The Meridian Blog: Tech News, Tips & More for SMB and Enterprise Environments

Five Best Practices to Avoid Common HIPAA Violations

Juliana Lee

Posted by Juliana Lee
Tue, Jun 06, 2017

Fines up to $1.5 million, loss of clients, and negative publicity are just some of the serious consequences of violating the 1996 Health Insurance Portability and Accountability Act (HIPAA).

The penalties for non-compliance are based on the level of negligence, and in some cases carry criminal charges that can result in jail sentences. HIPAA compliance is serious business, and when penalties are levied one of the main things taken into consideration is what, if any preventive steps were taken.

With that in mind, here are some basic best practices to implement regarding HIPAA compliance, including:

  1. Comprehension of the guidelines
  2. Training
  3. Guard against 3rd party disclosure
  4. Proper disposal methods
  5. Mobile device management

Read on to learn about each of these five best practices, and how you can implement them.

Read More

Why Your Association Must Build a Technology Roadmap

Jordan Arnold

Posted by Jordan Arnold
Tue, Oct 13, 2015

It’s critical that associations, non-profit organizations and businesses, alike, proactively document and maintain a comprehensive, technology strategy, or as we like to call it, a technology roadmap.

With new desktop, mobilevirtual and BYOD integrations, technology has the potential to be one of the most important allies an organization could have. But, if you don't have a clear plan or strategy for the future, technology could actually become a barrier to your organization's growth.

Your technology roadmap must incorporate your:

  1. People
  2. Devices
  3. Applications
  4. Data

Read on to learn more about why it's so critical for your association to have a technology roadmap, how often you should update it, and why it must include each of the four components listed above.

Read More

Five Mobile Security Myths Busted

Robert Bruce

Posted by Robert Bruce
Wed, Jul 01, 2015

One of the fastest-growing new trends in the last decade, Mobility has taken hold in both enterprises and SMBs — and it's not hard to understand why.

Combined mobile device use recently surpassed personal computer (PC) use, and this rapid adoption of mobile technology has led to a number of misconceptions and downright myths about their place in the office, as many businesses still lack a comprehensive mobile strategy. In an effort to dispel some of the fallacies about mobility in the enterprise, here is a brief look at several of the more common mobile myths.

Read More

5 Information Security Trends DC SMBs Need to Know About

Robert Bruce

Posted by Robert Bruce
Wed, Jun 03, 2015

Cybercrime is on the rise, and small-to-midsized businesses (SMBs) are increasingly becoming victims of data theft. There are several reasons why cyber crooks, hackers, activists, and even terrorists are focusing on smaller enterprises. Large enterprises generally employ more extensive and sophisticated security systems that monitor everything traveling across their networks. The Cisco Security Capabilities Benchmark Study, included in the Cisco 2015 Annual Security Report found that organizations with 500 employees or more are “more likely to have highly sophisticated security postures,” compared to smaller enterprises included in the study.

Read on to learn more about:

  1. IT security trends
  2. Hidden vulnerabilities within your organization
  3. How can you address such vulnerabilities
  4. And more
Read More

Top 5 Office Technology Blogs of April 2015

Claudia Alvarez

Posted by Claudia Alvarez
Thu, May 14, 2015

April was a month of variety and pleasant surprises for our readers. We covered all the way from BYOD to the introduction of our new Sustainability Solutions. So, without further ado, check out our top blogs of April.

Your Biggest Threat to BYOD Security Could Be Your Employees

Posted by Jan Carreon on Tue, Apr 21, 2015

When the cellular phone was first introduced, it served only one purpose — to make and receive phone calls. Over the years, we have watched the device evolve and incorporate more and more features. Its evolution changed the way we communicate with texting, video chatting, and email capabilities. It has replaced everyday items such as watches, calendars, the boom-box, CD/mp3 players, books, and cameras. It’s next victim? The wallet.

A cellular device is arguably a one-stop shop for almost everything, and a necessary tool for professionals today.

Mobile devices are a staple in today’s world, contributing to the rise of BYOD (Bring Your Own Device). By now, you are probably well aware of some of its advantages and disadvantages. One of the biggest concerns of BYOD is security, with the largest threat arguably being a company's employees. Here are the ways employees are unintentionally making sensitive work data more vulnerable to a breach.

Read on to learn more!

Read More

Your Biggest Threat to BYOD Security Could Be Your Employees

Jan Carreon

Posted by Jan Carreon
Tue, Apr 21, 2015

When the cellular phone was first introduced, it served only one purpose — to make and receive phone calls. Over the years, we have watched the device evolve and incorporate more and more features. Its evolution changed the way we communicate with texting, video chatting, and email capabilities. It has replaced everyday items such as watches, calendars, the boom-box, CD/mp3 players, books, and cameras. It’s next victim? The wallet.

