For some businesses, employee downtime caused by interruptions in the IT infrastructure is recognized instantly as unacceptable. In a healthcare practice, for example, network access to a patient's medical records must occur without fail every time a practitioner requests them. A legal practice must be able to view case files located on a business server while in the courtroom or the success of the case could be jeopardized.
As a small business owner, you might not realize how little bits of employee downtime throughout the year can really add up and affect your bottom line. One day a printer goes offline for the afternoon and employees have to scramble to find other ways to output their documents. Then a major business application fails to load because security patches weren't applied. Perhaps a shared server drive goes down and employees can't meet an important project deadline because they can’t access their data files. It could even be something as insidious as waiting a few minutes longer each day for the computers to boot up and the programs to load.
Do these scenarios sound familiar to you? When your network does not perform to your expectations, your business suffers from employee downtime. This costs your business real dollars which can be quantified. Do you know how much just 10 minutes of downtime each day can be costing you? Find out by clicking here.
Healthcare Providers Finally Spending for IT Network Security
For healthcare providers, 2015 was the year of massive security breaches. 2016 was the year of costly ransomware attacks. Finally, it appears that 2017 will be the year healthcare providers take a stand and shore up their IT defenses to stop the continual cyberattacks on their networks and patient data. "While healthcare has long underfunded IT security compared to industries like finance and manufacturing, that trend is changing dramatically," said information security and privacy expert Larry Ponemon, chairman and founder of the Ponemon Institute. This organization is seeing that some IT budgets in healthcare are doubling that of last year. Join the movement. Call eNet Systems today at 281-403-9561 to strengthen the security of your IT network.
Samsung Factory Catches Fire
As if we needed further proof that the overheating / explosion-prone Samsung Note 7 batteries were a problem, some of them combusted in a factory and caused a fire. According to online and local sources, the fire in the Samsung SDI factory (which actually developed some of the faulty batteries in the Note 7) was caused by a pile of discarded batteries in its waste facility. The production area of this factory was unharmed.
HP Battery Recall Grows
Speaking of overheating batteries ... HP has expanded its battery recall that began in June. Another 101,000 HP Notebook Batteries have been recalled with the model numbers: 6BZLU, 6CGFK, 6CGFQ, 6CZMB, 6DEMA, 6DEMH, 6DGAL, 6EBVA. If you own a HP ProBook, HP Envy, HP Pavilion, HP 200, 400, 600, 1000, and 2000 series, Compaq Presario, or Compaq CQ series laptop purchased during March 2013 and October 2016, you could be affected. Remove the battery, return it to HP and use AC power in the meantime.
Acer Aspire Switch 11 V
This midrange detachable-hybrid tablet has earned the Editors' Choice award from PCMag.com just as its predecessor, the Acer Aspire Switch 11 did. This model is faster, slightly slimmer and now comes with Windows 10. It's also more affordably priced at $599. This hybrid can be switched to four modes: Notebook mode (keyboard attached), Tablet mode (keyboard removed), Display mode (keyboard attached but backwards, behind screen) and Tent mode (upside down for movie viewing).
Check your Twitter Security Settings
With all the attention that President Trump's Twitter account has received, perhaps the most startling is how vulnerable it is - at least his new @POTUS account, along with @FLOTUS and @VP. According to online sources, they are at risk because they haven't selected a very basic security feature that requires the user to provide a phone number or email address to reset the password. Currently, the security setting in place for these accounts allows anyone to click on "forgot password" and type in the user handle. The following message says "we found the following information associated with your account" and gives a partially hidden email address to which it will send a password recovery link. If a hacker can guess that password and breach that email system, the hacker also now controls that Twitter account.