|
October 2014
In this issue…
|
Greetings!
The Department of Homeland Security has designated October as National Cyber Security Awareness Month. The goal of the designated month has been to raise awareness about cyber security and increase the resilience of our nation in the event of a cyber-incident. Though the month is about over, LaSalle Consulting Partners would like to do its part by bringing attention to a security area that is overlooked within an organization: employee security education and awareness training.
With the continued increase in security threats and identity theft, organizations are spending anywhere from thousands to millions of dollars, in addition to time and effort, attempting to secure their networks and confidential information. The objective behind these efforts can be defeated if employees do not understand the roles they need to play in the organization’s security plan. Even with strict security policies and state-of-the-art technology, an organization may not be as secure as it should be. Since negligence on the part of employees is one of the most common channels through which vital information leaks, it is critical that organizations provide their employees with adequate security and awareness training.
While a clever hacker may be behind some security breaches, often they result from mistakes made by employees. Examples of such mistakes include visiting maliciously infected websites, selecting links in e-mails from unknown senders, and unintentionally leaking passwords. Security education and awareness training can help prevent these common mistakes. Please contact an LCP representative if we can be of assistance in this area.
|
|
|
HIPAA – The Need for Risk Assessment of Peripheral Devices
by Alex Zurek, LaSalle Consulting Partners, Inc |
LaSalle Consulting Partners continues to emphasize the importance of security and risk assessment in the workplace, particularly for HIPAA covered entities and business associates. One of the areas we have seen overlooked in risk assessment is the peripheral devices that exist on a computer network.
Peripheral devices are devices on your network other than your computers and servers. These include devices such as printers, multi-function copiers, scanners, tablets, and mobile phones. If any of these devices are used to store or process sensitive information, and contain a hard drive or other form of memory, then your organization may be vulnerable to a security breach. |
|
Read More
|
|
|
7 Steps for Safer Surfing
used with permission from HP Technology at Work |
You might not think about it when you’re browsing the web, shopping online and interacting on social media, but you are the first line of defense against cyber security risks. The power to be safe is in your hands, and at your fingertips. Developing and maintaining good habits can make online activity much safer, and more enjoyable for you and your colleagues.
The following 7 good habits take only minutes to learn. and are easy enough to incorporate into your daily work life. |
|
Read More |
|
|
Encryption in Office 365
used with permission from Microsoft |
Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can easily view their encrypted messages and return encrypted replies. Regardless of the destination email service—whether it’s Outlook.com, Yahoo, Gmail, or another service—email users can send confidential business communications with an added level of protection against unauthorized access. |
|
Read More |
|
|
Decisiveness Brings Success
by Craig Kitch |
One trait you will find consistently with successful people is their tendency to make decisions quickly. Whether you are an independent business person or managing a department in a major corporation, the ability to analyze a situation, make a decision and then stick to it is a key ingredient for success.
I have been coaching a man who is launching his own business and he has really struggled with what market to target and how he will approach them. Truth is, his business will fit several specific markets and he has been changing his mind constantly for the last few months regarding who he wants to serve. |
|
Read More |
|
|
Analyze Data with PivotTables in Excel |
PivotTables are a feature in Excel that helps you pull out and see relationships between parts of very large data sets.
It is essentially a data summarization and visualization tool (Wikipedia). This tech tip will show you how to quickly create your first PivotTable from a relatively small dataset, and modify some of its parameters. |
|
Read More |
|
|
Firm News |
►Dell Executive Briefing Event
In early October, Frank Zurek and James Taylor joined a select group of technology leaders at the Dell Executive Briefing Center at their Round Rock, TX headquarters. The invitation only event was hosted by Dell in order to share information about their long-term product plans, discuss their strategic initiatives, and solicit feedback from attendees. During the two-day event, Frank and Jim met with Dell’s product managers, learned detailed information about Dell’s current products, and reviewed future plans.
►New Clients
The law firm of Arturo Jauregui & Associates has retained LCP for Office 365 migration services, office relocation services, managed backup, and ongoing technical support.
The law firm of Rubin, Machado and Rosenblum has retained LCP for Office 365 migration services and ongoing technical support.
►LCP Offers Cloud Based Server Solutions
Ingram Micro is the world’s largest distributor of computer and technology products. LCP has been an Ingram Micro business partner for the past four years. This continued business relationship enables us to provide our clients with world class solutions from thousands of hardware and software vendors. As part of our emphasis on cloud-based solutions, LCP has now joined Ingram Micro’s Cloud Elevate program. The program allows us to provide clients with cloud-based servers at a reasonable cost. A cloud-based server is an off-site server located in a secure datacenter that can be rented on a month-to-month basis. This solution is ideal for disaster recovery scenarios, on-site server replacement, or temporary use in order to fulfill specific needs. Please contact an LCP consultant for additional information.
► Website
We recently redesigned our firm’s website in order to enable viewing from mobile devices and to highlight our expanded managed services offerings. Please visit our website and let us know what you think. |
|
Follow Us: |
Quote
|
Laugh Out Loud
|
|
“We are continually faced with a series of great opportunities brilliantly disguised as insoluble problems.”
—John W. Gardner |
|
|
|
LaSalle Consulting Partners, Inc.
200 W Madison St | Suite 940 | Chicago, IL 60606
312-361-3326
www.lpartnersinc.com
|
|
|
|
LaSalle Consulting Partners, Inc. provides the information in this newsletter purely as a public resource of information which is intended, but not promised or guaranteed, to be correct, complete, or up-to-date. This newsletter is not intended to be a source of solicitation of legal advice nor should it be the sole basis for technology decisions. The reader should therefore not consider this information to be an invitation for a consultant-client relationship, should not solely rely on information provided herein, and should always seek the advice of competent counsel especially related to HIPAA compliance matters before making decisions or taking any actions |
|
Developing and Deploying Strategic Technology Solutions
207 thoughts on “TechKnow Advisor Newsletter – October 2014”
Comments are closed.