Managed IT Services

Medical Cloud Hosting Australia

DHS Gives The Latest Mandatory Policy on Medical Data Management in Australia for 2020

DHS Gives The Latest Mandatory Policy on Medical Data Management in Australia for 2020 1920 1280 Greenlight Managed IT Support Services | Sydney | Melbourne
DHS Gives Mandatory policy on medical data management in Australia

The medical data management system in Australia is not where it should be. According to Dr. Bernard Robertson-Dunn, who chairs the health committee of the Australian Privacy Foundation (APF), says that rather than focusing on improving patient health, or reducing the cost of healthcare, all the government is doing is putting patients data at risk.

According to the Notifiable Data Breaches Scheme (NBDS) report from April 2018 to March 2019, there has been a 712% percent increase in data breach notifications alone.

60 percent of those data breaches were recognized as malicious attacks with 28 percent off the attacks coming from unknown sources.

55 percent of the attacks and notifications were attributed to human error in the health sector and 41 percent in the financial sector.

Across all industries, 35 percent of those data breach notifications were set off by human error which can be attributed to the loss of a storage data device or the unintended disclosure of personal information. We wrote about more of these Cybersecurity Statistics here.

All in all, it’s safe to say that between the data storage systems and infrastructure as well as the medical community have failed their patients in terms of information privacy and the management of their security. That is why stronger rules have been put in place to patient’s worries on privacy at ease.

Mandatory DHS Rules, Requirements and Consequences

The Department of Health Services (DHS) plays the role of ensuring that health providers comply with the requirements of the Medicare Benefits Schedule (MBS) and other programs, including incentive payment programs.

To help maintain the privacy of patients’ personal information, the DHS has adopted new requirements for third-party software providers. It’s a part of their campaign for the Digital Transformation Agency’s (DTA) Secure Cloud Strategy. Under the Secure Cloud Strategy, the DHA requires that all applicable Australian software companies undergo a process of accreditation and compliance of their data management practices.

The new policy applies to any party using cloud-hosted services that connect with the DHS to provide services such as Medicare, PBS, NDIS, DVA, MyHealthRecord, Child Care, and Aged Care.

The accreditation process involves earning the Australian Signals Directorate Certified Cloud Services List (CCSL) certification and can maintain assurance that all data will remain within the Australian jurisdiction. Additionally, the policy encourages the physical separation of the infrastructure as well as limiting access to patients’ private data to those with Negative Vetting 1 (NV1) security clearance. 

Failure to comply with the DHS’s rules and policy under the Secure Cloud Strategy by the deadline on April can result in major consequences. Those consequences could mean fines, suspended licenses, and ultimately the loss of your practice.

Managing DHS Requirements and Running Your Practice

Under the DHS’s policy, all practices are required to utilize a DHA certified infrastructure to ensure the privacy of their patients. So, how do you manage that and still do work for your practice? —Managed Cloud Services, i.e., medical hosting.

What is Medical Cloud Hosting?

Medical cloud hosting is private hosting (or, more specifically, private cloud hosting). When we talk about cloud hosting, we’re referring to hundreds of individual servers that work together as one. With cloud hosting, there’s no need for an on-premise infrastructure that costs money, space, and time in maintenance. With cloud hosting, everything is managed and stored for you via a cloud service provider.

In general, you have the option of public and private cloud hosting. Of course, medical hosting is private, but for your information, here’s the difference:

Public cloud hosting involves a standard cloud computing framework consisting of files, storage, applications, and services that are available on a public network. (Think Gmail).

Private cloud hosting is comprised of the same things—only all of those things are protected by a corporate firewall controlled by the corporate IT department. (Think Microsoft Exchange, as it requires authorized users and a secure VPN connection).

In other words, private medical cloud hosting equals privacy and protection. If you’ll recall, the DHS policy applies to all third parties using cloud services that connect with the department to deliver services such as Medicare, PBS, DVA, NDIS, and so on. This could only mean that private hosting is viable.

It’s also a necessity considering the fact that it’s DHS Compliant, ISO Certified, and handled offsite via your service provider but remains within the Australian jurisdiction.

How much Should I budget for Cloud Hosting?

Cloud computing and data management within a compliant industry isn’t going to be cheap—but it will become cost-effective in the long run. Ultimately, your budget will come down to your industry and the data capacity that you need, managed services, private vs public cloud hosting, and so on.

Of course, sticking with your outdated, on premise hardware, you’re looking at heaps of unnecessary spending in system maintenance, upgrades, equipment—not to mention paying an IT team to take care of it all for you.

Is you current provider DHS compliant?

If you’re a medical practitioner responsible for running a practice and wondering where to turn for your medical cloud hosting, Greenlight ITC is here to help.

We have one of the few providers of DHA certified cloud infrastructure for medical hosting. We are your ultimate technology solutions partner. Our medical cloud hosting capabilities can make your staff more efficient, and ultimately, your businesses more profitable under its data management practices. Not to mention, we’ll keep you safe from phishing scams and serious data breaches so that your patients can rest easy knowing that their private information is safe while they’re getting the care they need.

Greenlight is also a Tier-1 Microsoft Azure Partner and 2017 Watchguard ANZ Partner of the Year.

If you want to know more about how much switching to private medical hosting is going to cost you and your practice, your best bet is to call Greenlight ITC at 02 8412 000 to get a custom quote today. You’ll get to speak directly with one of our IT experts (aka, Data Doctors) who will walk you through the entire process.

5 Surprisingly Simple Email Hacks to Save You Time

5 Surprisingly Simple Email Hacks to Save You Time 1920 1280 Greenlight Managed IT Support Services | Sydney | Melbourne

Not everyone has the luxury of 0 unread emails. Australia right now is on the Top 10 list of countries worldwide in terms of open rate according to GetResponse.

