1 min read

What is your company's Security Score?

By Ingram Leedy on May 18, 2020 12:32:14 PM

Have you ever wished that you could have a digital security expert at your fingertips to review and personally walk you through improving the security inside your Office 365 environment?

Perhaps you haven’t thought of this, and now you are wondering if your Office 365 environment is as secure as you thought it was. Maybe you haven’t taken a thorough look at the Office 365 Security Center. Is it massive? Yes. Effective? Absolutely! Easy to navigate and understand? Umm… not so much.

The Office 365 Security Center may seem overwhelming, but it doesn’t need to be.

Get your Security Score

Thanks to the artificial intelligence (AI) you can review and grade your organization for any possible security vulnerabilities with a new tool called Secure Score.  Secure Score will give you a security score and highlight exactly how to fix any issues.  

Join Solutions Architect Sean Jacobs as he walks you through Secure Score in the first part video overview that shows you how to get your own Security Score.

A Roadmap to Security

We also understand that the journey to effective digital security doesn’t end with Secure Score. In addition to personal consultations, Sean has put together a course called the Security Roadmap. This service gives Office 365 administrators the knowledge they need to navigate from having no digital security to setting up the ideal secure environment. You can work at your own pace and it’s entirely free.

Want to learn how to secure your organization? Sign up for the Security Roadmap at https://protectedtrust.com/security-roadmap and start protecting your organization today.  

2 min read

Introducing Surface Go 2 and Surface Book 3

By Ingram Leedy on May 6, 2020 11:01:12 AM

Surface Go 2 keeps the same thin, lightweight design as the original, but now offers a larger 10.5-inch PixelSense display, improved battery life and a model with up to 64% faster performance. Also, for the first time, it comes with 8th Generation Intel® Core™ M options.  Studio Mics have been added along with a dual microphone solution to increase voice clarity and reduce background noise for Teams meetings or video chats. A 5MP front-facing camera delivers sharp video even in low light. A new Camera app for the rear-facing camera as also been added to make it easy to scan documents and whiteboards from meetings.  You can personalize your Surface Go with Type Covers, Sleeves and accessories in a variety of colors, including Platinum, Black, Poppy Red, and Ice Blue. Surface Go 2 starts at $399 and will be available starting May 12.

New Security Alert and How to Reduce Vulnerability to Attacks on Microsoft 365

By Ingram Leedy on May 4, 2020 3:13:56 PM

Companies are rapidly changing their collaboration capabilities to allow remote working needs for employees, but many may not be fully considering the basic security configurations.

See how Sean Jacobs (Protected Trust) steps us thru the common and recommended settings.

1 min read

Trick to Add Custom Background to Teams Video Calls Discovered

By Ingram Leedy on Apr 20, 2020 2:33:32 PM

Microsoft Teams has recently introduced background replacement for video calls and conferences.  Is your room a mess? Are you in a distracting environment? Fix it by adding one of 24 backgrounds that virtually replace your real background.  Currently, there is not a native way in the Teams application to add your own custom background, but we have found a way to add it outside of the application.  If you'd like to add your own custom image for your Teams video calls, watch our How To video.

Remote Podcast #2 Highlights: Zoom Hijacking, Microsoft Teams, and Managed Modern Workplace

By Ingram Leedy on Apr 13, 2020 1:45:39 PM

Has your Zoom meeting been hijacked? In this week's Remote Podcast highlight video, we discuss the security issues found in the conferencing software Zoom and whether the same security issues can be exploited in Microsoft Teams. Finally we discuss the role managed modern workplace consultants have in the modern office and whether or not it is the right choice for your business.

1 min read

CFOs looking to make remote work more permanent following COVID-19

By Ingram Leedy on Apr 6, 2020 11:06:17 AM

The flood gates have been opened. Businesses that once asserted they could not operate with remote employees have been forced to find ways to make it work.*  There is no doubt that many of these new remote employees will want to continue to work remotely once normalcy returns.  Will we see businesses increase work from home adoption?  This is the topic of discussion in this podcast.
1 min read

Is the New Work from Home Reality a Problem for Managers?

By Ingram Leedy on Mar 31, 2020 4:33:15 PM

As we enter into a new week of self-isolation, many businesses across the country are starting to settle into this new work from home reality. While the struggle to ensure employees have the proper equipment to work from home is finally dying down, a new question is emerging.  "Now that our employees can work from home, how can we tell they are actually working?"  In this Podcast episode, we discuss this management issue and the results may not be entirely what you'd expect.

4 min read

The Coronavirus is a Breeding Ground for New Phishing Attacks

By Ingram Leedy on Mar 20, 2020 10:06:50 AM

Just because businesses are taking a break to protect their employees and customers from possible coronavirus infections doesn’t mean that cybercriminals are going to stop. In fact, recent phishing attacks have started to leverage current events to scare potential victims into clicking on malware links and attachments.

Topics: Stay Secure
4 min read

Companies to Rethink Remote Work in Light of Coronavirus Crisis

By Ingram Leedy on Mar 19, 2020 9:37:54 AM

The whole “work from home” thing has really caught on in recent years. Employers have used remote work policies as a way to cut costs, increase employee happiness, and deepen their talent pool. Now, some companies are turning to work from home policies for another reason: to avoid a public health crisis from the recent coronavirus outbreak.

Topics: News Misc
3 min read

Are You Eligible for Microsoft 365 Government Software?

By Ingram Leedy on Mar 18, 2020 8:18:02 AM

Did you know that there’s a special version of Microsoft 365 for government agencies and employees? This special edition of Microsoft Office 365 is available to select government agencies and entities that handle data subject to certain government regulations/requirements.

Topics: Modern Tools
5 min read

What is Phishing and How Can You Stop It?

By Ingram Leedy on Mar 17, 2020 10:04:06 AM

In a few recent video blogs, the Protected Trust team has discussed the issue of phishing and how it affects companies of all sizes. In these videos, we showcased a few different examples of email phishing that have succeeded before.

Topics: Stay Secure
4 min read

Why organizations should not want to survive, but thrive

By Ingram Leedy on Mar 12, 2020 11:09:23 AM

There’s an old saying: “Nothing ventured, nothing gained.” In other words, if you don’t take risks, you won’t earn many worthwhile accomplishments. However, it’s often hard for people to take risks—especially when they’re in a big business where a lot of people’s livelihoods ride on these risks. The thing is, every decision is a risk.

Topics: Empower Your Business New Ways to Work
4 min read

Finding the Right Approach to Modernizing the Office

By Ingram Leedy on Mar 8, 2020 2:20:18 PM

In a recent video blog, I sat down with Bill Sands to talk about why Protected Trust works so hard to supply custom solutions to our clients’ needs. In the video, Bill highlighted a story about his cousin, who had approached Protected Trust looking for a solution to modernize his office and meet business goals.

Topics: Empower Your Business New Ways to Work
3 min read

Why We Provide Clients with Tailored Solutions

By Ingram Leedy on Mar 6, 2020 4:56:16 PM

I recently sat down with Bill Sands of the Protected Trust team and talked about what it is that clients need from their computing devices and software. What do they need so that they can achieve an “ideal state” for profitability and productivity?

Watch Us Discuss the Need for Tailored Services:

Topics: Empower Your Business
4 min read

Real-World Examples of Ethical Phishing Emails

By Ingram Leedy on Mar 6, 2020 9:30:00 AM

In a recent video blog, I sat down with Sean Jacobs to discuss a real-world example of a phishing email that he had turned into a training opportunity. Using that email, he could showcase to clients how easy it is for employees to fall victim to a phishing scam.

Topics: Stay Secure
5 min read

Applying the As-a-Service Philosophy to Devices

By Ingram Leedy on Mar 5, 2020 10:00:00 AM

While it might sound weird to lease your computer instead of buying it outright, the idea isn’t as far-fetched as you might think at first. In fact, many of those who read this are probably already doing it with their phones (assuming they have a typical cellular plan).

In today’s video, I sit down with Steven Goodman and Stephen Cornell to talk about the evolution of the “as-a-service” model, and how it benefits computers and other devices.

Topics: Empower Your Business New Ways to Work
4 min read

Ethical Phishing Campaigns to Raise Security Awareness

By Ingram Leedy on Mar 4, 2020 2:30:21 PM

Phishing scams are a major problem for businesses of all sizes. Estimates concerning phishing attacks vary. For example, one article by Smallbiztrends.com states that “1 in 99 emails is a phishing attack.” Meanwhile, data cited by Digital Information World states that, in 2017 alone, Kaspersky Labs’ “software alerted users to about possible phishing scams more than 246.23 million times.”

Topics: Stay Secure
4 min read

Does your computer reflect your company?

By Ingram Leedy on Mar 3, 2020 9:30:00 AM

So, how did we go from software and services to hardware (and, more specifically, Microsoft Surface devices)?

Topics: Empower Your Business New Ways to Work
4 min read

How Small Innovations in Surface Devices Add Up

By Ingram Leedy on Feb 28, 2020 8:58:18 AM

It’s really rare to have a single innovation irrevocably change any product (aside from its initial creation). Over the years, the Surface line of devices from Microsoft have seen significant improvements—though actual changes from one device to the next have been relatively modest.

In today’s video, we talk about how the sleek and thin design of the Surface hides new and innovative technology that is built on small changes over time.

Topics: Modern Tools New Ways to Work
4 min read

[Online Course] Office 365 Advanced Threat Protection

By Ingram Leedy on Feb 27, 2020 8:44:54 AM

As time goes on, the technology we use to accomplish tasks becomes ever more advanced. For example, at the start of the millennium, the FCC defined internet speeds of 200 Kbps as “high-speed.” In 2018, the average internet speed in the USA, according to data cited by the NCTA, was 93.98 Mbps. Just for reference, 200 Kpbs is equal to 0.2 Mbps—meaning that the average internet speed in the U.S. today is around 469.9 times faster than so-called “high-speed” internet less than two decades prior.

Topics: Modern Tools
5 min read

Learning to Be Secure in the Cloud with a Real Phishing Example

By Ingram Leedy on Feb 26, 2020 10:00:00 AM

Modern, cloud-based tools and technologies have become an inseparable part of modern life. Businesses need to be able to use these tools effectively to reach their target audiences, but security remains a major concern in the cloud.

Topics: Empower Your Business
7 min read

[Online Course] Does Your Team Need Training in Microsoft Teams?

By Ingram Leedy on Feb 25, 2020 7:05:31 AM

Microsoft Teams is an incredibly useful collaboration and communication tool for modern businesses. By combining chat features, collaborative document editing for Microsoft Office files, meeting coordination, and built-in team calling features, Microsoft Teams provides a robust collaboration platform for any business—large or small.

Topics: Modern Tools Empower Your Business New Ways to Work
5 min read

Modern Technology Matters (Are Your Clients Judging Your Computer?)

By Ingram Leedy on Feb 19, 2020 2:07:35 PM

There are many sayings about keeping up appearances in a professional environment—things like “dress to impress” or “the clothes make the man” are commonly cited when it comes to dressing up for client meetings. However, could your customers be looking at more than just your clothes when they see you in person?

Topics: Modern Tools
4 min read

How Microsoft Surface Devices Simplify Business (Why Protected Trust Went All in)

By Ingram Leedy on Feb 12, 2020 4:49:26 PM

One of the most frequently-asked questions that I’ve heard from Protected Trust’s customers is: “Why do you guys sell or recommend Surface devices?” There are a lot of reasons (aside from Protected Trust being a Microsoft Partner) that we chose to go all-in on selling Surface devices instead of any other brand of computer product.

Topics: Modern Tools
6 min read

Why Should You Care about Computer Specs?

By Ingram Leedy on Feb 11, 2020 1:09:03 PM

For some, shopping for a new computer is a daunting experience. There are so many different manufacturers, form factors, and performance specs to consider that it can be very difficult to find the one that provides the best combination of these factors at the right cost.

Topics: Modern Tools
4 min read

How to Stay on Top of Your Cybersecurity — Don’t Set It and Forget It!

By Ingram Leedy on Feb 5, 2020 11:40:43 AM

A lot of people want to have a “fire and forget” solution for their business needs. However, when it comes to ensuring strong cybersecurity for your company, this type of set it and forget it mentality can leave you vulnerable to outside attacks. Being proactive and staying on top of your cybersecurity settings is crucial for preventing data breaches in today’s ever-changing security environment. In today’s video, I sit down with security architect Sean Jacobs to talk about how security settings in cloud apps like Microsoft Office 365 are constantly changing, how that impacts business security, and the threats that these security setting changes are responding to.

4 min read

Communication Tools Changed the Workplace (From Memos to Emojis)

By Ingram Leedy on Feb 4, 2020 5:24:50 PM

I don’t know about you, but I’m glad that we have new ways to communicate. Technology has made communication and relationships easier than ever before. In today’s video, I have a bit of a back-and-forth with Javier Pereira about communication tools in the workplace and how they have changed things over the years.

4 min read

Google Apps vs Office 365, Millennials in the Office, and More

By Ingram Leedy on Feb 3, 2020 9:15:00 AM

Today, we have a video for you that covers a smattering of different topics, from Google Apps vs Office 365 to the kinder gentler Microsoft that plays well with third-party software programs, to the habits of Millennials in the workplace.

Topics: Modern Tools New Ways to Work
3 min read

The Key Feature That Drives Microsoft Teams Adoption

By Ingram Leedy on Jan 31, 2020 10:33:21 AM

For any software to be effective, it has to be thoroughly adopted by the organization as a whole. If people refuse to use a new software program, then it won’t make much of an impact—no matter how much potential it has to be useful.

Topics: New Ways to Work
4 min read

Why Are Businesses Switching to Microsoft Teams?

By Ingram Leedy on Jan 30, 2020 4:09:51 PM

Many of Protected Trust’s clients have made the switch to Microsoft Teams in recent years—sometimes to the surprise of the Protected Trust team! In today’s video, we talk about some of the possible reasons why businesses have made the move to Teams instead of Google or Apple’s online collaboration tools.

3 min read

How Do Funny Cat GIFs Bolster Business Collaboration?

By Ingram Leedy on Jan 29, 2020 3:35:00 PM

It’s a crazy thought, but employees sharing something like funny cat GIFs can actually have a positive impact on team collaboration—and thus employee productivity. Now, we know you might be wondering: “Cat GIFs, really? How could those possibly help?”

7 min read

Can Small Businesses Have Effective Cybersecurity?

By Ingram Leedy on Jan 24, 2020 10:38:08 AM

Can small businesses have effective cybersecurity? The short answer? Yes!

In this episode, Security Architect Sean Jacobs dispels the myth that small businesses are unable to provide adequate cyber protection.

Topics: Stay Secure Modern Tools
5 min read

How does Multi-Factor Authentication Protect Your Business?

By Ingram Leedy on Jan 23, 2020 2:59:16 PM

In a recent video and blog post, Security Architect Sean Jacobs joined us to discuss how hackers can use credential harvesting to easily gain entry into many businesses. 

Topics: Modern Tools
5 min read

How do Hackers Get Your Business Information?

By Ingram Leedy on Jan 22, 2020 1:33:43 PM

Everyone knows what a cyber attack is. After all, we constantly hear about data breaches and cybersecurity threats in the news. But how do hackers actually execute these attacks?

In this video and corresponding blog post, Security Architect Sean Jacobs explains just how easy it is for hackers to gain entry into most businesses—plus how you can make strides towards protecting yours.

Topics: Stay Secure
3 min read

How Microsoft Teams Simplifies Microsoft Office 365

By Ingram Leedy on Jan 20, 2020 12:15:00 PM

Microsoft Office 365 is an incredibly robust collection of tools that enterprises of all sizes can leverage. However, managing Microsoft Office 365 isn’t always easy. There are several plans to choose from, dozens of apps and features to learn, and various ways to license the software to consider. Dealing with “a dump truck full of licenses” can be frustrating—no matter how good and helpful the software is.

Microsoft Teams can help organizations simplify their use of Office 365 by providing a suite of useful collaboration tools designed around Microsoft’s Office software. In this video, we discuss some of the difficulties of Microsoft Office 365, and how using Teams can help simplify things:

Topics: Modern Tools
4 min read

Don’t Call Me! How Text Messages Changed Business Communication

By Ingram Leedy on Jan 17, 2020 2:36:08 PM

Business communication has changed a lot over the years. One form of communication that has forever altered the way that people communicate is text messaging. In today’s video, I sit down with Steve (and Steve) to talk about how business communication has changed thanks to technology tools.

Topics: Communications
4 min read

Ditching the Office? Learn from Our Work from Home Experiment!

By Ingram Leedy on Jan 16, 2020 3:04:13 PM

Lots of organizations are experimenting with “remote work” or “work from home” policies. Protected Trust is no different. Just last year, I (and a few others) decided to launch a two-week experiment to test the work from home concept for our company.

In today’s video, I sit down with some of the Protected Trust crew to discuss the results of the experiment, some concerns about remote work policies, and the impacts of allowing employees to work from home:

Watch the Work from Home Debate:

Topics: New Ways to Work
5 min read

Winter is Coming for Windows 7—Get Ready Now!

By Ingram Leedy on Jan 15, 2020 3:40:15 PM

In this video and blog post, I talk about taking inventory, looking at Windows 7 end of support, and how the end of the year is a great time to upgrade to hardware designed to run Windows 10, such as the Microsoft Surface family of devices.

PCs running Windows 7 after January 14, 2020 should not be considered protected. So, it's important that you migrate to a current supported operating system, such as Windows 10, so you can continue to receive regular security updates to help protect your device from malicious attacks.

Topics: Modern Tools
4 min read

The Good, The Bad, The Ugly with the Microsoft Surface Pro X

By Ingram Leedy on Jan 15, 2020 3:29:44 PM

Microsoft has launched a new generation of Surface products, including the Surface Pro X. What are the pros, cons, and weird little idiosyncrasies of this new hybrid tablet/laptop device? That’s the subject of today’s discussion, which you can watch below.

Topics: Modern Tools
6 min read

9 Red Flags to Avoid Being a Phishing Victim

By Steve Goodman on Jan 6, 2020 12:07:20 PM

During a livestream, we aren't always able to cover everything on our agenda. As was the case in our livestream with NOC Manager Sean Jacobs when he took us through a live phishing attack from both the attacker's and victim's perspectives.

You can see part of the recorded livestream on the right. Though we were able to show what a phishing attack looks like and how easy it is to unwittingly give away your password to a malicious third-party, we missed the most important part: How to identify a phishing attack and what to do when you are being phished.