RELATED: What Does Apple Pay Mean for Security and Business in Washington, DC?

A cellular device is arguably a one-stop shop for almost everything, and a necessary tool for professionals today.

Mobile devices are a staple in today’s world, contributing to the rise of BYOD (Bring Your Own Device). By now, you are probably well aware of some of its advantages and disadvantages. One of the biggest concerns of BYOD is security, with the largest threat arguably being a company's employees. Here are the ways employees are unintentionally making sensitive work data more vulnerable to a breach.

Read More

A 5 Step Mobility Plan for Small & Medium Businesses in Washington, DC

Robert Bruce

Posted by Robert Bruce
Tue, Apr 14, 2015

The work environment is changing.

Few of us still work in a TV sitcom setting like 30 Rock or The Office. The days of being chained to a desk are rapidly evolving into a mobile workplace where we're rarely tethered to more than a tablet, laptop, or smartphone. In fact, it's estimated that about 38% of the world’s workforce will be mobile by the end of this year, if not more.

Nearly all industries, from health care, to legal, to construction and more, now find themselves out of the office and “in the field.” Yet, most still must keep up with paperwork, participate in meetings, and give and receive feedback. Large enterprises have been adapting for years, so how do small to mid-sized businesses in our nation's capital keep up?

It takes a strategy to successfully move from the stationary 20th century office to today's mobile workplace. For an SMB without the strategic direction of a CIO or VCIO, a consultation with a managed services provider (MSP) is a great place to begin.

To create a similar framework to that of large enterprises on their own, SMBs should follow these five steps:

  1. Needs
  2. Infrastructure
  3. Implementation
  4. Preparation
  5. Documentation

Read on to learn more about each of these vital steps.

Read More

Managed IT Services are the Answer to DC's BYOD Security Challenges

Robert Bruce

Posted by Robert Bruce
Thu, Oct 16, 2014

In my lifetime, I have seen some big changes in information technology. And, like most learning curves, each innovation feeds the next wave of discovery and application resulting in exponential growth.

It took a long time from the invention of the typewriter in the 19th century (no, I was not alive then) until word processing and personal computers arrived in the 1980s. It took a lot less time for the Internet to enter the modern office. Now, in less than a decade, mobile devices have become the norm in most offices.

I don’t know what The Next Big Thing will be — wearable devices, ubiquitous videophones, nanotechnology, who knows? But, I bet whatever turns out to be the next wave of IT office tools, it will be mobile. Which means that managed service providers (MSPs) will need to not only service their clients’ current needs, but to anticipate their future priorities.

Read on to learn more about the new challenges that come along with mobility and BYOD, and how Managed IT Services can help businesses manage and meet those new demands. 

Read More

What Does Apple Pay Mean For Security and Business in Washington, DC?

Juliana Lee

Posted by Juliana Lee
Tue, Oct 07, 2014

There is a lot of buzz about Apple Pay and its potential applications and implications. Personally, I wish they had called it "iPay," but unfortunately they didn't consult me about the name.

Many speculate that Apple Pay will revolutionize the payments industry and may even replace traditional wallets. However, others report on potential security and business implications that could hinder its success.

As one of many early-adopters who pre-ordered an iPhone 6, I decided to dig deeper into the news and rumors about the soon-to-be-released Apple Pay. Overall, the outlook for Apple Pay seems promising, but will it live up to the expectations and actually catch on?

To me, it sounds great—I could ditch my traditional wallet and free up some space in my purse? Sign me up! But, in recent years, plenty of other mobile payment methods have come and gone—think of the credit cards that only require a "tap" on card readers, key chain sized cards, Google Wallet, and others. If none of those novel, convenient payment methods took hold, what makes Apple Pay different? The jury is still out.

Read on to learn more about how Apple Pay will impact DC businesses, including security benefits and concerns, as well as implications for BYOD.

Read More

Mobility and Cloud Computing: a Natural Fit, but Enterprise Policy Needed

Juliana Lee

Posted by Juliana Lee
Tue, Sep 02, 2014

It is no coincidence that the rapid expansion of cloud services and the near ubiquitous presence of mobile devices has occurred virtually simultaneously. To me, the two go together like strawberries and cream, peanut butter and jelly, Hot Tamales and popcorn at the movies. There is a synergy to the two technologies that is fueling a communications revolution. But with the convenience of having our data travel with us, comes a price.

Read More
1
2

Leave A Comment

About this blog

News, best practices and more to help you get the most out of your office technology. Whether you're an SMB owner who wears a lot of hats, or an enterprise IT director, facilities manager or just someone who wants to work smarter — this blog has the resources you need to maximize the business impact of all your tech investments. Be sure to subscribe to receive email updates about new posts!

Download our eBook

 
DM_Workbook_Cover_Page.jpg

Download

Sort Posts by Topic

see all