One of the main problems that business owners face when it comes to their day-to-day minutia is checking and managing their email. Whether it’s emails from your employees, clients, or from your subscriptions (even those you didn’t know you subscribed to), there’s just never enough time and never enough coming in and out, especially you as a key decision-maker.

There are many ways to manage your email, and it doesn’t have to require you to get out of your comfort zone like Inbox Zero, which may work from some, it may only add more stress than good.

So how do you sort out your email account without spending too much time on it? We found 5 Surprisingly Simple Solutions to do so with less than an hour to do.

5 Email Hacks That Save You Time

Email Hack # 1- Use Automated Tools to Remove Your Unnecessary Subscriptions

One of our favorite tools to use in the office is the online web tool Unroll.me, a software by Rakuten Intelligence, which gathers all your subscriptions when you sign up your account and you can either unsubscribe in one click or create a “rollup” of all your important email subscriptions in one convenient email, Unroll.me does the work for you. It is available on your phone as well so you can instantly go to the content that you want without having to scroll through your entire feed.

Email Hack # 2 – Create Quick Rules / Filters in Your Email

While this may take some time to set up at the start, you’ll thank yourself for it later on: Greenlight’s Operations Manager stands by it. While your Gmail account can only filter to whether an email is a Primary (Important), Social (Social Media Notifications, Emails), Promotions (Mostly Spam Opt-ins and Offers) and Updates (Important but not urgent), this is not the be-all-end-all way to filter your content. From a business standpoint, Microsoft 365 Outlook is one of the tools that can offer better filtering for emails as you can mark them as important, flag them for further action, and create rules on specific emails or users whether to put them in one folder or the other. If done right, Outlook can automatically separate any and all emails that come in through your mailbox depending on how you want it to so you never have to miss any invoices or follow-ups.

Here is a step-by-step article from Microsoft on adding rules using Outlook.

Email Hack # 3 Place all your email accounts in one easy-to-manage platform

It may sound overwhelming at first, but you don’t have to use 3-4 separate email apps when you can host all the domains you check in one platform. Gmail and Outlook can hold multiple mailboxes so you can see every single thing that is happening with the account. As business owners, you would carry either the domain with your name amongst many others (especially generic ones like ‘info’ or ‘sales’ or ‘admin’), you can easily switch and compose an email from one or the other. Outlook can also support emails from different domains, here’s how to set it up.

Email Hack # 4 – Install a Better Spam Filter

While tools like Gmail and Outlook have their own stock spam filter, it does not always work perfectly the way we want to. Oftentimes, you miss a thing or two when an important email suddenly gets flagged as junk mail by mistake and if you don’t normally check your junk mail it could be left there for days to weeks on end. Choosing a Spam Filter like SpamTitan (Greenlight recommended) that not only learns from your activity but also creates an easy-to-manage notification email where you can review each one based on what the content is without opening them. This is important as some emails are built to phish information out of unsuspecting humans when you open a wrong attachment. Spam filters give you the necessary details before you decide to either delete, deliver or whitelist (take it out of the spam filter)

Email Hack # 5 – Don’t reply or open every email sent to you

As a business owner who has more important things to do, it is understandable to not reply to any and all emails. Following the Pareto Principle wherein 80% of results that move the needle is caused by only 20% of the actions. Reply only to those that will help your business move forward. Otherwise, if it’s not urgent, set it aside for another day or better yet forward the email and delegate the task to someone else who can best address it. You’ll be surprised that some threads can actually move forward without you doing anything and that way you can create more time for you to do the things that matter in scaling your business.

Greenlight ITC is always looking for ways our clients do better business operations by creating efficient systems to Empower You through Technology.

If you have any other suggestions that others can be able to use in their business, comment on the article or contact us now.

4 Alarming Signs Your MSP/ IT Team Is Unprepared for CyberSecurity this 2020

4 Alarming Signs Your MSP/ IT Team Is Unprepared for CyberSecurity this 2020 1920 1282 Greenlight Managed IT Support Services | Sydney | Melbourne

One of the most pressing tech issues for businesses, especially in Australia, is cybersecurity.

Therefore, assuring your organization is working with an MSP or IT team with a keen focus on cybersecurity should be a top priority. The individuals comprising these teams should be subject to some rigorous scrutiny from your end. You need to make sure they have the right mindset and capability to handle your business and know what it needs in line with the risks that are out there.

The Sensitive Nature of Cybersecurity in Australia

Unfortunately, Australia – in particular – has been subject to a significant influx of cybercrimes. More specifically, businesses have seemed to face the brunt of these attacks, which are people-based.

Through such methods, Australian small businesses experienced a total of 516,380 cyberattacks between 2017 and 2018. 

Furthermore, Australian businesses could end up losing $29 billion per year because of cybercrimes, according to a Microsoft commissioned report.

If your MSP/IT team isn’t up to par in preventing these crimes, and you’re not willing to spend for quality, it’ll lead to a tremendous financial blow. The digital “streets” are now hazardous in Australia, and the only way to respond is with beefed up security. 

With your business subject to such risks, ensure 100% that your MSP/IT team doesn’t display these four red flags.

Watch Out for These Four Signs of Poor Cybersecurity Services

1) Not Having “The Talk” With You About Cybersecurity

Managing your data is more than just setting up your backup, the internet connection, or installing key antivirus in your units. MSPs should be proactive when it comes to raising awareness of the threats that play the numbers game. Because it doesn’t matter how big or how small the business can be, as long as they grab your data.