Well, Sean and I put our heads together. From the livestream demonstration, we came up with a list of 9 “Red Flags” to target that will help you determine whether an email is legitimate or it’s a phishing attack. Phishers are getting a lot more creative than you probably think. So, even though some of these may seem like no brainers, one of the “email flags” below could help you identify a phishing attack so you can avoid it. Let's get started!

Topics: Empower Your Business
6 min read

Managing Virtual Teams Successfully (+5 Actionable Tips)

By Ingram Leedy on Jan 2, 2020 10:00:00 AM

The rapid development of communications technology has fundamentally changed the modern workplace. One of the biggest changes that have resulted from these innovations is the proliferation of virtual team collaboration. According to IWG research, 70 percent of professionals around the world work remotely at least one day out of the week. Companies are increasingly turning to virtual teams to meet their needs, with a little over 30 percent going completely remote, according to a 2019 Buffer survey.

Topics: New Ways to Work
4 min read

Benefits of Leadership in the Workplace Today

By Ingram Leedy on Dec 31, 2019 12:16:39 PM

Effective leadership in the workplace is an essential element of any successful organization. When a company is struggling to meet its goals and seems to be unable to turn things around, the problem may be the result of poor leadership. Having the right leaders in place, however, can provide a number of benefits.

Topics: New Ways to Work
5 min read

Using Microsoft Office 365 Business Essentials

By Ingram Leedy on Dec 24, 2019 8:00:00 AM

Microsoft 365 Business Essentials, dubbed the “100% online” version of Office 365 for Business, is Microsoft’s most basic suite of business productivity tools designed for small to midsize businesses with 300 or fewer users.

Topics: Modern Tools
8 min read

Should My Business Move to a Software Subscription Model? (+ FAQs)

By Ingram Leedy on Dec 23, 2019 10:32:05 AM

Twenty-so years ago, the perpetual license model was the only way you could purchase software licenses for your business. But, in recent years, the software industry has made a major shift.

Topics: Modern Tools
8 min read

The Easiest and Most Transparent Microsoft Surface Financing Options

By Ingram Leedy on Dec 17, 2019 3:17:14 PM

We’ve created a lot of resources that talk about what to buy—for example, how to choose the right Microsoft Surface device or determine which Office 365 Business plan is best suited for your organization. Today, we’re switching things up a bit and discussing not just what to buy, but how to buy!

In the video below, Todd, Protected Trust's CFO, shows us the easiest and most transparent financing options for Microsoft Surface devices. You'll learn how to spread your costs over flexible payment plans when you apply at checkout and receive an instant approval decision when purchasing from https://shop.protectedtrust.com.

Then, in the following blog post, we’ll continue to explain Microsoft Surface financing options so you can determine which is most aligned with your needs and budget!

Topics: Modern Tools
5 min read

Thinking About a New Surface Device? Which Warranty Will Best Protect Your Investment?

By Ingram Leedy on Dec 16, 2019 11:17:23 AM

If you’re looking at a new Microsoft Surface device this year, you may want to also consider adding a warranty or accidental damage coverage in case something goes wrong.

Check out the video and blog post below to learn more about the various types of Microsoft Surface warranties and tips for determining which is right for you!

Topics: Modern Tools
8 min read

Comparing Microsoft Office 365 Pricing and Plans for Business

By Ingram Leedy on Dec 13, 2019 10:09:47 AM

As a modern business owner or manager, you and your employees need access to the right tools and technologies if you want to remain competitive in our highly saturated and digitally-driven business landscape.

Topics: Modern Tools
6 min read

Is There a Consumer vs Business Version of Microsoft Surface?!

By Ingram Leedy on Dec 12, 2019 8:56:29 AM

The short answer: yes!

If you’re looking to build your modern workplace with Microsoft Surface tools, there is a distinct difference between consumer and commercial configurations and prices. In the following video and blog post, I’ll give a quick overview that will help you save you frustration and time before making a purchase decision.

Topics: Modern Tools
4 min read

What to Know When Considering Microsoft Office 365 for Business

By Ingram Leedy on Dec 5, 2019 2:32:41 PM

Microsoft Office 365 is a powerful software subscription service that can transform mobility, collaboration, and security in your modern business. If you’ve ever wondered, “Is Office 365 right for my organization” or, “How do I choose an Office 365 for Business plan that fits my unique needs,” good news—you’ve come to the right place.

Topics: New Ways to Work
29 min read

A Definitive Guide to Choosing Microsoft Surface Devices

By Ingram Leedy on Nov 22, 2019 1:38:57 PM

Microsoft Surface Go

Topics: Modern Tools
9 min read

What’s the Difference Between OneNote and OneNote 2016?

By Ingram Leedy on Nov 21, 2019 9:59:53 AM

One of the most commonly asked questions when delivering training on OneNote is: "Which version should I use?" The aim of this blog post is to dispel the confusion and explain the differences between the two OneNote versions—OneNote and OneNote 2016—to help you decide which is the best choice for you and your needs!

Topics: Device Management Communications Magazine Stay Secure Store and Share
5 min read

Consumer vs Business Surface Devices - Key Differences

By Ingram Leedy on Nov 14, 2019 12:19:02 PM

Beginning with the October 2018 launch of the Microsoft Surface Pro 6 and Surface Laptop 2, Microsoft implemented its “Surface for Business” descriptor across its new products. This gave customers some new choices with Surface devices coming in two options: a consumer version running Windows 10 Home or a business version running Windows 10 Pro.

Topics: Modern Tools
10 min read

Comparing Microsoft Surface Pro Vs Surface Laptop

By Ingram Leedy on Nov 12, 2019 12:34:19 PM

The Microsoft Surface family of products covers a wide range of tablets, laptops, desktops, and even digital whiteboard devices. This has led to some confusion regarding what a Surface device is and what it can do.

Topics: Modern Tools
5 min read

Dictate Brings Speech-to-Text to Office 365

By Ingram Leedy on Nov 1, 2019 11:40:58 AM

22 years ago, Nuance Communications released Dragon NaturallySpeaking, the first ever speech-to-text software. Since it was the first of its kind, the kinks weren’t quite worked out yet, causing a lot of frustrations for its early adopters. Even for 22 years ago, it was an incredibly difficult to use, resource-intensive software that led to far more annoyance than convenience.

Topics: New Ways to Work
10 min read

How Remote Working Can Make Your Employees Happier and More Loyal

By Ingram Leedy on Oct 30, 2019 2:27:59 PM

It’s no secret that remote working is all the rage amongst modern professionals, and it’s not just a fleeting trend that will be going away any time soon. In Buffer’s 2019 State of Remote Work report, where nearly 2,500 current remote workers were surveyed, a whopping 99% of them said they wanted to continue working remotely at least some of the time for the rest of their careers.

Topics: Empower Your Business New Ways to Work
5 min read

Why Buy a Microsoft Surface Pro for Business?

By Ingram Leedy on Oct 17, 2019 10:15:00 AM

You’ve likely heard of the Surface for business family of devices before, which includes various models of the Microsoft Surface Pro. But, do you know how they can actually be used to improve different aspects of your organization?

Topics: Modern Tools
5 min read

Why Your Business Needs the Surface Laptop 3

By Ingram Leedy on Oct 15, 2019 3:00:00 PM

Recently, Microsoft announced its newest lineup of Surface for business devices, which included the Surface Laptop 3 for Business.

Topics: Modern Tools
5 min read

5 Ways Remote Work Policies Can Reduce Business Expenses

By Ingram Leedy on Oct 15, 2019 10:54:21 AM

As an employer, there are numerous benefits of offering remote work policies. While you certainly do care about the fact that allowing remote work will make your employees happier and more engaged, many business decisions end up coming down to one thing—how they’ll fit into the budget and affect your bottom line.

Topics: Empower Your Business
8 min read

The 10 Employee Perks Modern Professionals are Actually Looking For

By Ingram Leedy on Oct 14, 2019 9:29:24 AM

In today’s incredibly competitive hiring market, employee perks programs can be a key way for companies to differentiate themselves to attract and retain top talent. In fact, Glassdoor found that nearly 60% of professionals report a company's benefits and perks package as a major factor in considering whether to accept or decline a job offer.

Topics: Empower Your Business
4 min read

Meet the Newest Surface for Business Devices (+ Pre Order)

By Ingram Leedy on Oct 11, 2019 9:00:00 AM

On October 2, 2019, Microsoft announced its Surface for business line-up is expanding with the introduction of three new devices: Surface Pro 7 for Business, Surface Laptop 3 for Business, and Surface Pro X for Business.

Topics: Modern Tools
6 min read

4 Tips for Managing Remote Employees in the Millennial Generation

By Ingram Leedy on Oct 7, 2019 8:50:39 AM

According to Pew Research Center, more than one in three Americans in the workforce are Millennials—making them the largest generation currently in the U.S. labor force. Furthermore, a survey by American Express found that 75% of these Millennial workers believe their work environment should be “flexible and fluid” and their employers should “not enforce a rigid structure on employees.”

Topics: Empower Your Business
9 min read

G-Suite vs Office 365: Which is Better for Business?

By Ingram Leedy on Sep 30, 2019 2:57:42 PM

Office 365 is a line of subscription-based services powered by Microsoft. Office 365 for Business is Microsoft’s suite of completely integrated, cloud-based productivity tools specifically designed to be used by business owners—whether you have 5 employees or 5,000.

Topics: New Ways to Work
6 min read

10 Key Benefits of Office 365 for Business

By Ingram Leedy on Sep 24, 2019 10:40:31 AM

You’ve likely heard of Office 365 before, but are you aware just how much its features and capabilities can enhance workflows, collaboration, and efficiency in your business?

Topics: New Ways to Work
6 min read

10 Tips for the Perfect Home Office Setup—Get up & Get Going!

By Ingram Leedy on Sep 18, 2019 8:19:40 AM

With 3.7 million employees in the U.S. working from home for at least half the time, telecommuting (more commonly referred to as remote working) is more popular than ever.

Topics: Empower Your Business
7 min read

Team Collaboration Tools You Can't Live Without (or Shouldn't)

By Ingram Leedy on Sep 11, 2019 9:06:58 AM

In our modern business world, having access to the right team collaboration software and business communication tools can be the difference between developing a competitive advantage and falling behind the competition. 

Topics: Empower Your Business New Ways to Work
6 min read

The Comprehensive Resources You Need as a Surface Hub 2S User

By Ingram Leedy on Sep 4, 2019 8:40:18 AM

The Surface Hub 2S is a powerful tool that enables teamwork without boundaries or constraints. No matter where your team members are located and what devices they’re using, a Surface Hub 2S can help bring everyone together so business can move forward—minus any miscommunications and/or technical glitches.

Topics: Modern Tools
6 min read

5 Ways to Promote Work-Life Balance and Attract Employees

By Ingram Leedy on Aug 29, 2019 12:59:22 PM

Striking that perfect balance between personal life and professional life has always been a challenge. As the business landscape becomes more competitive, modern professionals’ working schedules are only getting busier—which can cause both their workplace productivity and personal lives to suffer.

Topics: Empower Your Business
11 min read

What is Digital Transformation (How to Build a Strategy + Examples)

By Ingram Leedy on Aug 23, 2019 9:14:04 AM

In our technology-driven business world, digital transformation has become essential for success. No matter an organization’s size, location, or industry, if they want to resonate with modern consumers and develop a competitive advantage, they need to go digital.

Topics: Empower Your Business
7 min read

Top Tips + Challenges for Managing Virtual Teams in a Growing Business

By Ingram Leedy on Aug 21, 2019 11:29:40 AM

Remote work is all the rage amongst modern professionals and has even been coined “the future of the workforce.” While “work from wherever” policies provide a lot of benefits for both employees and businesses, managing virtual teams can certainly present a unique set of challenges for leaders.

Topics: Empower Your Business
9 min read

3 Best Work from Home Companies (+ Their Success)

By Ingram Leedy on Aug 15, 2019 1:23:41 PM

Remote work is no fleeting trend. It’s here to stay, and more businesses are getting on board. In fact, the number of employers with a remote work from home option has grown 40% in the last 5 years alone—with no signs of slowing down.

Topics: Empower Your Business
7 min read

Practical Tips for Working Remote (with Training Tips & Best Practices)

By Ingram Leedy on Aug 12, 2019 8:03:53 AM

Gone are the days where employees were glued to their desk in a corporate office for eight hours a day, five days a week. The new norm in our modern, digitally-driven workforce is remote work!

Topics: Empower Your Business
10 min read

The Importance of Modern Technology in the Workplace (With Benefits & Examples)

By Ingram Leedy on Aug 5, 2019 11:48:04 AM

The Importance of Technology in Business

An innovative business on the cutting edge of technology is able to empower its remote workers, reap the cost-savings benefits of BYOD policies, and connect its employees no matter how and where they work. It can provide higher-quality products or services, enhance customer service and the user experience, and reduce waste while improving productivity for higher profit margins. All in all, properly utilizing technology in the workplace creates a competitive advantage. 

Topics: Empower Your Business New Ways to Work
5 min read

8 Stats About Technology in the Workplace

By Ingram Leedy on Jul 26, 2019 12:58:20 PM

 

Topics: Empower Your Business
3 min read

Protected Trust Wins Partner of the Year at Microsoft Inspire

By Ingram Leedy on Jul 24, 2019 12:25:53 PM

Each year in Las Vegas, Nevada, Microsoft hosts Inspire, a conference held for its partner community. At Inspire, Microsoft partners from across the nation gather to learn valuable tips, tricks, and strategies that they can apply in their own businesses for increased success throughout the year ahead.

Topics: Protected Trust Events Announcements News
3 min read

The 3 Best Microsoft Teamwork Tools

By Ingram Leedy on Jul 23, 2019 2:39:52 PM

Every business can benefit from effective teamwork. Teams that can collaborate efficiently and consistently are more likely to complete tasks on time and make meaningful contributions to the success of the business as a whole.

Topics: Modern Tools New Ways to Work
4 min read

What are the Key Features of a Microsoft Surface Device?

By Ingram Leedy on Jul 22, 2019 3:47:47 PM

When is a computer more than a computer? Many people assume that any old computer can meet their business’ needs, but this isn’t always the case. There are times where a company needs computers, tablets, and other devices to act as collaboration tools or to empower their mobile business strategy.

Topics: Modern Tools
4 min read

New Features of Microsoft Teams for Healthcare Unveiled

By Ingram Leedy on Jul 19, 2019 10:09:10 AM

The healthcare industry as a whole is frequently pressured to be as effective and efficient as possible. Yet, physicians in both general care and specialist facilities often spend more time on paperwork than they do on helping patients because of how convoluted and difficult the filing requirements for patient health information, health insurance payment data, and medical inventory management can be. At the 2019 Healthcare Information and Management Systems Society (HIMSS) conference, Microsoft revealed some features for their Office 365 and Teams software that could help streamline and improve these kinds of tedious healthcare processes.

Topics: New Ways to Work
6 min read

How to Improve Collaboration And Workflows with Microsoft Teams

By Ingram Leedy on Jul 18, 2019 4:30:17 PM

In today’s digitally-driven, hyper-connected world, effective business communication is essential for success. In fact, more than 50% of work accomplished by organizations today is through collaboration, and over 80% of professionals believe collaboration is necessary to do their jobs effectively. 

Topics: New Ways to Work
3 min read

How Microsoft Teams Can Level Up Your Meetings

By Ingram Leedy on Jul 18, 2019 8:00:00 AM

Effective team meetings are the cornerstone of productive and efficient companies. However, remote working environments make holding effective team meetings challenging at the best of times. On the other hand, modern businesses need the benefits that remote working policies can provide—such as increased employee retention, access to a larger talent pool, and reduced costs for office space.

Topics: Modern Tools New Ways to Work
4 min read

Microsoft Surface: Devices Created for Collaboration

By Ingram Leedy on Jul 9, 2019 3:17:25 PM

Effective business teamwork requires strong collaboration tools—especially when it comes to remote working environments where offsite employees have to work with office-based team members to get things done.

Topics: Modern Tools
3 min read

How the Microsoft Surface Hub 2 Enhances Mobility and Collaboration

By Ingram Leedy on Jul 3, 2019 12:06:51 PM

The importance of business communication and collaboration is something that cannot be overstated. Being able to have remote workers collaborate effectively with employees in the office creates competitive advantages, such as being able to draw on a larger talent pool than what’s available near your office, improving work-life balance for employees (thus helping to attract and retain top talent), and enhancing employee performance when your team members are working abroad.

Topics: Modern Tools
4 min read

Surface as a Service with Microsoft 365 is a Complete IT Solution

By Ingram Leedy on Jun 27, 2019 9:30:00 AM

Here at Protected Trust, we love the Microsoft Surface. We use them ourselves as our primary work devices—and have come to enjoy them so much that we recommend them to our valuable customers for a broad array of applications. We even have a massive 84” Surface Hub in our office that we use for everything from collaborative company-wide projects to presentations. 

Topics: Device Management New Ways to Work
4 min read

Maximizing Your ROI from Microsoft 365 Enterprise with Microsoft Surface

By Ingram Leedy on Jun 21, 2019 11:43:25 AM

Your organization can experience numerous benefits when using Microsoft 365 software on Surface devices, such as enhanced collaboration, mobility, and security.

Topics: Modern Tools New Ways to Work
4 min read

Join a Call or Meeting with Microsoft Teams Mobile App

By Ingram Leedy on Jun 20, 2019 8:00:00 AM

In today’s digitally-driven business world, mobility is crucial. As remote work and Bring Your Own Device (BYOD) policies become more commonplace, it’s hard to do business if you aren’t able to effectively work from various devices and locations.

So, wouldn’t it be beneficial if you had the power to communicate and collaborate with your colleagues without needing your computer? Your answer should be “Yes!”

Microsoft Teams is innovating  every day to create collaboration and communication experiences that naturally extend to your mobile devices. If you’re traveling, working remotely, or simply on-the-go on a business day, you may not have your laptop handy—but we bet your cell phone is always on you.  

That’s why, as Microsoft releases new capabilities into Teams for desktop use, they’re also ensuring that the Teams mobile app is able to meet your daily communications needs, too. Below are a few features in the Teams mobile app focused on helping you call and meet with coworkers and clients alike.

