have some sort of disaster protection, or else a whole bunch of time, money and productivity of your business is lost on fixing the issue when it happens. The best “insurance” for your business network is using an outsourced IT service management provider, and here’s why.

When you outsource the management of your important IT resources they help optimize your networks performance, to make it work at the peak efficiency and reliability levels that your business demands. This can allow you to stay focused on running your business and not your network. This security, networking, data protection and user support is handled at a fraction of the cost than if your business decided to take on all of that cost itself. Risk is something your business deals with every day from market competition, to the state of the economy, don’t let your IT be another risk. Businesses have limited resources, and every owner/manager has limited time and attention. Outsourcing can help your business stay focused on your core business and not get distracted by complex IT decisions.

Secure your network today with ECMSI !

330.750.9412

 

 

WannaCry Infection

You may have seen the news this weekend. Criminal hackers have released a new strain of ransomware that spreads itself automatically across all workstations in a network, causing a global epidemic. If you or a co-worker are not paying attention and accidentally open one of these phishing email attachments, you might infect not only your own workstation, but immediately everyone else’s computer too.

Be very careful when you get an email with an attachment you did not ask for. If there is a .zip file in the attachment, do not click on it but delete the whole email. Remember: “When in doubt, throw it out!”


The Initial Infection Vector Is A Well-crafted Phishing Email.
 
The initial spread of WannaCry is coming through phishing, in which fake invoices, job offers and other lures are being sent out to random email addresses. Within the emails is a password protected .zip file, so the email uses social engineering to persuade the victim to unlock the attachment with a password, and once clicked that initiates the WannaCry infection.
 
We take proactive measures to ensure all devices that we monitor are up-to-date on their security patches and Antivirus subscriptions. Having an IT company who understands and values a proactive approach to monitoring is key in keeping you focused on your business and not IT.