The right MSPs treat your business as equally valuable as theirs, if not more, and ensuring you are aware of what to do or how to get your systems defended from threats is now more essential than before.

So when your MSP has yet to start the conversation about keeping your data cyber safe, you might want to check if they have the necessary tools or strategies in place.  

2) Not Using Their Own Products

Even a dedicated, expert team can’t make up for a product that isn’t up to global and institutional standards.

Though, it’s going to be hard during the vetting process to discern whether the product if its part of their package.

One way to cut through the bluster and savvy marketing talk is to find out one crucial fact. That being, do they use their own products throughout their organization?

If not, your potential MSP/IT team shows a distinct lack of faith in their own product. 

3) No Cybersecurity Culture in their Workplace

Using their products is one thing, but the MSP’s executive team should be able to take the charge when it comes to ensuring their whole organization follows the culture of securing the client’s and their own personal data.

Ensuring certain processes and preventive measures in place such as multi-factor authentication across all units (mobile and desktop) are some of the first few things to check.

You can also ask for a tour in their workplace so you can meet the team and see how the business is run to see where your investment is going to.

Having key processes shows they take Cybersecurity and your safety very seriously.

4) Their Training and Support isn’t Up to Par

To securely utilize MPS and IT solutions, the entirety of your own team must take the time to learn the ins and outs of the technology.

Many of these solutions can be quite complicated. But it doesn’t have to be for you and your employees. Your marketing team, all the way to your in-house IT staff, will, however, need regular guidance and training for the essentials.

For technology to generate the best possible return and make the most positive impact in your workplace, everybody needs to properly use it and be aware of how to lessen their risks in their role. Just because someone’s skill set doesn’t align with tech, doesn’t mean they shouldn’t have product knowledge when they work for an MSP/IT organization.

Ensuring that your potential MSP/IT team offers essentials training, they must also be able to train them without the information overload. That means being able to do create a program fit for every employee and business owner, practically created based on their business needs.

MSPs Are Essential for Your Business

You might think you’ll be able to skate by without a reliable technology vendor who provides an array of services. In 2020, with the security risks mentioned above, as well as the fast-paced demand of today’s tech-driven world, you need experts at your side that understand your business and creates a culture of Cyber Safety in and out of their company.

The right MSPs give you that secure, sure hand that streamlines your operations and brings everything to a new level.

Don’t Miss out on Enhancing Your Cybersecurity

With all the risks we’ve discussed, it’s time for your organization to shore up on your cybersecurity.

This week, we have an event on the 21st of February about Cybersafety as a way for businesses to learn the essentials of cybersecurity without spending a fortune.

Where: Mantra, Chatswood 10 Brown Street

When: February 21 2019, 9am -12 pm

When you attend, you’ll receive a secure and encrypted scan that explores all users and domains related to your business and whether or not is been exposed to the Dark Web (valued at $499)

Click on the link below to register:

http://bit.ly/cybersafety2020

Image of Operations Center

6 Biggest Threats that Your MSP Should Prepare You for This 2020

6 Biggest Threats that Your MSP Should Prepare You for This 2020 1920 1280 Greenlight Managed IT Support Services | Sydney | Melbourne

The Hard Truth About Malware in Australia

(The statistics in this section are findings from this article)

It seems like businesses in Australia are uniquely behind the times when it comes to managing cybercrime and security.

2019 was an exceptionally challenging year. Throughout the country, at least 23,000 Australian businesses dealt with some manner of a cybersecurity emergency.

In fact, the first half of last year saw 9.2 million recorded malware detections from businesses. While the average cost paid to cyber extortionists was $36,295. On the high end of these crimes, there have even been payments made that have reached $250,000.

The eventual toll 2019 took on Australia is $19 million in cybercrime. This year, the number is projected to jump 27%—and another 52% by 2022.

It’s integral for you, as a business owner, to commit to halting these crimes by complying with security measures and protecting your data.

Six Malicious Cyberthreats Looming Over Your Business

(The statistics in this section are findings from this report)

1. Lack of Communication Between Small Businesses and Their MSP

The biggest problem facing Australian businesses is their own inaction. With more room to roam freely and launch malicious attacks on businesses across the country, it’s only possible for cybercriminals to grow bolder and stronger.

Part of that inaction is not having a firm plan or strategy in place to handle these threats.

Such a strategy can only be formed and executed if businesses are proactive and align themselves with an MSP willing to collaborate on an effective solution.

Sadly, there’s a disconnect throughout the country with small businesses and their MSPs. 90% of MSPs are “very concerned” about the ransomware threat, while only 24% of their small business clients feel the same.

Meaning, businesses aren’t listening to their MSPs—who clearly aren’t doing a good enough job conveying that information.

2. Getting Baited by Email Phishing Scams

It’s incredible to think that in 2020, businesses would get bilked by phishing emails out of highly sensitive information.

However, these scams have become increasingly more deceptive and intricate as the years have gone by. Even the savviest of individuals can end up getting hooked by a phishing scam.

MSPs throughout Australia rank phishing emails as the leading cause of successful attacks, with 73% of small businesses falling victim to these scams.

3. Your MSP Lacks of Education About Cybersecurity

Another issue ranked by Australian MSPs as a leading cause of malicious cyberattacks is a lack of education on these matters.

33% report a lack of cybersecurity training directly leading to attacks.

Understandably, businesses fall victim to this lack of education. Owners are so laser-focused on their products and services, and matters of security are overwhelming and all-encompassing. It’s incredibly challenging to remain informed on these issues.

Still, it’s crucial to stay informed and ready for these risks, which is much easier when you’re working with a top-notch MSP.