Topics: Store and Share New Ways to Work
5 min read

The Microsoft Surface Go is the Promise of The Cloud Fulfilled

By Ingram Leedy on Jun 19, 2019 9:00:00 AM

"The Cloud” has been making promises to me for a long time. A concept that debuted before it was ready, the term “The Cloud” was coined in 2006 and promised that my files would be easily accessible from any device and location. The specific device I was using wouldn’t matter—the Cloud claimed it would give me the same experience and capabilities whether I was on my desktop, laptop, or mobile device.

Topics: Modern Tools
3 min read

How to Best Utilize the Teams Mobile App

By Ingram Leedy on Jun 15, 2019 8:00:00 AM

In this episode of “How to Office 365,” we’re taking a look at the Teams mobile app. With this mobile app, leveraging the collaboration features of Microsoft Teams to stay in touch with your coworkers and access shared files becomes easier than ever.

Topics: New Ways to Work
3 min read

A New Way to Collaborate with Microsoft Teams

By Ingram Leedy on Jun 14, 2019 7:00:00 AM

Over the past few years, the way people work has changed quite a bit. For the first time, we now have members of five different generations together in the workplace. Plus, more people are working remotely than ever before and are participating in twice as many teams.

Topics: New Ways to Work
4 min read

How To Send Channel Emails In Microsoft Teams and Why Its Valuable

By Ingram Leedy on Jun 13, 2019 4:15:00 PM

Microsoft Teams has a lot of valuable features that will drive productivity, mobility, and communication in your business.

Topics: New Ways to Work
6 min read

State of Microsoft Office 365 and its use in Florida Government

By Ingram Leedy on Jun 7, 2019 3:42:00 PM

There is a lot of discussion, enthusiasm, and momentum surrounding how government agencies are adopting specialized editions of Microsoft Office 365 for government.

Topics: Government
3 min read

What You Need to Know About Microsoft’s Upcoming Licensing Changes

By Ingram Leedy on May 30, 2019 1:26:27 PM

On June 25, 2018, Microsoft announced a series of price and licensing changes that became effective October 1, 2018.

Topics: New Ways to Work
6 min read

What are the differences between Microsoft Office 2016, Office 2019 and Office 365?

By Ingram Leedy on May 24, 2019 2:00:00 PM

Microsoft Office may be the de facto productivity tool for millions of workers worldwide, but it's certainly not a one-size-fits-all solution. Rather than a single product offering, there’s a whole slew of options to meet the needs of various users. Office can be used on iOS devices such as iPhones and iPads, Androids, and desktop and laptop computers—whether they’re Windows or macOS devices—and for business or personal use.

Topics: New Ways to Work
8 min read

Understanding Microsoft's Subscription Model: Why Software is Shifting from License to Subscription, and Why It’s a Good Thing

By Ingram Leedy on May 20, 2019 8:00:00 AM

Over the past five years, you may have noticed that more and more software is moving away from being a “one-time purchase” and shifting to a subscription-based service model instead. While, at first glance, this may appear as a tactic to get more money out of you, in reality, it actually offers numerous long-term advantages.

Topics: New Ways to Work
5 min read

Feature Highlight: Microsoft Surface Security

By Ingram Leedy on May 18, 2019 10:00:00 AM

Security for business should be your top priority, especially in today’s digitally-driven world where cyber threats and data breaches are incredibly commonplace.

Your business can combat these security threats by leveraging the right Microsoft tools and technology, such as its family of Surface devices. Microsoft Surface security features are robust and incredibly valuable to your business—here is a breakdown of a few major ones.

Topics: Modern Tools
4 min read

3 Modern Workplace Environment Trends

By Ingram Leedy on May 17, 2019 8:00:00 PM

Today’s digitally-driven, inter-connected, and modern workplace environment looks a whole lot different than it did in past generations.

4 min read

How to Get More out of Office by Using the Microsoft CSP Program

By Ingram Leedy on May 17, 2019 9:21:08 AM

Microsoft Office 365 can be an incredibly useful and convenient tool for enhancing productivity and collaboration throughout your company. Employees with Office 365 business licenses can freely access a suite of software such as Word, Excel, PowerPoint, Outlook, SharePoint, and Microsoft Teams when they need them. Moreover, with 365 Business, employees can collaborate securely by leveraging Teams’ built-in encryption features and live online document editing and conferencing solutions.

Topics: New Ways to Work
4 min read

3 Benefits of Microsoft Office for Government Employees

By Ingram Leedy on May 10, 2019 8:00:00 AM

Microsoft Office for government employees is specifically designed to meet the unique needs of government organizations with advanced IT requirements. Microsoft’s government business tools provide all the features and capabilities of their typical Office 365 services, but in a segmented government cloud community.

Topics: Empower Your Business New Ways to Work
3 min read

Why You Need Microsoft and LTE Advanced for Business

By Ingram Leedy on May 10, 2019 8:00:00 AM

In today’s interconnected and digitally-driven world, being able to effectively get the job done from any location isn’t just an added bonus. Instead, it has become a vital component of achieving business success.

Topics: Wireless & Network Modern Tools
3 min read

Microsoft ATP Uncovers Critical Security Flaw in Huawei Drivers

By Ingram Leedy on May 7, 2019 11:23:48 AM

In almost any industry, cybersecurity is a critical issue. Computers used by employees frequently contain sensitive company information—such as the company’s intellectual property (IP), financial information, or client information. However, cost concerns often drive companies to either supply cheaply-made PCs with barebones security, or to adopt “bring your own device” (BYOD) policies where employees bring personal devices to use for work.

4 min read

Feature Highlight: Microsoft Surface Mobility

By Ingram Leedy on May 3, 2019 8:45:00 AM

In today’s modern workforce where remote working is commonplace, business mobility is essential for success. When you have employees operating outside of a traditional office setting, it becomes even more vital that they’re still able to be efficient and contribute to their team—even though they aren’t physically with them.

Topics: Modern Tools
4 min read

Feature Highlight: Microsoft Surface Collaboration

By Ingram Leedy on May 2, 2019 2:58:39 PM

Effective collaboration in the workplace stimulates creativity, drives productivity, and fosters a sense of community amongst employees. However, there’s a gap to address here. 86% of employees and executives cite “Lack of collaboration or ineffective communication” as the cause of workplace failures. While most employers understand that communication is vital for success, they aren’t equipped with the collaboration tools they need.

Topics: Modern Tools
4 min read

Microsoft Teams Best Practices for Improving Workplace Productivity

By Ingram Leedy on Apr 26, 2019 8:00:00 PM

Microsoft Teams is a unified communications platform that combines chat, video and audio conferencing, file storage, and app integration in one shared workspace. Why should this matter to you? Improved collaboration means improved office productivity, and Teams is a tool that can help get you there.

Topics: New Ways to Work
5 min read

Microsoft Surface Mobility for Remote Employees

By Ingram Leedy on Apr 24, 2019 5:49:14 PM

Enterprise mobility (or business mobility) is a term that is often applied to remote working technology and business practices that allows employees to conduct work from outside of a traditional office setting. This is used in work from home programs and touted as an employee perk—though businesses enjoy numerous benefits as well, such as:

Topics: Modern Tools New Ways to Work
6 min read

Microsoft Teams Vs Slack for the Best Business Communication

By Ingram Leedy on Apr 21, 2019 9:00:00 AM

With the rising popularity of “work from home” policies, businesses have a growing need for effective collaboration tools that make it easy to coordinate work from anywhere. This has given rise to a new industry of business communication and collaboration tools with two leaders: Slack and Microsoft Teams.

Topics: New Ways to Work
5 min read

Is Microsoft Teams Right for Your Business?

By Ingram Leedy on Apr 20, 2019 9:00:00 AM

As a business that currently uses services such as Microsoft email, PowerPoint, and/or Excel, you may have already heard about Microsoft Teams. If you haven’t, or are unsure if it’s the best solution for your needs, we’re here to break down the basics. By outlining some of the top Microsoft Teams features, you’ll be enabled to make a well-informed decision about whether or not this tool is a suitable solution for your business’ needs.

Topics: New Ways to Work
4 min read

Using Microsoft to Optimize Business Operations—Beyond Email

By Ingram Leedy on Apr 19, 2019 1:35:42 PM

If your company has seen success using Microsoft Email, we’ve got good news for you. Microsoft offers an array of additional products and services that can be used to streamline business processes far beyond just email. The result of implementing these kinds of value-adding solutions? Increased effectiveness and efficiency.

Topics: Modern Tools New Ways to Work
4 min read

What is Microsoft’s Surface Hub 2 and Why Should You Care?

By Ingram Leedy on Apr 18, 2019 3:59:30 PM

On April 17, 2019, the Microsoft Surface Engineering team released a video unveiling Microsoft’s new Surface Hub 2 family of products—starting with the Surface Hub 2S. Some readers may be wondering, “What is the Surface Hub 2?” and/or, “Why should I care about Microsoft’s latest team collaboration gadget?”

Topics: News Modern Tools
5 min read

Benefits of Office 365 Business with a Software Subscription

By Ingram Leedy on Apr 18, 2019 3:51:34 PM

When Office 365 first launched in 2013 (effectively replacing the Business Productivity Online Suite), this subscription-based version of Office was released to the general public—causing much confusion among end users. For many people, Office was a software that you bought periodically and having the latest year version, such as Office 2019, was the best way to get the newest functionalities.

Topics: New Ways to Work
5 min read

HIPAA: Encryption is NOT Required…What?!?

By Ingram Leedy on Jan 1, 2019 10:00:00 AM

No, that headline is not a misprint. Contrary to common assumptions, Congress decided that the Health Insurance Portability and Accountability Act (HIPAA) should not—and, therefore, does not—require the use of encryption to secure your patients’ private medical data (aka, electronic Protected Health Information or ePHI).

Topics: Email Encryption and Services Healthcare HIPAA News
2 min read

Dial for Microsoft Surface is Effective Simplicity

By Seth Wilson on Jul 31, 2018 2:03:06 PM

If there is one car trend I hate more than everything turning into a crossover, is the loss of nobs from stereos. If I’m adjusting the AC, tuning the radio or changing volume, ONLY a knob will do. Buttons and touchscreen sliders just can’t replace the brutal simplicity of a dial, and I make actual car purchasing decisions based on this.

Topics: Device Management Magazine
2 min read

Exclusive: New email malware detection can outperform the top 60 antivirus engines

By conner forrest on Jul 18, 2018 11:05:23 AM

Researchers at the Ben-Gurion University of the Negev (BGU) Malware Lab in Israel have developed a new method for detecting malicious emails that is more effective than the top 60 antivirus engines on the market, according to a press release provided exclusively to TechRepublic.

Topics: Stay Secure
2 min read

Microsoft Whiteboard is a dead-simple way to brainstorm with your team

By abhimanyu ghoshal on Jul 13, 2018 7:51:37 AM

Topics: Device Management Communications Stay Secure Store and Share
4 min read

Using Microsoft Teams in a Law Office

By john h. roth ii on Jul 5, 2018 9:51:34 PM

Maybe you’ve heard of Microsoft Teams, or perhaps you haven’t. I could spend a few paragraphs introducing you to Teams, but I won’t. If you want a Teams introduction, read this short overview of basic features 

Topics: Communications Magazine Store and Share
2 min read

Microsoft Teams coming to U.S. Government Cloud users starting July 17

By mary jo foley on Jun 28, 2018 7:33:02 PM

Microsoft will start rolling out Teams to its U.S. Government Cloud customers on July 17.

Topics: Device Management Communications Magazine Stay Secure Store and Share
2 min read

Microsoft just pulled the coolest new Windows 10 feature from its beta

By chris smith on Jun 28, 2018 7:32:45 PM

Topics: Device Management Magazine
1 min read

Microsoft Brings the Fluent Design to Office 365 For a Cleaner & Easier Interface

By lawrence abrams on Jun 14, 2018 7:02:45 AM

Starting today Microsoft is bringing the Fluent Design from Windows 10 to Office 365. This design is aimed to offer more a streamlined interface with depth, the right amount of colors, and transition animations that make using Office a cleaner and easier experience.

Topics: Device Management Magazine Store and Share
2 min read

Vermont Sees Bright Future for Working Remotely

By Seth Wilson on Jun 4, 2018 11:30:10 AM

Topics: Communications Magazine New Ways to Work
1 min read

An Introduction to Power BI

By Steve Goodman on Jun 3, 2018 11:07:21 AM


Topics: Magazine Misc New Ways to Work
1 min read

Creating a Web Conference in Office 365

By Steve Goodman on May 28, 2018 1:08:29 PM


Topics: Video Communications Magazine Misc New Ways to Work

May update

By Ingram Leedy on May 26, 2018 6:11:50 PM

Home<p>Home<p>Sign In<p>Communities<p>Events Home<br>• Microsoft Tech Summit<br>• Microsoft Ignite<br>• Community Events<p>Blogs<p>Home<br>• Pathways<p>Info Center<p>150K Members<br>• 2,126 …

Topics: Magazine

Microsoft Explains Why Windows Defender Isn't Ranked Higher in New Antivirus Tests

By msmash on May 25, 2018 5:32:09 PM

In its most recent reports, AV-Test had very few flattering things to say about Windows Defender. Microsoft's security suite was rated as the seventh …

Topics: Device Management Magazine Stay Secure
2 min read

Automate Computer setup with Windows Autopilot

By Steve Goodman on May 18, 2018 10:31:14 AM

Topics: Misc
1 min read

Announcing Two-Minute Tuesdays

By Steve Goodman on May 18, 2018 8:56:51 AM

Topics: Magazine Store and Share New Ways to Work
2 min read

Discovering eDiscovery and Data Governance in Office 365

By Steve Goodman on May 14, 2018 10:21:11 AM

Topics: Communications Magazine Misc New Ways to Work
5 min read

What is Microsoft 365? Microsoft's most important subscription bundle, explained

By mary jo foley on May 11, 2018 8:19:06 PM

What is Microsoft 365, in a nutshell?

Topics: Device Management Don't Buy Another Server Magazine Stay Secure Store and Share New Ways to Work
2 min read

Versioning Finally Explained

By Steve Goodman on May 10, 2018 2:55:10 PM

Topics: Magazine Store and Share New Ways to Work
3 min read

Patch your Windows 10 PC now, as hackers are actively exploiting a zero-day flaw

By kevin parrish on May 9, 2018 9:33:19 PM

Topics: Device Management Wireless & Network Magazine Stay Secure
3 min read

Stop Being Afraid of SharePoint

By Steve Goodman on May 7, 2018 11:36:23 AM

Topics: Magazine Store and Share New Ways to Work
13 min read

Overview of Windows as a service (Windows 10)

By jaimeo on May 1, 2018 8:01:46 PM

Topics: Device Management Communications Stay Secure Store and Share
5 min read

How to get the Windows 10 April 2018 Update

By Ingram Leedy on May 1, 2018 7:55:53 PM

Last week, Yusuf Mehdi announced the Windows 10 April 2018 Update, our latest feature update for Windows 10. Today, we’re excited to share that the update is available to customers. This post will provide details on the April 2018 Update rollout plan, including information on our new machine-learning approach. We’ll also detail how you can get the update today. As with prior rollouts, our goal is to deliver the April 2018 Update as quickly and as broadly possible, while maintaining the best possible update experience for our customers.

Topics: Device Management Stay Secure

Windows 10 April 2018 Update- Dictation

By Ingram Leedy on May 1, 2018 7:17:34 PM

https://www.youtube.com/watch?v=OEEPWIzlI84

Topics: Magazine
11 min read

Windows 10 April 2018 Update: the 10 best new features

By Tom Warren on May 1, 2018 7:17:01 PM

Microsoft’s latest Windows 10 update is arriving for PCs and tablets today. Like the previous Fall Creators Update, it’s full of small features that improve Windows 10 without dramatically changing the platform. Microsoft is only adding one major feature with this update, and it’s the Timeline feature that lets you resume where you left off across multiple Windows 10 machines.

Topics: Device Management Communications Magazine
2 min read

A special edition of Office 365 for government?

By Steve Goodman on May 1, 2018 9:02:24 AM

When it comes to migrating data to the cloud, the complex landscape of government regulations and compliance can be overwhelming to navigate through.  I was reminded of this during my livestream with Protected Trust CEO Ingram Leedy and Solutions Consultant Cindy Loput.  During this livestream Ingram and Cindy spoke with me about the challenges a government agency faces when on-boarding new systems and software.  Government agencies are ready to make the move to the cloud but they’re not sure how to get started.  This is not necessarily a simple process, although we make it easy.  There are steps that need to be taken to move from an internal platform to the cloud.  A lot of the government agencies are familiar with purchasing their Office licenses directly through either an enterprise vendor or from Microsoft directly and they can still do that, however they really need assistance to ensure they are still compliant.  Different government entities have different government regulations that they need to follow as well.
The difference however isn’t only in the licensing.  The data centers where the government data is stored is separated from the traditional Office 365 public cloud. It’s not to say that the public cloud data centers don’t go through a rigorous compliance process for security, but the government data centers go through the extra compliance certifications specifically for government use. We spent much of our livestream speaking about Government Cloud Community (GCC) where most Federal, State and Local government information are stored. However, Office 365 also has data centers for specific government agencies and information.  These data centers are called GCC High and DoD (Department of Defense). I’m sure it’s a huge relief for many administrators knowing that their data center compliance needs are already met with Office 365 GCC.
As many government administrators know, your compliance regulations don’t end at the server level and every department must have their own policies and procedures depending on the data that is being handled.  Microsoft has incorporated a ton of new features specifically developed to make sure information is not mishandled, such as DLP or Data Loss Prevention.  This feature isn’t something that can just be turned on and start working however.  As I simplified in the livestream, you still need someone to know which switches to flip and for who.  For those who aren’t aware of DLP’s functionality, it scans a message for predefined parameters (social security numbers, billing information, etc). If it detects one of the parameters in a message, it will stop the message from being sent and notify the sender of a potential leak of information (though that’s just one way it can be configured).
Office 365 has given its users a wide array of tools to optimize security, productivity and now compliance.  However, just knowing where to start is a huge hurdle for organizations looking to make the move. That’s where Protected Trust comes in. For over 15 years, Protected Trust has helped private businesses and government agencies select and configure the right tools from Microsoft’s wide range of offerings.  As we said during the livestream, we’ve gotten so good at migrating organizations to the cloud, that the end-users don’t know they underwent a migration.  We have a team of project managers, product architects and server administrators doing this every day.  Don’t be overwhelmed at the prospect of a data migration.  Let our team manage it for you.