4. Weak Password Strategy 

It becomes effortless for hackers to invade your email inbox and procure sensitive information when they don’t actually have to hack.

39% of small businesses have weak passwords, according to MSPs. This statistic is highly likely due to the lack of education on cybersecurity for these businesses.

5. The Growing Capabilities of Ransomware

In 2019, ransomware was as prevalent as ever as a malware threat to your system. To elaborate, 89% of MSPs report this malicious software as the most common malware threat to SMBs.

Furthermore, 64% of MSPs reported attacks against clients during the first half of last year, alone. On top of that, the aftermath of a ransomware attack is devastating. Almost 50% of MSPs report victimized clients experiencing levels of downtime that threatened their business.

6. DIYing Tech Services

Throughout this blog, it’s been made clear that a lot of these issues result from an educational gap. And, of course, they occur due to a disconnect with MSP and IT teams.

Well, you can’t communicate with your MSP if you haven’t hired one to help with such services.

Tech these days is so sophisticated that it’s not something you can really DIY. You have your own discipline, and digital technology is its own fulltime job. There isn’t any possible way you can dedicate the necessary time to matters such as cybersecurity when you’re focused on other aspects of your business.

If there is one take away from this article, it is to at least have a conversation with your IT provider around cyber security.

Windows PC Image

10 Crucial Apps That can 10x Your Windows 10 Performance

10 Crucial Apps That can 10x Your Windows 10 Performance 1920 1440 Greenlight Managed IT Support Services | Sydney | Melbourne

Many new apps will help increase your productivity and make getting the job done a bit easier. But not all of them still roll out support for Windows 7. Having checked the Windows app store, their minimum requirement is that your operating system run Windows 10.

Regardless of what business you’re in, you’ll find a useful Windows 10 app that you can’t use on Windows 7. Here are some of our top picks!

1. Myki

Myki logo and Link to the Microsoft Store

Myki keeps your passwords and other sensitive data safe and secure. It’s an offline password manager with the convenience of a cloud-connected one. You can store and sync your data with all Myki-enabled devices. Some of the bonuses of this are:

  • More secure than the cloud
  • Seamlessly sync P2P devices
  • No master password

2. Microsoft To Do List

Microsoft To Do List Logo and Link to Microsoft Store

With Microsoft To Do List, you can plan out each day using intelligent and personalized suggestions to optimize your daily to-dos. No matter where you are, you can capture and retrieve lists across all your devices so you can stay organized at home, at work, or on the move.

If you need to share your to-do list with someone, you can do that easily with the share list of colleagues, friends, and family. Best of all, Microsoft To Do List sends you reminders of due dates and particular tasks you need to complete, so you never miss anything.

3. Whatsapp for Windows

Whatsapp Logo and Link to Microsoft Store

Whatsapp for Windows 10 allows you to sync all of your chats so you can communicate with whoever you want wherever you want. Whatsapp Business is also available to help manage tasks, delegate work, and keep an organized team.

4. PDF Reader

PDF Reader Logo and Link to Microsoft Store

With this, you can read, annotate, and share PDF documents on your computer and smartphone. It’s important to have a secure platform when dealing with sensitive information, and Adobe provides that. You can mark up, write, add comments, export, share, and organize documents from anywhere.

5. Animotica Movie Maker Video Editor

Animotica Logo and Link to Microsoft Store

If your business relies on video content marketing, you’ll want to have the Animotica app for Windows 10. This app has an easy to use video editor, movie maker, and slideshow video maker. You can do simple tasks like split and trim video and audio while also handling more complex jobs like voiceovers, transitions, and Chroma key effects.

6. Get Working Hours Time Tracker

Get Working Hours logo and Link to Microsoft Store

It’s simple to track your work hours, organize, and analyze them using this Windows 10 tool. It’s a cross-platform tool, so it works on PC and smartphone no matter what you have. You can start and stop work time while also assigning tasks, marking them complete, and switching jobs around as you go. It’s compatible with calendars and Cortana as well.

7. Microsoft Your Phone

Your Phone allows users to link their Android phones and PC. You can view and reply to texts, access apps, and receive notifications to your desktop from your phone. The app even allows you to make phone calls and transfer them between devices.

8. One Calendar

One Calendar is the most popular app to view all your calendars, whether it be Google, Live, Outlook, iCloud, Exchange, Office365, or Facebook. It integrates all the calendars together to make it easier to manage appointments, meetings, and job tasks.

9. Microsoft OneNote

OneNote is the ultimate digital notebook for capturing and organizing everything across all your devices. You can write down ideas, take notes, and make to-do lists all while you sync everything with your calendar from the Windows 10 desktop.

It’s easy to search previous notes and access old information as well using OneNote. Nothing you ever write down is lost, and you can easily check off boxes on your to-do list as you go through your day.

10. Trello

Trello Logo and Link to Microsoft Store

Trello makes managing your day to day tasks that much easier. You can get an overview of what you need to accomplish each week and create cards for each job. Easily add employees and other team members to the cards to track their work progress. Using the global shortcut, you can access your Trello cards from anywhere.

Ready to Upgrade to Windows 10?

If you’re ready to drop your old and outdated operating system for one that is safer, faster, and easier to use, let’s help you do that today.

We’re offering an exclusive phone only deal to everyone who calls by the end of January 2020.

Call (02) 8412-0000 and mention “2020 Windows 7 EOL Exclusive Deal.” Don’t wait because the offer ends soon and you don’t want to miss out!

10 Ways Windows 10 Improves Your Business this 2020

10 Ways Windows 10 Improves Your Business this 2020 1920 1282 Greenlight Managed IT Support Services | Sydney | Melbourne

With Microsoft ending its support for Windows 7 on January 14, 2020, the end of life period for the OS is officially upon us.

The end of life for Windows 7 means no more bug fixes, patches, updates, functionality improvements, or security updates. For a small to medium-sized business, it means you’re leaving yourself vulnerable to attacks.

Besides security, it also means you aren’t experiencing the highest quality workflow that your business needs to function at its best. There are many benefits of Windows 10, and in this article, we’re explaining the many reasons why you should upgrade.

10 Reasons to Upgrade From Windows 7 to Windows 10

Here are the ten most important reasons you should move on past Windows 7 to Windows 10.

1. Security

Windows 10 comes equipped with the Secure Boot feature that Windows 8 users are familiar with. They’ve made some improvements to it to make it even more secure. Unlike with Windows 8, you can no longer bypass this feature. They’ve also included security features such as Device Guard, Windows Hello, and Microsoft Passport.

BitLocker also helps employees manage many different logins with smart alerts and notifications if something doesn’t seem right. There are automatic blocking protocols as well that take security out of the hands of the user and put it into the hands of the operating system.

2. Rolling Updates

Since the beginning of time, Microsoft has always charged its users for upgrades that have led us down this endless path of always waiting for the next one. We’ve moved from Windows XP to Windows 7, then 8, and then back to 7.

Some experts believe that Windows 10 will be the last operating system we use due to rolling updates. They’re treating this more as a “software as a service,” so upgrades will continually get rolled out automatically depending on which package you have.

3. Improved Scalability

Instead of having to purchase a number of software licenses for all your users, Microsoft is moving to a subscription-based model. This helps improve the scalability of your business because you can increase your package as the business need grows.

This point helps in a variety of ways. It helps improve security while also keeping operating costs in an understandable range. The business can avoid the staggering upfront cost of acquiring staff because there is no need to purchase a new license each time a new employee comes on board.

4. Speed and Performance

Speed is a huge factor for many businesses as our attention spans get shorter, yet we continue to try and squeeze more into a workday. Compared to Windows 7, the speed of startup is incredibly fast. With DirectX 12, this 3D engine helps improve speed and performance by beefing the OS up to handle more.

5. Cross-Platform

With more and more employees taking their work home with them, it’s important that the operating system function well across all devices. Workers are switching from mobile to desktop to tablets throughout the day, and everything must look the same and display properly across these devices.

Windows 10 allows you to easily transition between devices even when you’re working on a single file. The timeline feature also helps by allowing you to scroll back through a list of files to easily locate previous information so you can quickly pull it back up.

There is also a file on demand section that takes the data from the computer storage and moves them to OneDrive. Here you can pull them back up at any time without slowing down the processing speed of the computer.

6. Action Centers

As with everything else in this world, we need notifications of everything that is going on. Windows 10 provides that for you. The Action Center on Windows 10 will notify you when you receive an email, a message from one of your apps, or if there was a recent update to the system.

Something we like a lot about Windows 10 is these updates aren’t intrusive, and you can turn them off using focus mode. Most of the time, you only receive the notifications that matter to you, and the rest seem to blend into the background.

7. Microsoft Edge

While most of us are loyal to Google Chrome, Microsoft Edge provides a fresh alternative to the dated Internet Explorer. This browser offers new features like webpage markup and reading mode. We’ve also noticed that Edge is less demanding on your battery than Chrome.

In the coming years, Edge will get replaced by the Chromium Browser, but we hope that it keeps a lot of the useful and unique features of Microsoft Edge. 

8. End of Support

With the end of Windows 7 comes the end of support and warranty claims. If you’re currently using Windows 7 in your business, you’re leaving yourself wide open to security and workflow problems.

Since Microsoft is no longer updating or applying patches to Windows 7, you’re not receiving any cybersecurity protection, and Microsoft will no longer back up any warranty issues you have associated with the Operating System. For that reason alone, it is time to upgrade to Windows 10.

9. On-Demand Syncing

We’re in the age of cloud storage, and it will dramatically improve your workflow when appropriately implemented. Windows 10 helps you with this using the Files on Demand option.

This standard desktop folder allows you to access files from OneDrive, and you can access them remotely from anywhere as long as your work computer is on. This feature is excellent for companies that allow remote work or “work from home” options.

10. Nearby Sharing

We love the fact that you can send photos or documents using Bluetooth and without the need for an internet connection. If you need to get a file moved to another device quickly, you can share it using the nearby sharing app. We only hope that they will soon add this feature to mobile because that would improve the star power of this feature.

Is Your Business Ready to Upgrade to Windows 10?

If you’re ready to upgrade your business to Windows 10, we have an exclusive phone-only deal to get your business on the right track.

Get more details by calling (02) 8412 0000 and mention the “2020 Windows 7 EOL Exclusive Deal.” This incredible offer is only available until the end of January 2020, so be sure to call today and get your deal!

Top 5 Risks When You Stay with Windows 7 this 2020

Top 5 Risks When You Stay with Windows 7 this 2020 1920 1280 Greenlight Managed IT Support Services | Sydney | Melbourne

Windows 7 End of Life

Microsoft will no longer be supporting Windows 7 after a ten-year stint—as announced last December 16, 2019.

The purpose of this direction is for the tech giant to pour its ample resources into more lucrative, newer technologies. Essentially, Microsoft has squeezed as much juice as it can out of Windows 7. It doesn’t make sense for them to continue providing technical assistance and software updates that protect PCs using the outdated program.

The Impact on Your Businesses

First and foremost, Windows 7 is still being used on 39% of all PCs.