Topics: Don't Buy Another Server Finance Government Magazine Misc New Ways to Work
4 min read

Microsoft reveals lots of new Outlook features following Gmail redesign

By Tom Warren on May 1, 2018 8:54:19 AM

Microsoft is unveiling a number of new features for its Outlook desktop app, Outlook for iOS / Android mobile apps, and the company’s Outlook.com webmail service this week. The new Outlook features that are now available or coming soon are being detailed by Microsoft less than a week after Google started rolling out a new Gmail redesign. Google’s new Gmail features are mostly aimed at business customers, in an attempt to get more businesses using G Suite. Microsoft’s new Outlook features are also primarily aimed at business customers, an area that Microsoft’s traditional Outlook desktop apps for Windows and macOS specialize in.

Topics: Device Management Communications Magazine Store and Share
4 min read

Wargame your own company with Phishing Attack Simulator

By Ingram Leedy on Apr 27, 2018 8:36:56 PM

With Attack Simulator (included in Office 365 Threat Intelligence), if you are a member of your organization's security team, you can run realistic attack scenarios in your organization. This can help you identify and find vulnerable users before a real attack impacts your bottom line.

Topics: Magazine Stay Secure Store and Share
1 min read

The Microsoft Office 2019 preview is here

By brittany a. roston on Apr 27, 2018 8:35:54 PM

Topics: Device Management Magazine Store and Share
2 min read

Russia is a great reason to update (and keep updating) your router

By Seth Wilson on Apr 26, 2018 4:05:46 PM

Barcode American Flag

Topics: Wireless & Network Stay Secure
2 min read

Why Self Service Password Reset Is More Important Than You Think

By Steve Goodman on Apr 25, 2018 11:35:21 AM

The ability to reset one's own password for business email may not seem that important for your organization's cyber security and budget, but it actually matters more than you think.   After all, resetting your own password isn't a new thing.  Almost any website that requires you to log in with a username and password also gives you the opportunity to reset your password without having to call or email into a support desk.  Even though it has been around for a few years now, Self Service Password Reset was not always a feature in Office 365 and that could be the reason why so few organizations know about or utilize it. I spoke with Steve Cornell, our Service Desk Manager, about Self Service Password Reset in our livestream on 4/24.  You can watch the recorded version on the left (don't forget to like and subscribe!).  During this livestream, Steve and I discussed the many benefits of using SSPR and gave a quick walkthrough of the initial setup. Even though this is enabled by default for our clients, unless end-users complete the process shown in the video, then they will not be able to reset their own password.  So, if you are an admin reading this, make sure your users follow through.  Why bother?  Well, password reset requests account for 20% of all IT organizations' support calls. Not only that, but it also leads to an improved end-user experience because users no longer have to wait for the Support Desk to get back to them. So instead of being locked out of their accounts for a few hours or even days, end-users have the power to get back into their account without delay. As for the security side of things, SSPR takes the guess work out of authenticating the person on the other end of the phone.  As we've discussed in previous blog posts, phishing is more prevelent than ever and attacks are getting increasingly more sophisticated.  It only takes one misjudgement from the support desk engineer to compromise an account and possibly the entire organization. By factoring out the risk of human error and replacing it with SSPR authentication options, the security of the entire organization increases.  The admin doesn't have to give up any control either; he or she still dictates the policy. From which authenticated methods are used to how many validations are required, the system is designed to let only the right person in.  Speaking of authentication methods, there are currently four options to choose from:

Topics: Magazine Stay Secure Misc
3 min read

Atlanta spends more than $2 million to recover from ransomware attack

By mallory locklear on Apr 23, 2018 5:46:47 PM

SeanPavonePhoto via Getty Images
Topics: Magazine Stay Secure
2 min read

How to get away with emailing really large files

By Steve Goodman on Apr 20, 2018 5:00:26 PM

Over the years, I've had many clients complain about emails not being delivered because of file size limitations.  Yes, that 100 page PowerPoint presentation is important, but most mail servers won't accept messages larger than 25mb.  Even if your mail server allows you to send messages that are larger than 25mb, if the recipient's mail server caps out at 25mb, then your 26mb message will not be delivered.  But why send the email as an attachment to begin with?  I've been using OneDrive with Office 365 for only a few months, but I can tell you with all honesty, I will never go back to sending attachments through email again.

Topics: Communications Magazine Store and Share Misc New Ways to Work
1 min read

Microsoft Office 2019 kills off OneNote desktop app in favor of Windows 10 version

By Tom Warren on Apr 18, 2018 6:22:35 PM

Topics: Device Management Magazine Stay Secure Store and Share
3 min read

Build your Modern Workplace, sharing and protecting your creative ideas

By Seth Wilson on Apr 17, 2018 8:02:25 AM

Topics: Device Management Wireless & Network Communications Don't Buy Another Server Finance Magazine Stay Secure Store and Share Empower Your Business New Ways to Work
4 min read

10 Security Tips for Small Businesses

By joel snyder on Apr 16, 2018 4:13:38 PM

Topics: Device Management Wireless & Network Communications Magazine Stay Secure Store and Share Misc New Ways to Work
3 min read

Microsoft Security Intelligence Report volume 23 is now available

By microsoft secure blog staff on Apr 11, 2018 10:01:03 AM

As security incidents and events keep making headlines, Microsoft is committed to helping our customers and the rest of the security community to make sense of the risks and offer recommendations. Old and new malware continues to get propagated through massive botnets, attackers are increasing focus on easier attack methods such as phishing, and ransomware attacks have evolved to be more rapid and destructive. The latest Microsoft Security Intelligence Report, which is now available for download at www.microsoft.com/sir, dives deep into each of these key themes and offers insight into additional threat intelligence.

Topics: Device Management Wireless & Network Communications Don't Buy Another Server Magazine Ransomware Stay Secure Store and Share Misc
2 min read

How OneDrive Makes Ransomware Obsolete

By Seth Wilson on Apr 10, 2018 12:12:40 PM

On paper, ransomware isn’t nearly as scary and devastating sounding as the reality tends to play out. Imagine if one day your company was locked out of all its data. Its financial records, its client information, your billing system, and the like all ransomed. In many cases the ransom while steep is a pittance compared to the cost of your business losing its data and the productivity losses that go with it. The thing is, more than half the time the ransom is paid, the data remains locked. After they’ve anonymously taken your money, they have little motivation to take the extra steps to unlock your data, if they even bothered to retain the encryption key in the first place.

Topics: Ransomware Stay Secure Store and Share New Ways to Work
6 min read

Defend yourself from cybercrime with new Office 365 capabilities

By kirk koenigsbauer corporate vice president for office on Apr 5, 2018 9:24:52 PM

With the growing presence and sophistication of online threats like viruses, ransomware, and phishing scams, it’s increasingly important to have the right protection and tools to help protect your devices, personal information, and files from being compromised. Microsoft already provides robust security for Office services, including link checking and attachment scanning for known viruses and phishing threats, encryption in transit and at rest, as well as powerful antivirus protection with Windows Defender. Today, we’re announcing new advanced protection capabilities coming to Office 365 Home and Office 365 Personal subscribers to help further protect individuals and families from online threats.

Topics: Magazine New Ways to Work
2 min read

Microsoft adds ransomware protection, recovery tools to Office 365

By Ingram Leedy on Apr 5, 2018 6:28:13 PM

Topics: Magazine Ransomware Stay Secure Store and Share Misc New Ways to Work
8 min read

Office 365 Groups – Should end users be able to create them?

By laura zawacki on Apr 4, 2018 6:06:39 PM

A group of Microsoft MVPs recently took the stage to debate this topic in the first episode of Regarding 365’s Debate series, hosted by Darrell as a Service. The premise of this series is that topics will be argued from the ‘IT Pro’ and ‘End User’ viewpoints. Regardless of what side you think you support, it’s usually beneficial to gain a little outside perspective to enhance your understanding and come up with a creative solution that will work for both parties.  

Topics: Communications Magazine Stay Secure Store and Share New Ways to Work
2 min read

The City of Atlanta Reveals Valuable Lessons for Governments of All Sizes

By Seth Wilson on Apr 3, 2018 1:03:29 PM

https://www.youtube.com/watch?v=UfBGtfcHXQ8

Topics: Government Ransomware Stay Secure Misc
3 min read

Cyberattacks, like the one on CDOT, a wakeup call for local governments to prepare

By the associated press on Mar 30, 2018 8:21:34 PM

Topics: Wireless & Network Magazine Ransomware Stay Secure
3 min read

How Measuring Security for Risk ROI Can Empower CISOs

By Ingram Leedy on Mar 28, 2018 5:03:50 PM


For the vast majority of business decisions, organizations seek metrics-driven proof. Why is cybersecurity the exception?

Topics: Wireless & Network Communications Magazine Stay Secure Store and Share
1 min read

Use Multi-Factor Authentication (MFA) to Secure Your Business

By Seth Wilson on Mar 27, 2018 5:50:13 PM

https://youtu.be/dIUETB1tWCs

Topics: Stay Secure Misc
4 min read

Flipping the meeting with OneNote

By kristy hill on Mar 22, 2018 7:12:33 PM

This guest blog piece is written by Jon Tait, Director at Microsoft School Acklam Grange, and looks at how the practice of flipped learning has been applied to leadership meetings in combination with Surface devices and OneNote to enable more productive and cost effective uses of time.

Topics: Device Management Magazine Store and Share
7 min read

Why Windows Defender Antivirus is the most deployed in the enterprise

By brad anderson on Mar 22, 2018 6:43:40 PM

Statistics about the success and sophistication of malware can be daunting. The following figure is no different: Approximately 96% of all malware is polymorphic – meaning that it is only experienced by a single user and device before it is replaced with yet another malware variant. This is because in most cases malware is caught nearly as fast as it’s created, so malware creators continually evolve to try and stay ahead. Data like this hammer home how important it is to have security solutions in place that are as agile and innovative as the attacks.

Topics: Device Management Magazine Stay Secure
1 min read

City of Atlanta computer network hit by ransomware attack

By by kate brumback associated press on Mar 22, 2018 6:39:04 PM

(AP) — The city of Atlanta's computer network has been the victim of a ransomware cyberattack, city officials said Thursday.

Topics: Wireless & Network Magazine Stay Secure
7 min read

Microsoft Publishes Bi-annual Security Intelligence Report (SIR)

By Ingram Leedy on Mar 16, 2018 6:47:12 PM

Microsoft's 23rd bi-annual Security Intelligence Report (SIR) focuses on three topics: the disruption of the Gamarue (aka Andromeda) botnet, evolving hacker methodologies, and ransomware. It draws on the data analysis of Microsoft's global estate since February 2017, including 400 billion email messages scanned, 450 billion authentications, and 18+ billion Bing webpage scans every month; together with the telemetry collected from the 1.2 billion Windows devices that opt in to sharing threat data with Microsoft.

Topics: Device Management Wireless & Network Communications Don't Buy Another Server Magazine Ransomware Stay Secure Store and Share
3 min read

Windows 10 Spring Creators Update: What to expect

By by michael passingham on Mar 16, 2018 6:31:45 PM

The next ‘feature’ update to Windows 10 is almost here, with Microsoft planning lots of changes to its computer operating system. Which? guides you through the major changes we’re expecting to see.

Topics: Device Management Wireless & Network Communications Magazine
2 min read

Why We Love Meraki Wi-Fi Routers and Firewalls

By Seth Wilson on Mar 12, 2018 4:15:27 PM

The great businessman Howard Schultz once said "If people believe they share values with a company, they will stay loyal to the brand." In our case, when it comes to networking gear, we’re very loyal to Meraki, because they very much share our values when it comes to how a Wi-Fi network should work and how technology should be managed.

Topics: Wireless & Network Finance Misc
2 min read

Microsoft Teams ratchets up Slack challenge, claims 200k organizations as customers one year after launch

By todd bishop on Mar 12, 2018 10:08:04 AM

Topics: Communications Features Magazine Store and Share New Ways to Work
3 min read

Microsoft’s future of Windows is clever modes for clever hardware

By Tom Warren on Mar 12, 2018 10:07:59 AM

Microsoft’s big promise with Windows 10 has always been a version of Windows that will run across multiple devices. While we’ve seen Windows 10 power devices like the HoloLens, an Xbox One console, or even phone hardware, Microsoft has often created separate interfaces and software to sit on top of the underlying core of Windows. That’s meant the Xbox home screen looks different to the Xbox app on Windows 10, and that the mobile version of Windows 10 has always felt like a truly separate version of Windows. Microsoft’s future vision now involves clever modes for clever hardware.

Topics: Device Management Communications Magazine
3 min read

Start Writing Digital Notes in 2018

By staff on Mar 11, 2018 9:33:39 AM

You’ve got an iPad in your bag, a Surface Pro on your desk, and you’re still writing your notes on loose-leaf paper? Don’t be an animal. It’s 2018, and it’s high time for you to ditch the paper and embrace the future of note-taking, a future that lets you do so much more with every jot and scribble. Whether you need an app that converts handwriting to text, or you’re ready for a complete notebook management system, it’s time to stop digging around for the right binder whenever it’s time to study (or doodle). There are a ton of tools you can use to take all of your notes with you wherever you go.

Topics: Device Management Magazine Store and Share
8 min read

Microsoft says it can't make its $22,000 mega-tablet fast enough to meet demand — so it's at work on a new version (MSFT)

By Ingram Leedy on Mar 11, 2018 9:33:04 AM


Topics: Device Management Communications Magazine Store and Share New Ways to Work
1 min read

Microsoft Virtual Academy

By Ingram Leedy on Mar 11, 2018 9:31:54 AM

Published: February 2016|107 pages

Introducing Microsoft SQL Server 2016: Mission-Critical Applications, Deeper Insights, Hyperscale Cloud, Preview 2

Stacia Varga, Denny Cherry, and Joseph D’Antoni

Topics: Device Management Features Magazine Stay Secure
1 min read

Microsoft Windows Defender Prevents 400,000 Dofoil Infections

By Ingram Leedy on Mar 10, 2018 12:29:22 AM

Topics: Device Management Magazine Stay Secure
1 min read

Microsoft confirms Windows 10 is getting a new ‘S Mode’ in 2019

By Tom Warren on Mar 7, 2018 12:47:10 PM

Topics: Device Management Magazine

Fix Embarrassing Wi-Fi | Building a Modern Workplace

By Ingram Leedy on Mar 3, 2018 4:14:16 PM

https://www.youtube.com/watch?v=b50UdCY59co

Topics: Magazine
2 min read

Email The Leading Factor In Malware Attacks: Report

By Ray Schultz on Feb 23, 2018 3:51:30 PM

Topics: Magazine Stay Secure Misc
3 min read

Cisco: Severe bug in our security appliances is now under attack

By Liam Tung on Feb 11, 2018 7:53:19 AM

Topics: Wireless & Network Magazine Stay Secure
4 min read

Email Phishing Has Never Been Easier

By Ingram Leedy on Feb 8, 2018 7:50:00 AM

Topics: Magazine Stay Secure
9 min read

Setup Targeted Training on Office 365 Adoption Center

By Joanne Klein on Feb 4, 2018 11:00:28 AM

Blog post: 3 minute read

Topics: Magazine Store and Share New Ways to Work
5 min read

Microsoft Bookings — a hidden time-saving tool in the Office 365 toolkit

By loryan strant on Feb 4, 2018 10:59:45 AM

Topics: Communications Magazine Store and Share New Ways to Work
18 min read

Office 365 Planner and Office 365 Groups combine to deliver lightweight task management

By Ingram Leedy on Feb 4, 2018 10:58:50 AM

Microsoft released Office 365 Groups as a new approach to team-based collaboration in October 2014. Since then, Groups have received a steady flow of enhancements ranging from the essential-for-adoption (Outlook 2016 support), interesting-and-useful (apps for iOS, Android, and Windows Mobile and connectors to harvest information from cloud data sources), to the not-so-good (the flawed integration with Power BI).

Topics: Device Management Don't Buy Another Server Magazine Stay Secure Store and Share New Ways to Work
3 min read

A OneNote scanner for your pocket

By Ingram Leedy on Feb 4, 2018 10:57:46 AM

Today we announced three major OneNote developments, including Office Lens, a neat new app in the Windows Phone Store. The same functionality is built into the Windows 8 and iOS OneNote apps and can be accessed through the camera button in each app.

Topics: Device Management Communications Magazine Store and Share
2 min read

OneDrive's file size limit upped to 10GB, syncing speeds tripled

By Ingram Leedy on Feb 4, 2018 10:57:29 AM

Topics: Device Management Wireless & Network Communications Magazine Store and Share New Ways to Work
1 min read

Checking Out the Microsoft Whiteboard Preview

By Seth Wilson on Jan 18, 2018 9:36:00 AM

We’re always on the lookout for a more modern office, it’s what our clients rely on us to help them achieve. So, when Microsoft releases a preview of a new productivity tool, we’re playing with it on day one, so when it’s ready for prime time, we’re ready to help clients use it to get work done.

Topics: Video Misc
2 min read

Throw out your file server, we did

By Seth Wilson on Jan 4, 2018 9:31:14 AM

Topics: Don't Buy Another Server Finance Stay Secure New Ways to Work
2 min read

Busy Monday: KRACK and ROCA Present Great Reasons to Update Everything

By Seth Wilson on Oct 16, 2017 5:37:27 PM

A common theme among Protected Trust’s cyber security experts when asked about why they like their chosen career path is “job security,” and today is just another example of why they feel that way. Two major security vulnerabilities were surfaced today one dealing with Wi-Fi and the other with encryption.

Topics: Stay Secure
2 min read

Microsoft Teams is Replacing Skype for Business, and It's Going To Be Great

By Seth Wilson on Oct 10, 2017 5:38:45 PM

Corporate chat is becoming an office essential. It can bring teams from all over the county or just all over one office together in a unique way. Not as invasive as a stop at your desk or a phone call, but more immediate than sending an email, more and more companies are finding chat is in a Goldilocks zone of office communication.

Topics: New Ways to Work
2 min read

Is Your Business Prepared for a Disaster?

By Seth Wilson on Sep 6, 2017 3:36:51 PM

Looking down the barrel of a natural disaster is a helpless feeling. By the time you know it’s going to happen, it’s normally too late to fully prepare. Here in Florida we’re nervously eyeing the 185 mph super-hurricane Irma in the Atlantic and it got me thinking about preparing for the storm. Happily, Protected Trust will be fine. Our business is housed in a telecom building built for Category 5 hurricanes and more with backup power for days, and we’re fully backed up in Microsoft’s cloud at all times. But what if we weren’t?