And a year from now in January 2021, Windows 7 will be used on 18.7% of all PCs, which accounts for around 281 million machines.

What does that mean, exactly? That even at under 20% of total usage on PCs, there are still over 280 million systems with Windows 7 in place. At such a vast number, it’s fair to guess that small to medium businesses make up enough of those totals. Especially since many owners might wish to sidestep the costly nature of upgrades.

Though, with the removal of all support for the system, keeping Windows 7 installed will end up being more costly than merely paying for the upgrade to Windows 10.

So, as a business owner or stakeholder who may still be using Windows 7, you’re likely interested in knowing what might happen after neglecting to upgrade.

Let’s examine some of the most significant risks involved in continuing to use Windows 7 on your PC and how it can affect your workplace:

The Top 5 Risks of Staying with Windows 7

Risk # 1.      No More Technical Support

Last year, Microsoft patched 29 Windows 7 vulnerabilities in April alone.

Of those vulnerabilities, 6 were rated critical with the other 23 being deemed important.

Think about it, that’s one month alone—and the only reason those changes were made was due to an extended support phase focused on fixing flaws. Those snafus on Windows 7, since it’s an older system, have continually surged over the years. Now, without support, these issues will be seemingly never-ending.   

Risk # 2.      Heightened Cybersecurity Risk

Studies from 2018 about cybersecurity in small-and-medium-sized businesses reported that 67% of survey respondents experienced some form of cyber-attack. On top of that, another 58% went through a data breach with employee or customer information.

These stats prove that businesses are already susceptible to these attacks. With Windows 7 now lacking the infrastructure to deal with these issues, if you don’t upgrade, the consequences could be disastrous.

Risk # 3.      Additional Costs

On a per-system basis, it’ll be possible to receive extended security support. However, there’s an additional fee paid to Microsoft per computer to obtain the appropriate security updates. Furthermore, the dollar amount owed to Microsoft will double every year and caps out at a maximum of three years.

The price begins at $50 per machine—meaning by 3 years it’ll be $150 per device. If you have around 10 machines, that can prove quite costly.

Risk # 4.      Falling Behind the Competition

As Windows 7 becomes more obsolete, more businesses will be using Windows 10. 

As technologies keep improving, functionality enhances. If you’re on an outdated system, the slower it’ll run, and it’ll be less equipped to handle the state-of-the-art tools that’ll keep you ahead of your competitors.

Risk # 5. Frustrating Your Team

When your employees end up with inferior technology, their morale tends to suffer. For many staff members, it can be a bad look when you fail to equip them with systems, programs, and software that isn’t – at the very least – up to date.

If you don’t update to Windows 10 soon, your team might get the idea that you aren’t invested fully in their success. From there, frustration brews, work tends to be negatively impacted, and you’ll have an office full of employees at their wit’s end.

The Very Real Problem of Malware in the Workplace

As technology keeps reaching new heights, so does its propensity to be malicious and dangerous. Businesses far and wide must be eternally vigilant in the face of these threats that can damage both their reputation and bottom line.

For instance, recently, Landry’s, Inc., an American, privately owned, multi-brand dining, hospitality, entertainment, and gaming corporation, identified malware on its payment processing system.

The malware was designed to access payment card data from cards used in person. Interestingly, the card data wasn’t readable due to the end-to-end encryption technology used at points-of-sale. So, the malware was prevented from accessing payment card data.

Although this hasn’t occurred on a Windows 7, these attacks come from everywhere when sensitive information or money is involved. As proven by Landry’s, with state-of-the-art systems in place, these cyber breaches situations can be nipped in the bud.

So how do you mitigate these risks?

The short answer is to move to Windows 10 to receive the full support from Microsoft. This can be done by upgrading your operating system on your existing PC’s, assuming your hardware is capable of handling the demands of a modern operating system. If you PC is more than 3 or 4 years old, it is probably more cost effective to simply replace the PC.

Did you lock the door?

Did you lock the door? 1200 570 Greenlight Managed IT Support Services | Sydney | Melbourne

Lock your door.
Lock your computer.
Lock your computer with secure passwords.

Locking the door to our homes when we leave is something most do on autopilot. If you drive to work, you automatically lock your vehicle after arriving to your destination. Checking the physical locks in our life is easy, we don’t even think twice. But what about the digital locks, did you lock them too? Does it matter? Most definitely.

Trust me, you are not alone in the never ending frustration of trying to remember your latest passwords. Even those of us who spend our careers in the IT industry can get a bit tired of it. Which is why many people (even though they know better) often use weak passwords. We have all been guilty at one time or another. But, here is the thing: the small inconvenience of selecting secure passwords and updating them frequently is much easier to handle than a data breach. In a sobering reality check, the 2017 Verizon Data Breach Investigations Report found that 81 percent of data breaches were caused by a password hack. 

Think of your passwords like a flood wall made up of sandbags. In one section the sandbags are eight feet tall and four feet deep. Yet, in another section, the wall is only five feet tall and two feet deep. Now, picture flood waters pushing with millions of pounds of pressure on the wall. Maybe the taller and thicker section holds, but then the waters find a weakness in the shorter and more narrow section. Within minutes, the sandbags are pushed aside by the raging waters and the whole neighborhood is buried in damaging flood waters. Like the weaker section of the flood wall, in your organization if even one member of your staff uses a weak password, it exposes the entire business to the risk of a data breach.

This month is National Cybersecurity Awareness Month (NCSAM), at COMPANY NAME we encourage you to use this month as an opportunity to remind your team of the importance of selecting strong passwords and updating them frequently. #SecureIT and keep your company’s data safe.