Topics: Announcements Finance
2 min read

Is Your Business Safe from the Cyber?

By Seth Wilson on Jul 19, 2017 4:10:01 PM

Cyber-viruses, cyber-ransom, cyber-hacks, cyber-security, cyber-malware, cyber-attacks, cyber-theft - each day the headlines present a new Internet threat attacking businesses. And not just big businesses, but all businesses with smaller businesses even more vulnerable. Last year, small and medium businesses lost billions of dollars to criminals operating on the Internet.

Topics: Stay Secure
2 min read

Ransomware Takes an Even Darker Turn With Petya Attack

By Seth Wilson on Jun 30, 2017 12:58:02 PM

Petya probably won’t getya, but pay attention, things are getting serious.

Topics: Ransomware Stay Secure
2 min read

Ransomware Attacks Like WannaCry Can Happen to You, but Only if You Let Them

By Seth Wilson on May 16, 2017 9:49:55 AM

Protected Trust’s Exchange, Managed Security and I.T. clients were not affected by this incident, and are protected from future attacks like this.

Topics: Ransomware Stay Secure
2 min read

Skype for Business is So Much More Than Skype

By Seth Wilson on May 8, 2017 2:26:26 PM

While many are familiar with the free Skype consumer platform, we still encounter a lot confusion around what Microsoft’s Skype for Business can do for small and medium sized companies. Skype for Business comes as an integral piece of the Microsoft Office 365 software. Skype for Business and Microsoft Office 365 can take the place of apps like DropBox, Evernote, the G+ suite- all for a lower price than other competitors are charging for phone and conferencing services alone. Best of all, Skype for Business utilizes the same familiar user interface as consumer Skype, while supplying a whole host of new functionality that provides a truly versatile communication experience.

Topics: Video New Ways to Work
3 min read

How the Government Responds to HIPAA Breach Cases And What You Can Do

By Seth Wilson on May 5, 2017 2:47:42 PM

Recently, the US Department of Health and Human Services’ Office of Civil Rights (OCR) fined Children’s Medical Center of Dallas $3,217,000 for various HIPAA violations.  Typically, OCR’s HIPAA cases involve mutually agreed Resolution Agreements.  In the Children’s case, there was no agreement.  The information published by OCR regarding the Children’s fine provides interesting insights into the way the government thinks about these cases.

Topics: Government HIPAA News
2 min read

Device Encryption - Don't Ignore the Advice of HIPAA Experts

By Seth Wilson on Apr 4, 2017 5:04:20 PM

Children’s Medical Center of Dallas is a beloved institution with deep pediatric medical expertise. Some of the most difficult childhood cases from around the world end up there. Between January 2010 and April 2013, the electronic health information (ePHI) of about 6,200 Children’s Medical Center young patients was exposed in three separate breaches. Two of the breaches, affecting 60% of these patients, involved unencrypted smart devices holding ePHI which were lost outside of the Hospital complex. The other breach involved an unencrypted laptop holding ePHI lost in an operating storage area where the janitorial staff and others had unrestricted access. For these breaches, US Department of Health and Human Services’ Office of Civil Rights (OCR) recently fined Children’s Medical Center of Dallas $3,217,000.

Topics: HIPAA News
1 min read

Free HIPAA Seminar April 18 in Dallas

By Seth Wilson on Mar 30, 2017 2:36:10 PM

On April 18, 2017, Protected Trust will host “How to Learn to Love the HIPAA Audit: Get More From Compliance”, a seminar created for Dallas/Fort Worth professionals in the medical community.

Topics: Protected Trust Events HIPAA News
1 min read

Todd Frankel Joins the Protected Trust Team as CFO

By Seth Wilson on Mar 22, 2017 11:45:32 AM

fileProtected Trust is excited to welcome Todd Frankel, CPA to our team as our new Chief Financial Officer. Mr. Frankel brings over 25 years of experience as a certified public accountant and financial officer, along with a strong background in high-compliance, complex financial affairs. Frankel joins the dynamic, creative, and innovative team at Protected Trust as a proven manager who values hard work and a team approach.

Topics: Announcements Finance
3 min read

Mobile Device Management is Critical to HIPAA Compliance

By Seth Wilson on Mar 13, 2017 4:10:34 PM

Children's Medical Center of Dallas serves as a good example of the importance of managing mobile devices as part of your HIPAA compliance regimen.

Topics: HIPAA News
3 min read

The Human Factor in Disclosing a HIPAA Breach

By Seth Wilson on Feb 22, 2017 9:12:34 AM

When someone thinks he or she may have made a mistake, their first instinct might be to keep quiet about it and hope that it’s not really a problem.  That's the wrong instinct when dealing with protected health information of others (PHI) that is subject to HIPAA’s Breach Notification Rule.

Topics: HIPAA News
2 min read

Protect Patient Health Information (ePHI) By Knowing Exactly Where it is

By Seth Wilson on Jan 26, 2017 11:51:44 AM

healthcare-security-improvementWhere is your patient’s personal health information? Sometimes, the hardest part about HIPAA compliance is understanding where the electronic patient health information (ePHI) actually is. The database where you house ePHI is encrypted and sits behind a state of the art firewall. It looks very solid and comforting, but where else is the ePHI?

Topics: HIPAA News Stay Secure Misc
2 min read

What to Do If You Find Someone Else’s Health Information (PHI)

By Seth Wilson on Jan 16, 2017 4:38:38 PM

My first data breach went like this: In the early 2000s, a young accountant was flying back to the home office after working several days onsite at a year-end audit. She had brought along two compact discs, one loaded with detailed employee information and the other loaded with her favorite songs. Thinking it was her tunes, she put the CD with the employee data in the seat pocket in front of her.  She forgot about it until she was out of the terminal. She rushed back in, worked with the airline to try to track down the CD, but the cleaning crew was too efficient. It was gone.

Topics: HIPAA News
2 min read

Settlement Highlights Why IT Change Management is So Important for Compliance

By Seth Wilson on Jan 10, 2017 9:43:38 AM

I hate change. I especially hate change when it comes to my technology. I reach a stable state with my computer network, which permits me to achieve great efficiency, but when I change one thing, something else changes that I didn't intend. Soon, I am spending hundreds of dollars to get back to a stable state. As an attorney who specializes in HIPAA compliance, though, I remind myself change should be carefully managed. When it comes to the confidential information of patients or bank customers, Federal and state law require that it be managed. St. Joseph Health, a Catholic healthcare chain in California, New Mexico and Texas, found this out the hard way in October 2016 when the US Department of Health and Human Services (HHS) assessed a $2,140,500 settlement after St. Joseph's left the personal health care information of 31,800 individuals publicly exposed to Internet searches on a new computer server that it added to its network. The problem was not that the information was accessed, but that it could have been. This sensitive personal information (SPI) was open to the Internet for more than a year before St. Joseph's found the problem. The technical mistake was a simple error anyone could make. The server St. Joseph's purchased "included a file sharing application whose default settings allowed anyone with an Internet connection to access them," according to the HHS Resolution Agreement.

Topics: Healthcare HIPAA News Legal
2 min read

HIPAA: For More Than Doctors

By Seth Wilson on Aug 9, 2016 4:31:02 PM

Doctors and health plans are not the only ones impacted by HIPAA regulations. Lawyers, Certified Public Accountants, billing companies, and other third-party vendors working with PHI are also required to comply with HIPAA privacy requirements, and beyond that can be held independently liable for noncompliance. With the recent six-figure settlements that have come about as a result of HIPAA violations, entities that are covered by HIPAA need to make an effort to be proactive in ensuring compliance.

Topics: HIPAA News Misc
3 min read

Is Pokémon Go A HIPAA Nightmare?

By Seth Wilson on Aug 2, 2016 3:59:13 PM

Pokémon is the second best-selling franchise worldwide, having sold 279 million video game software units as of 2015. When it was announced that the beloved game would be brought to mobile devices for free in the form of an augmented reality game, millennials everywhere had their childhood dream of traveling the world to catch Pokémon realized. Unfortunately, the early launch of the game led to many issues ranging from malfunctioning features to back doors that compromised the security of those playing the game. Despite these shortcomings of the game, it has become an overnight sensation.

Topics: HIPAA News
2 min read

Mobile Health Apps and HIPAA

By protectedtrust on Jul 29, 2016 3:09:59 PM

When technology is so rapidly developing, it’s no surprise that HIPAA has had a hard time with keeping up with the times. The Health Insurance Portability and Accountability Act, the landmark 1996 patient-privacy law, only covers patient information kept by health providers, insurers, and data clearinghouses, as well as their business partners. The popularity of wearable technologies, mobile health apps, and online patient communities have created a gap in regulations according to a government report released by the Department of Health and Human Services.

Topics: Healthcare HIPAA News Legal Stay Secure Misc
1 min read

Catholic Health Care Services Paying $650,000 in Fines

By protectedtrust on Jul 29, 2016 3:07:40 PM

Female Doctor with Stethoscope Holding Piggy Bank with Bruised Eye and Bandage.Catholic Health Care Services of the Archdiocese of Philadelphia is going to pay $650,000 in fines as part of a settlement after HIPAA violations involving a stolen iPhone. According to the Office for Civil Rights, the health of information of 412 nursing home patients became compromised after the incident. OCR determined that there were no policies in place about removing mobile devices containing protected health information from the premises. The development of these policies as well as CHCS remaining under the watch of the OCR for the next two years. A more thorough report on the event can be found at http://www.healthcareitnews.com/news/catholic-health-care-services-pay-650000-hipaa-fine-business-associate-incident.

Topics: HIPAA News
1 min read

Preparing for the Phase 2 HIPAA Audits

By protectedtrust on Jul 18, 2016 8:35:37 PM

Fraud, audit, auditor.With the second phase of HIPAA audits underway every covered entity and business associate is eligible for an audit. However, the OCR will not be auditing those entities that currently have an open complaint investigation or are undergoing compliance review. These audits will evaluate organization's compliance with HIPAA security, privacy, and breach notification rules.

Topics: HIPAA News Stay Secure
1 min read

Mental Health Reform Bill to Clarify HIPAA Privacy Issues

By protectedtrust on Jul 12, 2016 8:24:01 PM

Words healthcare reform written on a paper.The House voted to pass H.R. 2646 with a landslide 422-2 vote. The bill previously contained changes to HIPAA allowing healthcare providers to share information about mentally ill patients with their caregivers, these changes were removed due to opposition by both Democrats and Republicans. It does contain content to encourage the early identification of mental illness in young people as well as guide the beginning of the national conversation according to Ron Honsberg, senior policy adviser of the National Alliance on Mental Illness, which represents families of the mentally ill. More information on the story can be found at http://www.healthcaredive.com/news/newly-passed-house-mental-health-reform-bill-would-clarify-hipaa-privacy-is/422328/.

Topics: Government HIPAA News Legal
1 min read

Ransomware and HIPAA

By protectedtrust on Jun 30, 2016 8:26:25 PM

file folders with Patient Health Records label and Confidential stamp

Topics: HIPAA News Legal Ransomware
1 min read

Required vs. Addressable

By protectedtrust on Jun 28, 2016 7:14:39 PM

Authorization considerations for HIPAA email, data

Topics: HIPAA News

What is Ransomware?

By protectedtrust on Jun 21, 2016 6:26:20 PM

What is Ransomware?

Topics: Ransomware
1 min read

Using Google Apps? Great, Simplify with Single Sign-On

By protectedtrust on Apr 12, 2016 6:55:15 PM

google-app

Topics: Email Encryption and Services Features
1 min read

Beyond Read Receipts

By protectedtrust on Mar 23, 2016 7:50:05 PM

Topics: Email Encryption and Services Features Misc
1 min read

Touch ID Sign-in on iPhone

By protectedtrust on Feb 14, 2016 9:03:30 PM

Topics: Features
1 min read

Streamline Your Workflow with Custom Message Policies

By protectedtrust on Feb 14, 2016 8:54:18 PM

Topics: Announcements Features

Address Book

By protectedtrust on Feb 14, 2016 8:50:10 PM

Topics: Features
4 min read

Data Privacy Day

By protectedtrust on Jan 24, 2016 4:23:51 PM

 

Topics: Protected Trust Events Communications Legal
3 min read

The Immense Challenges of IT Management in Health Care

By protectedtrust on Nov 16, 2015 4:06:10 PM

The health care sector has been under constant pressure to shore up its cybersecurity defenses in the past few years, as data breaches continue to plague the sector in the United States and abroad. At the same time, though, legislation has actively pushed medical firms to more aggressively adopt and deploy modern technologies and solutions, which has made management a very difficult prospect for many leaders in the field.

Topics: Healthcare Stay Secure
2 min read

Enterprise Mobility Security Remains Challenging

By protectedtrust on Nov 13, 2015 9:14:47 AM

The health care sector has had to overcome a wealth of challenges when it comes to IT security, service management and delivery in the past few years, with so many new tools and solutions quickly gaining a vital designation among leaders. From telemedicine and mobility to big data and electronic health record system management, the average medical firm is using technologies that were not even available only a couple of decades ago.

Topics: Healthcare Stay Secure
3 min read

Data Analytics Raises Health Care IT Security Concerns

By protectedtrust on Nov 9, 2015 2:28:18 PM

Health care providers have been somewhat under the gun when it comes to the integrity, security and privacy of patient data for more than a decade now, while breaches have increased in prevalence and damage. The onus has been decisively placed on individual medical firms to begin making more progressive changes to their IT security and general data management strategies, but the entirety of the sector is increasingly expected to invest more time and resources into these endeavors.

Topics: Healthcare Misc
3 min read

The Bad, the Ugly, and the Absolutely Gruesome in Data Security

By protectedtrust on Nov 4, 2015 2:39:05 PM

The data security conversation has gotten a bit complex and testy in the past few years, with far too many examples of complete negligence leading to major privacy failures hitting the headlines in that time. Some data breaches have been relatively low-impact, including those that have struck the financial services sector through malware attacks, while others have been far more devastating and worrisome, such as those in health care and the government.

Topics: Finance Government Stay Secure
3 min read

Cleaning Up Health Care Data Security, Management

By protectedtrust on Nov 2, 2015 2:18:22 PM

Health care organizations have had to weather some of the more tempestuous and challenging waters in history throughout the past several years, and this has led to immense successes in some areas, and severe threats in others. The obvious mark in the losing column would be a product of IT security, which has been in a shoddy state throughout the sector these past few years, to say the least.

Topics: Healthcare Stay Secure Misc
3 min read

What Does Comprehensive Data Security Look Like?

By protectedtrust on Oct 30, 2015 2:45:04 PM

Information security has become one of the most widely discussed topics among boardroom members, public sector officials and consumer advocates in the past few years, as identity theft has ravaged the U.S. economy. Although progress has been made in this regard, firms are still struggling to really strike the right chords with their security programs, and the biggest problem appears to be a lack of comprehension, leading to vulnerabilities that can be capitalized upon by threats.

Topics: Stay Secure
2 min read

More Reasons to Leverage a Secure Cloud

By protectedtrust on Oct 27, 2015 2:14:10 PM

Regardless of which industry an organization might be competing within, cloud computing has become a vital driver of performance across departments and professions, as it essentially modernizes IT in one fell swoop. With the Internet of Things picking up pace, enterprise mobility reaching a relative state of maturity, telecommuting programs kicking into high gear and more, organizations will be harder-pressed to deploy cloud solutions as the years go on.

Topics: Finance Stay Secure
3 min read

Two Big Reports Offer Pointers on Health Care Security Improvement

By protectedtrust on Oct 21, 2015 3:09:05 PM

Because of the increasing value of patient data on the black market, health care providers are experiencing significant increases in the magnitude and volume of attacks on their IT systems and users. It has become clear that medical firms are simply losing the battle, but the war is far from being over, and there is still plenty of time to improve and begin to reduce the risk of data breach in this sector as the years go on.

Topics: Healthcare Stay Secure
2 min read

Protected Trust Delivers ALTA Compliance with Simple and Secure Email

By protectedtrust on Oct 20, 2015 6:42:22 PM

Title agencies, mortgage companies, real estate agents and law firms now have a simple solution to meet American Land Title Association (ALTA) Best Practices and other compliance concerns associated with the new TRID (TILA-RESPA Integrated Disclosure) rule that took effect on October 3, 2015.

Topics: Announcements Stay Secure Misc
2 min read

What Comes Next for Financial IT?

By protectedtrust on Oct 12, 2015 2:41:11 PM

Financial services firms and relevant businesses have had to navigate an increasingly complex landscape of late, much of which is characterized by the rapid evolution of technology, transforming customer demands and more stringent regulatory compliance statutes. In many ways, the banking sector looks very different today than it did only a decade ago, with more mobile, electronic and flexible solutions in place for customer service.

Topics: Finance Stay Secure
1 min read

Simple Email Encryption for Dentrix Users

By protectedtrust on Oct 9, 2015 4:13:53 PM

Setting up a compliant email solution has never been easier for Dentrix users. Protected Trust, a Dentrix Development Vendor, offers an email encryption solution that allows dental practices to send secure messages that help them meet the HIPAA compliance regulations. The best part is the workflow is simple and recipients can view the message (and reply securely), without being required to set up an account. Protected Trust integrates with Dentrix, so no need to set up a new email account and patient records remain secure within the Dentrix software and the encrypted message.

Topics: Announcements Misc
2 min read

The BYOD Side of Health Care IT Security

By protectedtrust on Sep 28, 2015 4:14:55 PM

In the past several years, plenty of trends in corporate IT have taken shape and intensified, but perhaps none quite as impactful and challenging as enterprise mobility. Sure, the Internet of Things is beginning to scale up and challenge managers in the IT department, but it will take years for this trend to see the same types of gains in adoption as enterprise mobility and, specifically, BYOD, have seen of late.