Top 4 Tips for creating a strong password

  • Avoid common passwords. Do not use “password,” “qwerty,” “111111,” “12345678,” “abc123,” “password1,” or any other easily guessed words/phrases for your password.
  • Use different character types. Most systems and applications these days require or encourage using upper and lowercase characters, numbers and symbols to create a strong password. Even if your systems don’t (we can help enhance your security settings), it is still a best practice to select a password that follows these guidelines.
  • Keep it unique. What happens if one app you use personally gets hacked and you used that same password on other systems, including your work accounts? I’ll give you a hint, it’s not good. Be sure to use a different password for each site and application that you use. You can record the passwords in a physical notepad if needed to remember them, but be sure to store the notepad securely and away from your computer. 
  • Don’t make it personal. Include things like your name, birthday, child’s name or other personal information in a password makes it that much easier to get hacked. These are all things hackers can find without much difficulty. Instead opt for unique words and characters that appear to be completely random.

Selecting a strong password is an important piece of your data security shield. In addition, utilising other tools like multi-factor authentication, using secure networks and practising privacy precautions on other connected systems (social media especially) are critical to keeping your data safe. The world of technology never stops changing, if you need some advice or want an evaluation on the security of your company, give us a call. #BeCyberSafe and protect your data.

Cost Savings from Running Your Medical Practice Management Software in the Cloud

Cost Savings from Running Your Medical Practice Management Software in the Cloud 1200 651 Greenlight Managed IT Support Services | Sydney | Melbourne

Comparing the costs of on-premise infrastructure to cloud infrastructure is not as simple as comparing apples to apples.

If you’re thinking about migrating your medical practice to the cloud, there are a number of variables to take into consideration. Evaluating your options for the better value means weighing the pros and cons of each, as well as extensively calculating your total cost of ownership (TCO).

How Does Cloud Hosting Save You Money?

All of the articles on cloud hosting services will talk about how switching to the cloud will save you and your business money. However, with technical considerations like third-party software for printing and scanning, enterprise storage and even an upgraded internet connection, it seems as if you’ll incur more costs than you initially thought.

So, where are the real cost savings in this new wave of cloud computing?

No Initial Investments or Extra Set Up Costs

Transitioning from an in-house network of computers to the cloud doesn’t require any upfront costs or investments. The cloud serviced provider takes care of the infrastructure and set up for a fixed cost.

When you have an in-house network, you have individual computers with individual hard drives. These need to be maintained separately because they are not all sharing a unified server. This means that you will be charged per computer set up and configuration.

You’ll find that your savings come from a one-stop-shop type of set up. Your service provider only has to set up one unified server for your entire business. That means one installation and configuration—one time. One cost.

Full Hardware Utilization

In the cloud, all of your employees will be working on a shared server infrastructure. This ensures that all your hardware resources are engaged to optimize your cloud computing efficiency.

This proves as economical, since you’re only using one shared server and not multiple servers that may store unnecessary information. You have the advantage of setting preferences for your storage needs so that your cloud server utilizes its capacity properly.

In other words, you won’t have to waste money continuously scaling your storage. Cloud storage only automatically saves what you set it up to save.

Less Power Consumption

Since cloud storage fully utilizes its hardware resources, it consumes less power. “Full utilization” may sound as if it means more consumption, however, it means that the infrastructure’s power is used more efficiently.

Computing tasks can consume a lot of power, making individual servers run slower depending on the workload. This increases your bottom line when you have to pay more for less in terms of performance.

A Reduced Work Force Expense

With cloud hosting and computing, you won’t have to rely on an internal or external IT company for maintenance. Your third-party service provider will take care of any infrastructure issues that may arise as part of your contract.

This means you’ll save on employee or contractor salaries as well as benefits. Not to mention the cost of external IT fees per computer or device.

Built-in Redundancy

In the event of a power outage or emergency, your system may crash. To prevent this, you’ll have to purchase extra hardware to ensure that your individual servers will still run. This ends up costing more in maintenance over time.

With cloud hosting, you won’t have to worry about needing extra hardware for redundancy. Cloud servers may spread out through multiple data centres to replicate your data. This creates resiliency, so in the event of a disaster, your systems will be up and running.

The Costs of Managing On-Premise Servers

When we talk about on-premise infrastructure (or, on-prem for short), we’re talking about the physical server at your location. This server is also managed and maintained individually by you.

The costs of managing on-prem servers requires a considerably large upfront capital investment. The initial investment covers the hardware and installation, but there are also continuous support and maintenance expenses to consider.

In terms of your Total Cost of Ownership (TCO), you have to take into consideration both Capital Expenditure (CapEx) and Operating Expenses (OpEx), as well as your security.

Your Capital Expenditures

As mentioned above, managing on-premise servers means having the infrastructure at your location. This factors into being a fixed asset, like your office building, work vehicles, equipment, and the maintenance required overall.

With an on-prem infrastructure, you also have to take into consideration the cost for your servers, power systems, storage, hardware, software, and licensing—as well as the installations, upgrades and maintenance.

A large capital expenditure can place a strain on your organization’s finances, which could end up taking away from more critical initiatives.

You also have to replace this hardware every 3 to 5 years.

Your Operating Expenses:

Many people will put their OpEx in the cloud category, however any ongoing costs to running a business or organization falls under this category..

Any items that are accounted and paid for monthly are your operating expenses, which is why most people find migrating to the cloud a much more cost-effective option since there is a small overhead.

While the cloud won’t eliminate certain costs like hardware, software, support staff, etc., it will still reduce them substantially.

Security:

The pros and cons of on-prem vs cloud security tend to weight the same.

Your on-prem security will be limited to your enterprise licensing and any other security measures you decide to take at cost. Your security isn’t automated, and so your organization is solely responsible.

Cloud security continues to evolve with dynamic resources, but can still be risky due to ephemeral security boundaries. However, cloud security is shared security. That means that the security responsibility is shared among your organization and your cloud service provider.

Security is something that is often overlooked, but can be costly when left vulnerable in either case.

Migration has its Advantages

Migrating to the cloud isn’t just about saving money. It’s also about the efficiency and all of the benefits from a remote infrastructure.

If you’re thinking about migrating your medical practice to the cloud, the IT experts at Greenlight ITC can answer all of your questions.

Security Considerations for Running Your Medical Practice Management Software in the Cloud

Security Considerations for Running Your Medical Practice Management Software in the Cloud 1200 675 Greenlight Managed IT Support Services | Sydney | Melbourne

The responsibility of all health care providers is not just medicine. Healthcare providers and medical practitioners are also responsible for protecting their patent’s most sensitive information.  This requires a cultural shift in thinking for many practices, and unfortunately too many practices have been slow to adapt. As a consequence, the Australian Government has made some changes to the rules for software providers connecting to the Medicare system for processing payments.  This is preventative measure and in addition to last years’ Notifiable Data Breach legislation.

Understanding Cloud-Based Software

A lot of data gets stored on “the cloud” these days. However, not everybody understands what that means exactly.

The cloud refers to remote servers capable of storing and accessing data programs over the internet rather than a computer in your office. The actual process is called cloud computing.

The computing part may comprise file storage and sharing, e-mail, inventory management, data collection, accounting information, etc. This is all done by the remote servers at the data centers owned and provided by a third-party cloud service infrastructure provider. Typically you would rent the computing resources and associated software as a service, rather than purchase outright and have to manage, maintain and secure everything yourself.

This allows businesses to cut costs on the expensive hardware and maintenance needed to store all of their necessary information. While this makes for a great technological solution, it can also leave sensitive information vulnerable to digital criminals—otherwise known as hackers.

Hackers are the last people you want with your most sensitive and private information.

Why Should Doctors and Practice Managers Care?

Today with everything online, hackers are the biggest threat to any business. But the most vulnerable of all is arguably the health sector. Medical practices far and wide contain databases with some of the most sensitive information there is. Patient information, hospital records and the like are all at stake without the proper security implementations.

According to the Office of Australian Information Commissioner (OAIC), the health sector encounters more data breaches than any other industry on a regular basis. The majority of these data breaches are noted to be criminal attacks, while the rest are due to both human and system errors.

To keep information secure from invisible criminals, it must be unreachable. However, this is not necessarily an option in the health sector since patient information must be reachable by multiple parties. Those parties include medical practitioners, specialists, hospitals and healthcare centers, Medicare and private funding for health care.

This is exactly what leaves the health sector so vulnerable to data breaches.

The Dark Web and Your Information

You’re probably wondering where all of that sensitive information ends up during a successful data breach. While there are those hired to hack servers for specific information, there are also those who hack to sell information to the highest bidder.

In other words, any sensitive information obtained during a breach will most likely wind up on the dark web. What began as a way to purchase illicit drugs, dark web marketplaces have expanded to sex trafficking, weapons dealings, and things of a much worse caliber.

So why should the dark web matter to the health sector?

Simply put, fraud and identity theft—that’s why. Now, any business with holes in their security can fall victim to stolen personal data. This includes Medicare policy numbers, bank account numbers, credit card information, and other private documents that may be of value.

Individual health records can be worth up to USD $30 each on the dark web since the data is so useful in social engineering attacks on individuals.

Once information is stolen and broadcast over the dark web, not much can be done about it. Hospitals and private practices who lose their patients’ private information are susceptible to fines, lawsuits, damage to their brand, and in the worst case risk of losing their status or entire practice.

The Australian Government is Cracking Down

To help address this threat and to keep businesses who use cloud services safe, the Australian government has recently implemented new requirements for third-party service providers. This is a part of the Digital Transformation Agency’s Software Cloud Strategy.

The Department of Human Services (DHS) has adopted the Secure Cloud Strategy in an effort to tighten the security for all parties that connect with the department. Those parties all refer to the health sector.

Part of their requirements are for applicable Australian software companies to complete am accreditation and compliance process. The accreditation process includes a certification known as the Certified Cloud Services List (CCSL). The companies also have to be vetted by the Australian Government Security Vetting Agency (AGSVA).

Third-party cloud service providers with a negative vetting clearance are encouraged to be physically separated from sensitive information. They are also encouraged to be restricted from the access of citizens’ private information.

Under this same strategy, the DHS requires that all third-party software companies only use on-shore solutions. In other words, any and all third-party software companies used within the DHS are limited to Australian companies only.

Changes such as these take time. In the meantime, there are a number of security of measures which healthcare providers can take.

Next Steps: What You Should Be Asking Your Cloud Service Provider

While you may not be totally up to date on the new requirements that comply with the DHS, your software company is – or at least, it should be. If your practice or company utilizes third-party software that connects with the DHS or Medicare, there are questions you can ask to ensure the safety of your patients’ information:

  • Is patient data stored in the cloud?
  • Is your cloud service provider certified by the Australian Signals Directorate (ASD)?
  • Is all data located/backed-up in Australia?
  • Is my data stored in a publicly accessible cloud?
  • Can they guarantee that their engineers and technical staff maintain the high security clearance measures of the DHS?

Of course, no matter how prepared you think you are, a data breach can still happen. In this case, you should equip yourself with knowledge of the data breach notification laws in Australia.