Topics: Healthcare Stay Secure
1 min read

Protected Trust Will Be Attending the 2015 IAPP/CSA Privacy. Security. Risk. (P.S.R.) Conference

By protectedtrust on Sep 23, 2015 4:31:22 PM

In order to further protect your digital information assets, Protected Trust's very own General Counsel & Chief Privacy Officer, Charlie Frayer will be the attending the 2015 Privacy. Security. Risk. (P.S.R.) Conference in Las Vegas September 29th - October 1st. For more information, go to https://iapp.org/conference/privacy-security-risk-2015/

Topics: Email Encryption and Services Protected Trust Events Stay Secure
3 min read

Secure Cloud's Advantages in Health Care

By protectedtrust on Sep 21, 2015 3:08:02 PM

Cloud computing has become one of the more important and central assets for health care providers, as this flexible approach to IT allows the firms to more fluidly navigate the challenging and ever-changing landscape they operate within. From constantly evolving regulatory compliance and data security threats to the need for seamless deployment of novel technologies like mobility and big data, medical organizations would likely struggle to keep up without cloud services.

Topics: Healthcare Finance
1 min read

Are Banks Ready for More Mobile Security Threats?

By protectedtrust on Sep 18, 2015 2:10:50 PM

The financial services sector has witnessed a significant shift in customer demands and preferences in the past few years, largely brought on by the spread of modern consumer technologies such as smartphones and tablets. Although there have been a wealth of opportunities involved in this transformation, the security concerns have been widespread given how many times a major credit and debit card data dump has struck in the past few years.

Topics: Finance Stay Secure
2 min read

Is Health Care IT Transformation Helping Security?

By protectedtrust on Sep 17, 2015 3:17:28 PM

Health care providers have deployed a proverbial universe of new technologies in the past decade, with enterprise mobility, electronic medical record systems, cloud computing, telemedicine solutions and others now commonplace in the average hospital. There are certainly arguments to be made that patient care has progressed significantly since the turn of the century, but plenty was left to be desired with respect to the skill with which data is protected.

Topics: Healthcare Finance Stay Secure
2 min read

Why Awareness is the Key To Security

By protectedtrust on Sep 14, 2015 2:49:37 PM

One of the more prominent setbacks in the cybersecurity arena for more than a decade now has been the widespread lack of awareness regarding the threats that face businesses and, in some instances, the degree of ignorance is troubling. For example, several studies conducted last year revealed that many enterprise executives, and even leaders in the health care sector, were choosing to not invest more in security because they felt it was more affordable to simply run the risk of experiencing a breach.

Topics: Healthcare Stay Secure
2 min read

When Will the Breach Threat Subside?

By protectedtrust on Sep 10, 2015 2:27:27 PM

In the past several years, the cybersecurity arena has been moving in the wrong direction, to say the least, and it does not really seem as though the story will change any time soon. Health care providers, retailers, payment processors, banks and government agencies have been frequently targeted by hackers of late, while insider threats and employee negligence have actually moved into the lead for the most common causes of data breach, and consumers are suffering as a result.

Topics: Healthcare Stay Secure
2 min read

IT Security Concerns Spreading Quickly

By protectedtrust on Sep 8, 2015 2:57:11 PM

The IT security arena has been tempestuous of late, to say the least, as hackers continue to pose a serious threat to organizations, consumers and public-sector agencies. Because of how quickly technology has progressed in the past few years - as well as the rapidity of adoption among companies of all industries and sizes - the fact that leaders are struggling to craft and execute an effective security program should not be all that surprising.

Topics: Stay Secure
3 min read

4 trends that heighten the need for stronger IT security

By protectedtrust on Sep 3, 2015 3:38:06 PM

IT security has been - and should be - the central focus for corporate decision-makers in virtually every segment of the private and public sectors today, as the rate of these events and the size of subsequent damages have both skyrocketed. Several studies have indicated that boardroom leaders are indeed becoming a bit more serious when it comes to security, which is the first step in the right direction, but the tide must continue to move along this path for a while to make any difference at all.

Topics: Finance Stay Secure
3 min read

Governments Waking Up to Security Threats

By protectedtrust on Aug 27, 2015 2:59:24 PM

Although one could have easily expected federal government from around the globe to become more active in the IT security arena years ago, it has taken a significant amount of data breaches to really light the fire. Unfortunately, the lag between clear and imminent danger and the action taken to mitigate threats has put much of the world's private and public sectors far behind the eight ball, meaning leaders are constantly playing a game of catch-up.

Topics: Government Stay Secure
3 min read

Data Management Must Be a Priority in Health Care

By protectedtrust on Aug 24, 2015 3:41:33 PM

For virtually every health care provider or relevant business, the most important word in the IT lexicon has been "data" for several years now. Back in 1996, the attempts of the government to dramatically increase the accessibility and security of data became clear through the enactment of the Health Information Portability and Accountability Act, and this marked the beginning of what would become a persistent effort to improve population care.

Topics: Healthcare Misc
3 min read

A look inside data breach trends, research

By protectedtrust on Aug 20, 2015 2:25:55 PM

Businesses, health care providers, consumers, government agencies, nonprofit organizations and other entities have been experiencing increased rates of cybercrime for several years now, and it almost seems as though nothing can slow the speed with which data breaches are occurring. A wealth of research has been conducted and released regarding the reasons why data has been stolen so frequently, what companies could be doing differently and which types of protections are the best to keep costs down and defense high.

Topics: Email Encryption and Services Stay Secure Misc
1 min read

Building a Managed Service Business with Rubrik

By protectedtrust on Aug 18, 2015 8:17:55 PM

Topics: Case Studies Finance
3 min read

Cloud Growth Ought to be Accompanied by Security Increases

By protectedtrust on Aug 17, 2015 2:47:02 PM

One of the main debates surrounding cloud computing for several years now has involved the question of whether the technology can be secured or not. This is undoubtedly a tricky concept given the sheer volume of moving parts and mitigating factors that could impact the answer in one way or another, but most experts have started to agree in their analysis regarding the security of cloud computing.

Topics: Finance Stay Secure
3 min read

How the IoT Will Impact Health Care Data Security

By protectedtrust on Aug 14, 2015 2:31:44 PM

The Internet of Things has not quite yet exploded or gained traction across industries, but many expect the trend to do both within the near future, and companies must ensure that they are embracing this movement a bit more proactively than others that have sprouted up in the past. Mobility and cloud computing had significant impacts on virtually all industries, while the security challenges each trend entailed were often too much for businesses to wrap their heads around.

Topics: Healthcare Finance

Photos from Rubrik's Recent Visit to Protected Trust

By protectedtrust on Aug 13, 2015 7:59:16 PM

Topics: Announcements Back Up and Disaster Recovery
2 min read

The High Cost of Noncompliance in Health Care

By protectedtrust on Aug 13, 2015 1:56:00 PM

Health care IT security has been lackluster of late, to say the least, as countless breaches of patient data have taken place in a relatively short period of time with no signs of a changing tide rolling in soon. This is one of the many reasons why regulators and law enforcement officials have started to come down hard on hospitals and other medical firms that are not doing everything in their power to maintain compliance and protect information from the grasp of hackers and other threats.

Topics: Healthcare
3 min read

The High Price of Poor IT Security

By protectedtrust on Aug 12, 2015 3:29:20 PM

Data breaches have grown in frequency and subsequent damages throughout the past decade, as more types of organizations begin to migrate the lion's share of their information to digital environments. While hackers are again gaining steam in terms of the rate of breaches that are caused by these entities, they are far from being the only threats out there given the increased prevalence of insider threats and employee negligence.

Topics: Healthcare
3 min read

Trends in Financial Services Data Security, Compliance

By protectedtrust on Aug 5, 2015 10:24:05 AM

Financial data has been among the most commonly exposed and stolen throughout the past several years, with credit card issuers, banks, retailers and payment processors all experiencing increased frequencies of breaches. Although devastating events have struck companies that were capable of getting through the challenges involved in controlling damages and thus did not succumb to closure, this will not be the case for many small and medium-sized enterprises.

Topics: Finance Stay Secure
3 min read

A Rundown of IT Security Around the Globe

By protectedtrust on Aug 3, 2015 10:15:00 AM

Any health care provider, government agency, financial services firm, business, consumer or other entity that is not a bit concerned about the integrity of their data must have been sleeping under a rock for the past few years. Data breaches have moved outside the realm of the IT community and into the popular news, and headlines regarding these events have been increasingly prevalent in the United States and abroad, leading to massive increases in identity theft, fraud and other economically damaging issues.

Topics: Government Stay Secure
2 min read

What is the 21st Century Cures Bill?

By protectedtrust on Jul 31, 2015 10:49:20 AM

The transformation of federal regulations covering all entities that manage patient information has accelerated a bit in the past six years, with the 2009 enactment of the Health Information Technology for Economic and Clinical Health Act being one of the more important new releases. However, the Health Information Portability and Accountability Act is still very much in motion, and medical firms need to ensure that their own novel strategies remain in compliance with the statutes therein.

Topics: Healthcare HIPAA News Stay Secure
1 min read

Henry Schein Business of Dentistry Conference 2015 - October 8-10

By protectedtrust on Jul 30, 2015 12:55:48 PM

Topics: Protected Trust Events
2 min read

Trends in the IT Security Landscape

By protectedtrust on Jul 30, 2015 11:03:36 AM

Because of how quickly the frequency and associated damages of data breach have risen in the past few years, all eyes have been firmly focused on innovations and progressions within the IT security community. Plenty of new and advanced tools have been released to help firms hailing from virtually every industry - including health care, financial services and law - become a bit more successful in their data protection strategies, but adoption and management appear to still be lacking.

Topics: Finance Stay Secure
2 min read

The Constant Issue of Reactionary IT Security in Health Care

By protectedtrust on Jul 29, 2015 10:43:21 AM

Health care providers have been hot and cold with respect to protecting patient data of late, as many have made progressive moves to protect their systems and information, while others have lagged behind in this regard. Although retailers and others have had their own struggles, health care is likely the most at-risk sector given the much higher value of patient data on the black market than standard financial information.

Topics: Healthcare Stay Secure
2 min read

The Missing Link in IT Security

By protectedtrust on Jul 28, 2015 10:25:14 AM

Throughout the past several years, indications of an increased need for tighter IT security have been plentiful, with data breaches taking up a wealth of the national and global news headlines. It has taken a while for leaders to truly understand what needs to be done to protect against modern threats, but recent research has begun to show a bit of promise in this regard, with firms seemingly taking the right steps to defend themselves.

Topics: Stay Secure
3 min read

Is Health Care Prepared for More Mobile IT?

By protectedtrust on Jul 27, 2015 11:16:50 AM

One of the more prominent threats to IT security throughout the past five years has been mobility, as smartphones, tablets, portable computers and the software they run remain common sources of breach and information loss. In health care, lost or stolen devices, as well as misuse of those gadgets among employees, can quickly lead to a major breach of corporate IT, and this has happened more times than one could count in the past couple of years alone.

Topics: Healthcare
2 min read

New Survey Reveals Consistent Failures in Health Care IT Security

By protectedtrust on Jul 22, 2015 10:51:43 AM

It might seem as though journalists and analysts have been beating a dead horse with the information on health care's severe IT security struggles, but awareness is critical in the fight against modern cybercrime. This is especially true given the widespread prevalence of data breaches caused by negligence, a lack of training or simple error, as those particular issues have been the first or second biggest ones in the industry for years now.

Topics: Healthcare Stay Secure Misc
3 min read

Secure Cloud Not Optional in Health Care

By protectedtrust on Jul 20, 2015 11:24:11 AM

The health care sector continues to go through massive changes as time goes on, with technology playing an increasingly vital role in the strategic overhauls taking place across providers. One would be hard-pressed to identify a medical firm that has not been under the gun by way of security and compliance in the past few years, and the frequency and subsequent damages of data breaches are only accelerating with the passing of the months.

Topics: Healthcare Finance
2 min read

The Severe Impact of Recent Breaches

By protectedtrust on Jul 16, 2015 10:51:46 AM

Data breaches have been impacting a larger volume and greater diversity of individuals throughout the past several years, wreaking havoc on the private and public sectors in the process. Losses from these events have gone up significantly, and the chances of experiencing a breach have never been higher than today, which is why more needs to be done by way of enhancing protection and security.

Topics: Healthcare Stay Secure
3 min read

Recent Tips and Trends in IT Security

By protectedtrust on Jun 8, 2015 11:54:27 AM

In the past several years, IT security has gone from a rarely spoken-about topic to one that virtually every leader in the private and public sectors has harped on with increasing intensity. Considering the fact that threats are evolving so quickly, data breach frequency and subsequent damages are rising, new technological trends are gaining traction and user demands continue to transform, it is not all that surprising that IT security has been such a hot point of debate throughout the past couple of years.

Topics: Stay Secure
2 min read

Health Care Must Balance Security and Productivity

By protectedtrust on May 27, 2015 10:18:33 AM

Cloud computing and a wealth of other novel technologies have presented companies with significant challenges from management perspectives, perhaps none more complex than attaining the balance between corporate control and user freedom. Being overly restrictive in efforts to mitigate threats can reduce the positive impacts of the solutions, while a complete lack of control can lead to significant security issues before long.

Topics: Healthcare Stay Secure
2 min read

How Security Plays into Frictionless User Experience in Health Care

By protectedtrust on May 18, 2015 10:38:58 AM

The health care sector has been in a perpetual state of change for more than a decade now, with regulations, patient demands, cost control efforts, new technologies and a growing risk of data breach all bearing down on organizations therein. Studies continue to be released that indicate medical IT is still far from being optimal, and this is not that surprising given the fact that so many of the more popular tools now being used are still very novel and untested.

Topics: Healthcare
3 min read

IT Security Must Be Intelligent

By protectedtrust on Apr 27, 2015 10:39:37 AM

When a business does not focus on developing intelligent, relevant and informed strategies, chances are that firm will not last very long in the highly competitive and challenging markets of the modern era. Although IT strategies are becoming a bit more intelligent as time goes on when looking across industries and at companies of varied size classifications, one area that has seemed to be a major drag is security.

Topics: Stay Secure Misc
3 min read

Cloud security becomes a reality

By protectedtrust on Apr 20, 2015 11:37:11 AM

In the past several years, cloud computing has been at the center of a wealth of debates regarding privacy and security, though the market has put to rest some of the more common fears that hindered adoption in the beginning. When cloud computing did come into style for businesses, consumers and public-sector agencies, many decision-makers simply did not believe that the solutions could be secured by any means, and thus balked at using the technology altogether.

Topics: Finance Stay Secure
2 min read

SaaS cloud systems: Keeping security in mind while reaping the benefits

By protectedtrust on Apr 15, 2015 9:08:56 AM

Using cloud services in lieu of localized storage has become a common option for many businesses. When any company takes on a cloud host, it needs to consider the security implications and holes that can come with this course of action.

Topics: Stay Secure
2 min read

Cyberattacks need to be minimized, not eradicated

By protectedtrust on Apr 14, 2015 9:54:42 AM

The definition of cybersecurity has drastically changed from what it was two years ago. Cyberattacks suffered by companies like Target, Home Depot and Sony Entertainment last year have caused businesses to take digital security much more seriously.

Topics: Email Encryption and Services Back Up and Disaster Recovery Stay Secure
2 min read

The advantages to adopting a cloud system and what companies need to know

By protectedtrust on Mar 23, 2015 10:12:37 AM

Cloud computing has become very popular in all industries. It generates opportunities for growth and innovation, especially in terms of efficiency. According to a 2014 report by Digital Business, Rethinking Fundamentals, it's predicted more than 60 percent of businesses will have half of their infrastructures on the cloud by 2018.

Topics: Stay Secure
2 min read

What HIPAA does and how the health care industry has been complying

By protectedtrust on Mar 16, 2015 10:50:47 AM

HIPAA, or the Health Insurance Portability and Accountability Act, has been a huge source of interest since cyberattacks became prevalent in the business world. Many people have argued that hackers will begin to focus on the health care industry, due to lack of innovation in cybersecurity affecting a variety of equipment.

Topics: Healthcare HIPAA News
2 min read

4 tips for strengthening cybersecurity

By protectedtrust on Mar 11, 2015 12:02:26 PM

Cyberthreats have become widespread in recent years, and companies are cracking down to improve their cybersecurity methods. According to the Credit Union Times, cybercrime is no longer small and petty and is expected to continue to escalate this year.

Topics: Email Encryption and Services Stay Secure
2 min read

How can businesses pick and choose email encryption software?

By protectedtrust on Mar 10, 2015 10:26:59 AM

Email encryption has become an important asset for businesses in a world where cybersecurity is a necessity. Although it doesn't seem like the most fancy or complex protection tool, it can be an amazing resource for email security, and may have been able to prevent the Sony Entertainment cyberattacks if the organization had utilized it.

Topics: Email Encryption and Services Stay Secure Misc
2 min read

7 tips for organizations changing over to the cloud

By protectedtrust on Mar 9, 2015 11:47:11 AM

Integrating the cloud into a business has the potential to be one of the best decisions a company can make thanks to the advantages the technology provides - lowered operational costs, less maintenance and agile access to data.

Topics: Stay Secure
2 min read

How has the US responded to political cyberattacks?

By protectedtrust on Mar 5, 2015 10:42:38 AM

Cybersecurity has certainly become a prevalent topic in the United States, but one has to ask - how is the U.S. going to respond to the large number of attacks from which it has suffered?

Topics: Government Legal Stay Secure
2 min read

The lack of women in IT and the factors causing their absence

By protectedtrust on Mar 4, 2015 10:21:50 AM

Women have become more prominent in the business world thanks to their involvement in education and better cooperation with their male counterparts. However, women are having a harder time breaking though in the field of information technology.

Topics: Email Encryption and Services Legal Stay Secure
3 min read

Protecting data and creating a backup recovery plan

By protectedtrust on Mar 3, 2015 10:53:14 AM

Data loss has become a top concern for companies. Dependence on technology created worries about the amount of security that is necessary and what strategies should be used to safeguard digital information. With how prominent technology and digital information now are in the corporate world, backup recovery and data protection are crucial.

Topics: Back Up and Disaster Recovery Stay Secure
2 min read

5 emerging trends for data centers this year

By protectedtrust on Mar 2, 2015 11:19:07 AM

Data centers have become a great resource for businesses of the modern world. Cloud technology and cybersecurity are primary concerns for many industries, and data centers are capable of providing the tools to help enterprises meet these challenges.

Topics: Finance Stay Secure
3 min read

Reviewing 4 cyberattacks from last year

By protectedtrust on Feb 27, 2015 10:58:04 AM

Now that 2015 is here, it's time to look back on the cyberattacks companies suffered from in 2014 and learn from their mistakes. Last year was plagued with breaches in various industries that could have been prevented by stronger security mesures.

Topics: Email Encryption and Services Finance Misc
2 min read

Obama requests $14 billion for cybersecurity measures

By protectedtrust on Feb 26, 2015 10:14:09 AM

The government began 2015 by becoming heavily involved with cybersecurity and its definition in the United States. President Barack Obama offered a proposal for new cybersecurity legislation to a variety of criticism and feedback. Most recently, he requested that $14 billion be earmarked for cybersecurity in 2016's fiscal budget.

Topics: Government Misc
2 min read

4 tips for making the cloud safe and efficient

By protectedtrust on Feb 24, 2015 10:20:10 AM

New technology such as the cloud has offered businesses a variety of benefits, one of them being the ability to be more productive. When companies use the cloud, they don't have to worry about the maintenance and work that is required from a localized data infrastructure, and they have much more time on their hands.

Topics: Back Up and Disaster Recovery Finance Stay Secure
2 min read

Winter Haven fiber and data park seeks tenants before speedy Internet launch

By protectedtrust on Feb 23, 2015 10:28:18 AM

Growing up in Polk County, Ingram Leedy found himself spending most of his free time learning computers.

Topics: Announcements Finance Stay Secure
2 min read

Localization vs. the cloud: What businesses need to consider

By protectedtrust on Feb 20, 2015 10:31:01 AM

Cloud hosting has become a great business resource, but many professionals are wary of security and how much control they have over their data. Technology security has become a necessity, and basics such as email encryption through email service providers have become a prominent resource in the corporate world.

Topics: Finance Stay Secure
2 min read

Anthem cyberattack leads to healthcare industry security concerns

By protectedtrust on Feb 18, 2015 10:21:56 AM

A cyberattack by an unknown entity compromised critical Anthem BlueCross data in the latest cybersecurity incident to hit the headlines. ZDNet reported that the attack was carried out by hackers who used stolen passwords to infiltrate Anthem's database and steal personal information pertaining to old and new clients and employees.

Topics: Healthcare HIPAA News Stay Secure
2 min read

What you need to know to prepare for cybersecurity in the new year

By protectedtrust on Feb 17, 2015 10:14:36 AM

It has been a tough year for cybersecurity​, with various consumer information compromised and the most recent cyberattack crippling Sony Pictures Entertainment. This has put businesses big and small on edge, and made cybersecurity almost a code to be cracked with a multitude of suggestions and guides for businesses to consider. The recent events in technology and cybersecurity have made companies wary of what they need to protect in the future. But what can an enterprise use to protect themselves in terms of cybersecurity in 2015?

Topics: Email Encryption and Services Stay Secure Misc
2 min read

Why businesses need to update their disaster recovery plans

By protectedtrust on Feb 13, 2015 11:44:22 AM

Disaster recovery is not a fun topic, but it's a necessity for any business with electronic data. Forbes discussed how technology is dynamic, always changing and needs to be upgraded. This means companies' disaster recovery plans must be frequently overhauled, too.

Topics: Back Up and Disaster Recovery
2 min read

4 email security tactics for business employees

By protectedtrust on Feb 11, 2015 10:03:01 AM

It's hard to believe email wasn't even a concept 20 years ago. Now, it's beginning to replace physical interactions in the business world. However, this means that it's extremely important to keep your email protection measures updated.

Topics: Email Encryption and Services Stay Secure
2 min read

The changes data centers will be facing in 2015

By protectedtrust on Feb 10, 2015 10:09:33 AM

Data centers will be going through some huge changes this year. Last year, news stories about the infiltration of companies like Sony Entertainment and Home Depot encouraged businesses to recognize the importance of cybersecurity and what it means for them.

Topics: Stay Secure
2 min read

5 myths many still believe about cybersecurity

By protectedtrust on Feb 9, 2015 10:45:18 AM

Although cybersecurity has become a popular topic, there are a variety of myths that businesses still believe. Some of them are downright dangerous to accept, as they can prevent any advancement of technology security within an enterprise.

Topics: Email Encryption and Services Government Legal Stay Secure Misc
3 min read

The various Twitter hacks (and how they are not as serious as other cyberattacks)

By protectedtrust on Feb 6, 2015 10:53:44 AM

Last week seems to have been the week for Twitter hacks with various reports coming up about them throughout the week. The topic of cybersecurity has been highly visible with last year's breaches, which means that hacked technology has been getting more attention than ever before.

Topics: Email Encryption and Services
1 min read

Thursday Troubleshooter: Is it a HIPAA violation to email radiographs to other dentists?

By protectedtrust on Feb 5, 2015 4:48:15 PM

DentistryIQ.com recently released a great article regarding a fairly frequently asked question and HIPAA compliance. Have a look:

Topics: Email Encryption and Services Healthcare HIPAA News Misc
2 min read

The insecurity of the Internet of Things

By protectedtrust on Feb 5, 2015 10:20:20 AM

The Internet of Things is a concept that has become increasingly integrated into the lives of consumers. It encompasses the idea of connecting nearly everything to the Internet, such as home appliances and pedometers. More items such as these are becoming Internet-compatible and people are using smartphone applications for easier access.

Topics: Email Encryption and Services Stay Secure
3 min read

Cybersecurity in the financial sector is beginning to be taken seriously

By protectedtrust on Feb 4, 2015 10:33:49 AM

Financial cybersecurity has stirred up conversation because of so many cyberattacks this past year. In New York, The Wall Street Journal reported that Benjamin Lawsky, superintendent of the Department of Financial Services, released a three-page letter that detailed concerns regarding cybersecurity in the financial sector. This came in response to the various cyberattacks that compromised banking and consumer information, such as those at Target and Home Depot.

Topics: Finance Government Misc
2 min read

Solutions being put into place for dwindling cybersecurity workforce

By protectedtrust on Feb 3, 2015 2:48:53 PM

Cybersecurity has no doubt become a serious factor in the business world. This past year, many news stories served as warnings for companies to take cybersecurity earnestly and really consider their current state of digital security.

Topics: Government Stay Secure
2 min read

Habits employees need to avoid cybersecurity scams

By protectedtrust on Feb 2, 2015 11:12:04 AM

Certain habits should be instilled when using technology. Cybersecurity has become a huge modern issue, and supervisors and managers have to put certain routines in place so employees can avoid falling for any scams.

Topics: Back Up and Disaster Recovery Misc
2 min read

Customer expectations are changing for cloud and data recovery

By protectedtrust on Jan 30, 2015 10:34:53 AM

Technology breaches have affected the way companies look at cybersecurity, but also made people revaluate how they expect it to work.

Topics: Back Up and Disaster Recovery Finance Stay Secure
2 min read

Keep a small business secure with cybersecurity

By protectedtrust on Jan 29, 2015 10:11:01 AM

Small businesses have had to become more aware of cybersecurity and what protection is available as the number of threats have only increased in recent years. Radware reported that cyberattacks have become virtually constant for some businesses, with 15 percent of executives and 19 percent of industry executives from technology companies saying that breaches have lasted more than one month.

Topics: Email Encryption and Services Stay Secure Misc
2 min read

What you can learn from two high-profile corporate breaches

By protectedtrust on Jan 28, 2015 10:17:11 AM

Charge Anywhere, an electronic payment provider, and Alibaba, an e-commerce company, both had their data compromised, but didn't find out until a good time after. What can companies do to avoid this happening to them?

Topics: Email Encryption and Services Stay Secure
2 min read

Looking back on how 2014 changed the meaning of cybersecurity

By protectedtrust on Jan 27, 2015 10:40:59 AM

Now that last year is over, we can look back on the hacks and cyberattacks that occurred. Some have been calling 2014 the year of cyberattacks, and it's easy to see why in light of various breaches affecting Target, JP Morgan, Sony Entertainment and Home Depot.

Topics: Email Encryption and Services Misc
2 min read

Port Tampa Bay partners with Florida-based business continuity firm

By protectedtrust on Jan 26, 2015 11:41:02 AM

TAMPA, Fla.— Port Tampa Bay announces that it has selected the Winter Haven, Fla.-based firm Protected Trust to maintain its flow of business operations in the event of any disaster, such as a hurricane.  The partnership with Protected Trust is a concerted effort on behalf of the port authority to ensure workforce business continuity, a key specialty of the firm, which also handles a wide range of IT security solutions for its diverse and international client base.

Topics: Announcements
2 min read

Fingerprints as passwords: Are they really that safe?

By protectedtrust on Jan 26, 2015 10:56:43 AM

A hacker stealing someone's fingerprint through a high-resolution digital photo seems like the premise of a scene from a sci-fi film. This is no movie, however, as German Defense Minister Ursula von der Leyen fell victim to precisely that kind of scheme in real life when her fingerprint was taken from a photo and reversed to be applied to security systems.

Topics: Email Encryption and Services Stay Secure Misc
2 min read

How HIPAA may be affected by Obama's cybersecurity proposal

By protectedtrust on Jan 26, 2015 10:43:03 AM

President Barack Obama reiterated his goal to change cybersecurity in his State of the Union address on Tuesday. He hopes to accomplish more secure data through legislative modifications and his own cybersecurity proposal. However, healthcare providers are concerned how these changes might affect the Health Insurance Portability and Accountability Act, or HIPAA.

Topics: Healthcare Government HIPAA News
2 min read

The guidelines made for cloud security

By protectedtrust on Jan 23, 2015 10:26:25 AM

The cloud has become integrated in a variety of software and technologies, which means that the security for it has to advance along with it. There are still fears of cloud security, especially with the various reports about cyberattacks coming to light last year.

Topics: Email Encryption and Services Government Stay Secure Misc
2 min read

What are the biggest predicted threats in cybersecurity?

By protectedtrust on Jan 22, 2015 10:23:36 AM

With 2014 past us, several news sources are looking at the future of cybersecurity and what expectations we are to have in regard to cyberattacks.

Topics: Email Encryption and Services Stay Secure
3 min read

The evolution of cybersecurity in the US government

By protectedtrust on Jan 21, 2015 10:09:33 AM

Cybersecurity didn't exist 20 years ago but now, it's influential enough that the U.S. Justice Department has created a cybersecurity unit in its criminal division. Due to the rise in cybercriminals and threats against sensitive information in the government as well as multiple attacks on private enterprises - such as the recent Sony Pictures Entertainment breach - the U.S. government has been focusing more on cybersecurity and what it means for American people and businesses.

Topics: Government Stay Secure
3 min read

Cybercrime is evolving, using services to adapt

By protectedtrust on Jan 20, 2015 10:11:48 AM

Enterprise IT is a constantly changing market at the moment. IT teams are migrating whole infrastructures to the cloud, constructing colocation data centers and implementing bring-your-own-device strategies. The problem with these technological innovations is that IT professionals need a completely new array of skills. This is even more apparent in terms of cybersecurity. Because of the ever-changing IT environments, it should come as no surprise that data protection, data center security and email encryption are now offered as services that adapt to the variable landscape of cybercrime.

Topics: Government Stay Secure Misc
3 min read

The concerns that come with Obama's stance on cybersecurity

By protectedtrust on Jan 19, 2015 10:09:30 AM

U.S. President Barack Obama has taken a stance on cybersecurity and how it needs to be addressed more seriously. With various cybercrimes occurring in the U.S. of late, including the most recent infamous attack on Sony Entertainment, it was only a matter of time before cybersecurity was addressed by the president.

Topics: Email Encryption and Services Government Misc
3 min read

Threats around the world: Russia and China as primary examples

By protectedtrust on Jan 16, 2015 10:35:57 AM

As technology progresses, the benefits of fast and easy connectivity become apparent. Instead of traveling across oceans and commuting to the offices of clients and customers, businesspeople can use video conferencing, mobile devices and many other tools to remain in contact with colleagues and co-workers. However, this has not stopped cybercriminals from committing acts of corporate espionage. The Internet acts as a double-edged sword in this sense. The benefits of connecting to different countries is countered by the risks associated with sending and receiving data, as well as with having corporate networks connected to the Internet at large. While data center cybersecurity services and encrypted email applications protect enterprises, unfortunately, the results of interconnectivity manifest themselves as corporate threats spread across the globe in a variety of countries.

Topics: Stay Secure
3 min read

Is the US military's Twitter hack a cause for concern?

By protectedtrust on Jan 15, 2015 10:13:09 AM

It's hard to believe there was a time when cyberattacks weren't a part of the daily news, as now, there seems to be a new story every day. Reports about the United States Central Command's Twitter being compromised - allegedly by ISIS militants - is no exception, and the situation has caused fear and uncertainty. However, is a Twitter hack a huge cause for concern?

Topics: Email Encryption and Services Government
3 min read

The current threat landscape: Poodle, WireLurker and shadow IT

By protectedtrust on Jan 14, 2015 9:53:55 AM

Data breaches are all over the news, but most reports focus on the impact of these, rather than the cause. This is partially due to ongoing investigations, but also because average Joes have trouble understanding the difference between a distributed denial of service attacks and malware. Regardless, the threat landscape is changing rapidly, and the variety of malicious programs is becoming a burden to those in finance, healthcare and other data-intensive industries. Perhaps with some additional insight into data breaches and their causes, more C-level executives will agree that third-party security providers are essential to preventing intrusions.

Topics: Stay Secure
3 min read

CISPA being reintroduced to Congress - and it still won't improve cybersecurity

By protectedtrust on Jan 13, 2015 9:59:23 AM

The Sony Entertainment cyberattack has certainly inspired fear in the business world and now the government is taking action. The Cyber Intelligence Sharing and Protection Act is being reintroduced into Congress by United States Representative Dutch Ruppersberger.

Topics: Email Encryption and Services Government Misc

Protected Trust Launches Virtual Private Cloud Servers with Nutanix

By protectedtrust on Jan 9, 2015 4:37:09 PM

In an effort to provide more secure and efficient infrastructure to better serve it's clients, Protected Trust has established a business relationship with Nutanix, a solutions provider for data center infrastructure. The Nutanix Virtual Computing Platform has disrupted the market by seamlessly and natively converging compute and storage in a single appliance.

Topics: Announcements
3 min read

The high cost of internal security

By protectedtrust on Jan 7, 2015 10:35:03 AM

Data center infrastructure is the backbone of an enterprise regardless of the industry in which it exists. Between debates about cloud computing and whether systems should be on- or off-premise, security sometimes get too little attention from C-level executives. For evidence, look no further than the abundance of data breaches occurring in every market from retail to finance, and even government networks recently experienced strange activity. However, it seems that organizations are recognizing the devastating effects that intrusions have on customer loyalty and business processes.

Topics: Stay Secure
3 min read

Organizations lacking big data protection, risking data breaches

By protectedtrust on Jan 5, 2015 11:39:22 AM

As big data hitches its trailer to the cloud computing bandwagon, organizations are collecting and storing a vast amount of data in data centers. Knowing this fact, it should come as no surprise to IT professionals and business leaders that data breaches are happening with more frequency. This begs the question, however, if corporations have knowledge of where data is stored in order to protect it. After all, if all information is considered to be equal, there might be some lapses in security and a lack of sufficient protocols. A recent report from the Ponemon Institute found that confidential data is often invisible to IT teams, leading to gaps in security.

Topics: Stay Secure
3 min read

Malware threats increasing alongside use of data centers and email

By protectedtrust on Dec 22, 2014 10:06:43 AM

As data centers become cloud environments and the amount of malware rises, providing security for corporate networks has never been more important. No organization wants to be the subject of the latest headline about data breaches, but the likelihood of this occurring is more likely as threats increase. Beta News reported on a study that discovered 20 million new strains of malware in the third quarter of 2014 alone. That means there are 227,747 new malicious programs being developed every day. The chance of getting infected is now up 1 percent. According to Beta News, 37.93 percent of organizations around the world were infected by a form of malware in the third quarter of 2014, the most common of which are Trojans, representing 78 percent of infections.

Topics: Email Encryption and Services Stay Secure Misc
3 min read

Agnini Family Dental

By protectedtrust on Dec 19, 2014 11:17:28 AM


Challenges

  • Achieve HIPAA Compliance
  • Keep Records Secure and Safe
  • High Availability
  • Workflow Integration
  • Ease of Use

Solution

Protected Trust provided a secure e-mail messaging solution for storage and transmission of confidential information which was able to seamlessly integrate with an existing workflow while also avoiding future liabilities complying with HIPAA standards.

Topics: Healthcare Case Studies
3 min read

Expert calls financial sector data breaches a 'full-blown' crisis

By protectedtrust on Dec 17, 2014 10:41:41 AM

More so than ever, cybersecurity is a lingering thought among the leaders behind the country's largest banking firms. Over a month since JPMorgan Chase experienced a data breach, it is still unclear what the lasting effects will be, as the investigation is still underway. One thing is certain, however, and that is that JPMorgan Chase was not the only victim. Bloomberg reported that at least 13 more financial firms have been linked to the JPMorgan Chase breach. According to the source, the hackers involved in the original attack used the same computers in the attempted intrusion of the 14 enterprises. The fact of the matter is that security needs to be stepped up.

Topics: Finance Stay Secure
3 min read

New Shellshock threats discovered in form of botnets

By protectedtrust on Dec 15, 2014 12:20:59 PM

The Shellshock vulnerability appeared earlier in the month seemingly out of nowhere, which is surprising considering how long the problem has existed on UNIX- and Linux-based systems. Luckily, many businesses cracked down and applied updates as soon as the threat was discovered. Now, while many enterprises are starting to clean up the aftermath, Shellshock has snuck back onto the scene in new forms, but with the same risks to corporate networks.

Topics: Stay Secure
3 min read

White House network breach raises questions about business security

By protectedtrust on Dec 12, 2014 11:11:26 AM

Data breaches are becoming all-too-common occurrences. To add more flames to the fire, another intrusion has occurred - and this time it was on government networks. The Washington Post reported that hackers possibly working for the Russian government have breached the unclassified White House network. This caused more than panic, as there were some temporary disruptions to services before the government's cybersecurity professionals stopped the intrusion. Despite the risks, White House officials told the source that the investigation is an ongoing process and none of the systems were damaged by the hackers.

Topics: Government Stay Secure
2 min read

The impact of data breaches on customers across industries

By protectedtrust on Dec 10, 2014 10:12:40 AM

Corporate data breaches are becoming more common as businesses continue to acquire the personal information of customers and clients. The Washington Post cited an Identity Theft Resource report that discovered intrusions have increased by 27.5 percent in the past year, and there have been 579 data breaches in 2014. This should be expected due to the fact that enterprises have systems and data centers full of valuable information. For example, many retailers now offer rewards programs, making them ideal targets for cybercriminals seeking addresses and credit card information, while financial firms base their processes on the collection of Social Security numbers, bank account information, family details and living arrangements.

Topics: Healthcare Finance Stay Secure
3 min read

What can businesses learn from Sony's hack history?

By protectedtrust on Dec 9, 2014 9:52:47 AM

Sony Pictures Entertainment was recently hacked by a group that calls itself #GOP, which stands for Guardians of Peace.

Topics: Email Encryption and Services Stay Secure Misc
2 min read

75 percent of IT decision-makers have cloud anxiety - are they right?

By protectedtrust on Dec 1, 2014 10:53:41 AM

Debates have raged between business leaders and IT administrators for years regarding the level of security associated with using cloud computing. While a private cloud is often considered safer than public cloud services, recent data suggests that fears and anxiety still exist when looking at service solutions. However, with some security practices and third-party help, organizations can mitigate their chances of experiencing data theft and breaches.

Topics: Finance Stay Secure
3 min read

One attack leads to another as vulnerabilities are disclosed

By protectedtrust on Nov 24, 2014 11:07:36 AM

Unfortunately for businesses across industries, new threats emerge on the cyberspace scene every day. The latest trend in malicious code seems to be attackers finding and exploiting vulnerabilities. The most recent form of vulnerability exploitation was Shellshock, but other forms of malware, ransomware and attacks have been detected this week. It seems that as more organizations have their IT professionals step on flames, other fires appear elsewhere.

Topics: Stay Secure
3 min read

IT professionals lacking skills? Security providers pick up slack

By protectedtrust on Nov 17, 2014 11:13:51 AM

IT professionals are in high demand during an era when a business's reliance on network security and cloud computing are at a high point. In order to keep corporate data secure, email encrypted and the company functioning, some enterprises consider large IT departments to be crucial to success. On the other hand, small and medium-sized businesses cannot afford the best networking and cybersecurity staff members. This causes them to rely more on giving a few employees many tasks, some of which are not their specialty.

Topics: Stay Secure
3 min read

Two Severe Windows Vulnerabilities Addressed, Another Two Unpatched

By protectedtrust on Nov 14, 2014 10:58:41 AM

Windows users might have noticed that on the morning of Nov. 13, they were greeted with a large number of updates for their systems. This is all too common of a problem for IT departments as they scramble to patch servers, desktop computers and laptops in one day. If an organization was quick to act and lucky enough, it may have successfully avoided an intrusion through one of the reported 40 vulnerabilities. According to ComputerWeekly, this Microsoft software update is almost double the size of an average security patch, and it will certainly keep IT teams busy all week. However, despite the high quantity of patched vulnerabilities, two specific updates were delayed. Ultimately, any organization supporting Windows-based devices or servers are at risk.

Topics: Stay Secure
3 min read

Dealing with the aftermath of a data breach

By protectedtrust on Nov 10, 2014 10:54:57 AM

Cybercriminals are ruthless. Hackers are constantly developing malware, searching for vulnerabilities and finding ways to steal corporate data from enterprises and small businesses alike. From intellectual property and trade secrets to Social Security numbers and passwords, they will not stop until they have the information that they work so hard to extract from databases and servers.

Topics: Email Encryption and Services Misc
3 min read

The ubiquity of cyberthreats and the reactive nature of organizations

By protectedtrust on Nov 3, 2014 10:33:23 AM

The logical interpretation of the recent Home Depot, Target and Community Health Systems data breaches is that these organizations do not have the ability to prevent intrusions. This was addressed at the Florida Center for Cybersecurity conference this week by security breach consulting firm Mandiant's Senior Manager Jamey Dillion, according to the Tampa Bay Times.

Topics: Healthcare Finance Government Stay Secure
2 min read

Malicious Insiders Wreaking Havoc On Enterprises

By protectedtrust on Oct 24, 2014 10:48:48 AM

Hackers are often the first parties corporate decision-makers, consumers and others would imagine when data breaches are in the discussion, but they only represent a small portion of the threat to information and network security. Although hackers are certainly a threat that should never be underestimated, businesses have more to gain from focusing on the prevention of negligent and malicious insider threats, as these are more often than not the real source of exposure.

Topics: Government Stay Secure
3 min read

Overcoming Data Center Challenges of the Future

By protectedtrust on Oct 22, 2014 11:38:38 AM

Businesses have become far more reliant upon data centers in the past few years, as the digital revolution continues to spread across industries and regions with increasing intensity. This is not necessarily a bad trend, as data management can be far more efficient, financially advantageous and rich with opportunities to improve than traditional paper filing systems, representing one of the main reasons why companies are moving in this direction.

Topics: Stay Secure
3 min read

How Common Is Data Breach?

By protectedtrust on Oct 20, 2014 10:35:50 AM

There has been a wealth of research related to data breaches in the past few years, as analysts and experts work to get to the root causes of information exposure, identity theft and other crimes that have been significantly impacting the United States economy in the past few years. Some interesting findings have certainly been identified, such as the fact that employee errors, poor configuration and generally lackadaisical security strategies have been highly common sources of breach.

Topics: Stay Secure Misc
3 min read

Is Your Data Center Ready for Big Data, Analytics?

By protectedtrust on Oct 16, 2014 10:14:02 AM

The private sector is becoming more intelligence-driven with the passing of each year, and organizations that do not take data management seriously are in for a long, uphill battle toward sustaining a competitive edge. cloud computing, mobility, the Internet of Things and several other trends in corporate IT have had profound impacts on the average data center, but few movements can compare to the gravity of big data and modern business analytics.

Topics: Finance Stay Secure Misc
2 min read

New Report Highlights Growing Cloud Computing Concerns

By protectedtrust on Oct 13, 2014 10:42:43 AM

Cloud computing has continued to become a more prolific technology with the passing of each year, but many corporate decision-makers have not yet started to truly entrust data in these environments. When the industry first started moving along in terms of popularity and adoption, the primary hindrance to widespread acceptance was fears that information and systems would simply never be able to be secured because of the general characteristics entailed therein.

Topics: Finance Stay Secure Misc
3 min read

Harrowing Forecast for Mobile Application Security

By protectedtrust on Oct 10, 2014 10:22:05 AM

Businesses of all sizes and in all industries have had to quickly get up to speed with modern IT security demands shaped by a variety of new trends and deployments that create complexity in information governance strategies and the like. From email security and data center protection to enterprise mobility risk management and beyond, suffice it to say that the average organization faces a wide range of challenges when trying to protect itself from breach.

Topics: Stay Secure Misc
3 min read

Awareness, Monitoring Critical Weapons Against Data Breach

By protectedtrust on Oct 6, 2014 11:15:38 AM

Studies have indicated that the average data breach is generally caused by an employee error, a symptom of corporate negligence or complete lack of awareness to the common threats on the Internet today. Whether it is an organizational issue - with leaders not taking the right steps to safeguard their data and systems from theft and disruption - or negligence on behalf of ground-level employees, the end product is going to be damaging, and companies must take ownership of the issue soon.

Topics: Finance Stay Secure

Protected Trust Finds Managed Services a Healthy Opportunity for Growth

By protectedtrust on Oct 1, 2014 2:41:57 PM

Things have been changing at Protected Trust during the past 12 months. Last November it entered into a merger with DocuLex and three other companies. The four companies had the same investment group, which determined to combine all four into one. According to Protected Trust Vice President David Bailey, this made a lot of sense because most of the companies were focused on managed services. In June of 2013 the companies moved in together and now share the same office space in Winter Haven, FL...

Topics: Stay Secure
3 min read

Who Will Step Up Against Data Breach?

By protectedtrust on Sep 29, 2014 11:46:31 AM

Information exposure has cost the United States economy hundreds of billions of dollars in recent years, yet few organizational changes have been made to actually shift the tide in the war on cybercrime. Yes, certain states such as Utah and California have stepped up to the plate, creating and expanding upon more modernized approaches to data breach notification standards, manufacturer responsibilities for mobile solutions and the like.

Topics: Government Stay Secure
3 min read

Changing of the Guard in IT Security Spending

By protectedtrust on Sep 25, 2014 10:52:20 AM

There is no doubt that the average business is beginning to be a bit more conscious and aware of the digital threats it faces, as this has been evidenced by the major push toward more advanced IT security services and solutions. Still, studies indicate that the average organization is not all the way there with respect to data and system protection against malware, hacking and loss, despite the fact that most decision-makers seem to understand what the dangers of not getting the job done entail.

Topics: Stay Secure
3 min read

Evaluating the Cloud Security Arena

By protectedtrust on Sep 19, 2014 10:40:48 AM

Cloud computing remains one of the most widely discussed and hotly demanded technologies in history, and the spread of these services around the globe and across industries has been impressive to say the least. With companies working to become as efficient, centralized, modernized and digitized as possible, it only makes sense that the cloud is making its way into virtually every office, as it comes with significant advantages to operational performance.

Topics: Finance Stay Secure Misc
3 min read

In Focus: Security in the Age of Mobility

By protectedtrust on Sep 15, 2014 11:25:54 AM

The economy is becoming more globalized, mobilized and remote with the passing of each year, as trends such as BYOD and the Internet of Things have revolutionized the ways in which organizations and consumers function. No longer is the personal computer enough to help employees get through the day - workers are now expecting access to the most cutting-edge devices and applications available, along with fast and reliable mobile broadband network access.

Topics: Stay Secure Misc
2 min read

More Reasons To Invest In Data Center Services, Security

By protectedtrust on Sep 11, 2014 10:45:08 AM

Data breaches have become some of the most commonly discussed topics in the news of late, as such a high volume of these events has taken place in a very short period of time. From the largest breach in history at Target last November to myriad others in the health care, retail and financial services sectors, the United States and many other nations are reeling from the devastating impacts of similar occurrences.

Topics: Stay Secure
4 min read

Are You Ready for New HIPAA Audits?

By protectedtrust on Sep 8, 2014 11:17:26 AM

The Health Information Portability and Accountability Act of 1996 has been anything but static, as regulators have pushed to keep this piece of legislation relevant to the threats of the current and forthcoming marketplaces. Medical organizations have often faced an uphill battle when trying to manage all of the requirements involved in HIPAA, but this is largely an achievable initiative when decision-makers are making sound choices by way of policy, support and guidance.

Topics: Healthcare
3 min read

One More Piece of Evidence that Security Needs More Attention

By protectedtrust on Sep 4, 2014 10:37:28 AM

In many ways, the war between hackers and victims has moved into a more farcical position in the past few years, with fraudsters finding ways to break into the most heavily guarded and protected systems, stealing information and causing hundreds of billions of dollars in damage around the globe each year. Some researchers have forecast the total number of financial losses to breach the $1 trillion mark within the very near future, and the fact that the public and private sectors have not yet started to slow the spread is disheartening at best.

Topics: Government Misc
3 min read

Email Security Moving Into More Prominent Position

By protectedtrust on Sep 2, 2014 10:42:13 AM

Boardroom executives have had to be exceptionally agile when developing and releasing new forms of security controls for their information technology and communications frameworks, especially as the frequency of and damage associated with breaches continue to rise. Although data center security and network protection have become the two most commonly discussed matters in these conversations, email, text messaging and other direct communications must be covered as well.

Topics: Communications Government Stay Secure Misc
3 min read

A Broad Scope of Health Care Data Security

By protectedtrust on Aug 27, 2014 10:43:11 AM

The health care security arena has become more complex and challenging in recent years, driven by all different types of stressors, pain points, new technologies, compliance overhauls and more. In many ways, patient information has been widely viewed as the most sensitive data around, especially because of the more substantial risks that come with exposure, loss and fraudulent manipulation.

Topics: Healthcare Stay Secure
1 min read

Washington Split on Data Security, Compliance Matters

By protectedtrust on Aug 25, 2014 10:20:52 AM

One of the most common suggestions made by security experts is to not wait on politicians and officials to pass legislation to move on new protective strategies. Business leaders must ensure that they are proactive, and it often takes long periods of time for the public sector to push new legislation, leading to significant shortfalls in timely guidance and resources for organizations that are supposed to comply with the laws.

Topics: Government Stay Secure
3 min read

Email Security Challenged By Russian Hackers

By protectedtrust on Aug 22, 2014 3:05:09 PM

IT security has been one of the hottest topics among enterprises and public sector agencies in the past few years - and for good reason. The frequency of and subsequent damages associated with data breaches have been on a steeply rising track since the early 2000s and, despite the efforts of many decision-makers and leaders, there have been few signs that identity theft and information exposure are going to begin to dissipate any time soon.

Topics: Stay Secure Misc
1 min read

Do Not Underestimate the Sensitivity of Emails

By protectedtrust on Aug 20, 2014 10:11:00 AM

In the past several years, much of the corporate and public sector security discussion has moved in the direction of data centers, network protection, social media and enterprise mobility. All of these components within the modern workplace are certainly important to focus upon for security purposes, but business leaders cannot forget the importance of defending email accounts and messages from the threat of exposure and breach.

Topics: Email Encryption and Services Communications Finance Stay Secure Misc
2 min read

Overseas Cloud Trends and Domestic Takeaways

By protectedtrust on Aug 18, 2014 10:57:36 AM

Cloud computing has become one of the most revolutionary technologies in the world, as more companies continue to flood into the space and adopt the solutions for a variety of purposes. Whereas the most commonly cited reasons for using the cloud once tied back to Software-as-a-Service for packaged applications, email, file sharing and more, the new push seems to be completely data-center centric, as companies work to modernize their IT arrangement.

Topics: Finance Stay Secure
1 min read

What Does the Data Act Indicate for Health Care Providers?

By protectedtrust on Aug 13, 2014 10:19:29 AM

The rapid stream of new legislation has been consistently growing and accelerating the past few years, especially as government officials work to catch up to the sophistication of cybercriminals and data thieves. Health care providers have faced the most robust, complex and challenging statutes in the world, as those in the United States have had to oblige the Health Information Portability and Accountability Act of 1996, along with the more recent Health Information Technology for Economic and Clinical Health Act of 2009.

Topics: Healthcare Government
2 min read

One State's Massive Data Security Problem

By protectedtrust on Aug 11, 2014 10:06:56 AM

It has become clear that cybercriminals no longer discriminate when looking for targets, as retailers, governments, health care providers, universities and many more continue to fall victim to major data breaches and security incidents. Organizations from virtually every industry have been found to be dragging their feet when it comes to critical deployments such as email encryption and data security software.

Topics: Government
2 min read

Is the Health Care Industry Underperforming with HIPAA?

By protectedtrust on Aug 7, 2014 1:13:58 PM

The Health Information Portability and Accountability Act was passed back in 1996 to ensure that patient information was protected and made accessible given the rapid proliferation of new technology in the medical sector. Although it has been around for nearly two decades, many health care providers are still struggling to get a handle on the act's compliance requirements and oversight, while this has been further confounded by even broader-reaching technologies.

Topics: Healthcare HIPAA News
2 min read

The Best Practices of Disaster Recovery, Data Protection

By protectedtrust on Aug 6, 2014 10:40:50 AM

Data security is only one component of compliance and protection in the information governance arena, while disaster recovery and business continuity must also be included in the strategy. Although data breaches are certainly a major concern, and compliance with the Health Information Portability and Accountability Act is critical to avoid fines, medical organizations must incorporate safeguards to be resilient and steely in the face of adverse events.

Topics: Back Up and Disaster Recovery
2 min read

More Steps Needed Toward Robust HIPAA Email, Data Security

By protectedtrust on Aug 4, 2014 10:52:39 AM

In the past several years, the rapid evolution of technology in the health care sector has led to a significant level of audit increases and refinements to standing legislation, as regulators push to better protect patient information from the dangers that abound on the Internet today. One of the most important trends in this conversation continues to be enterprise mobility, which has been especially popular among medical organizations.

Topics: Healthcare HIPAA News Stay Secure
2 min read

Why is email encryption so important?

By protectedtrust on Aug 1, 2014 7:36:40 AM

Not long ago, the use of email to transmit sensitive communications was a relatively rare practice, as the service had not yet started to become ubiquitous in the private and public sectors, but was almost solely popular among consumers. What's more, the hacking community has yet to become as aggressive or money-driven back in the early 2000s, whereas cybercrime is now a robust, multi-billion dollar industry in the modern market. 

Topics: Email Encryption and Services Communications Stay Secure Misc
2 min read

Updates on Data Security Regulation Overhauls

By protectedtrust on Jul 31, 2014 10:25:01 AM

Federal regulators from around the globe have become more aggressive in their reforms and privacy overhauls throughout the past several years, while this trend has been the direct product of increasing rates of data breach, fraud and identity theft that have crippled many businesses and consumers. In short, the traditional legislative frameworks that governed information management and privacy protection have been antiquated by the perpetual stream of advanced technologies.

Topics: Government
1 min read

Takeaways from New Ponemon Institute Study

By protectedtrust on Jul 30, 2014 10:05:29 AM

The IT security environment has been tumultuous in recent years, as more companies continue to struggle to gain a handle on network and data access controls while hackers appear to be having a field day. Regardless of size and industry, every organization needs to become a bit more comprehensive and proactive in its security deployments to begin reducing the threats of compromised networks, exposed sensitive information and other substantially dangerous issues.

Topics: Email Encryption and Services Stay Secure Misc
1 min read

Protected Trust Executive Earns Preeminent Healthcare Security & Privacy Certification

By protectedtrust on Jul 28, 2014 11:52:53 AM

Charlie Frayer, General Counsel and Chief Privacy Officer at Protected Trust, has earned certification as a Health Care Information Security and Privacy Practitioner (HCISPP).  HCISPP is backed by the International Information Systems Security Certification Consortium (ISC)2, a non-profit organization specializing in information security education and certifications, which has been described as the "world's largest IT security organization."  According to (ISC)2:

Topics: Announcements
2 min read

One Key Trend's Impact On Health Care Data Security

By protectedtrust on Jul 28, 2014 10:42:34 AM

Big data and cloud computing have had transformative impacts on the health care sector, enabling more intelligent use of massive information volumes and providing a more affordable and agile storage environment to handle modern electronic medical record systems. While these two technologies have certainly been the talk of the town in the past few years, another trend has been far more difficult to manage among most health care providers.

Topics: Healthcare Stay Secure
2 min read

In Focus: New Data Breach, HIPAA Notification Standards

By protectedtrust on Jul 25, 2014 8:30:33 AM

Health care providers have been called out for