Beware of Ransomware in Healthcare

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >POTENTIAL EFFECTS OF RANSOMWARE IN HEALTHCARE</span>

Ransomware impact the safety of patients in healthcare. Ransomeware infects a PC and restricts access to the infected PC by encrypting most files. Ransomware is an easy source of revenue for cyber criminals. So what are the impacts of ransomware attacks? If PCs are not functioning or there are delayed information access, it could cause patient safety concerns and information. Caregivers try to treat patients and consider the difficulties they would encounter if their PCs were not functional, rendering no access to the electronic medical record system.

Below are some of the potential impacts of ransomware:

  • Patient medical history inaccessible.
  • Patient medication history unavailable.
  • Lab orders delayed.
  • Lab results stalled.
  • Prescriptions postponed because they cannot be ordered electronically
  • Medical devices inoperable.
  • Monitoring PCs impacted.
  • Potential public relations controversy – What if the staff can no longer access the application that tracks location of patients. What if that patient passes before the family can see them?

Prevention What can organizations to do protect themselves from ransomware?

  • Put strong technologies in place to prevent and detect threats.
  • Educate the workforce.
  • Make sure IT, security and other staff or partners are trained in prevention, detection and incident response.

Bottom line: have contingency plans. Organizations need to invest in cyber security and education versus the cost of using papers and pens.

For more information – read our full article around ransomware in healthcare –


Join Our Regional Roadshows!

JV2016.1010_RdShow_EmailHdrAnnouncing our 2016 Roadshow Program!

Technology is constantly changing and 2016 is no different. These regional roadshows offered in California, Chicago, Texas, and New York are the perfect platforms to bring together IT thought leaders and decision makers in a fun and unique setting. With a different format and regional flair, each roadshow will feature a diverse customer experience.

Best of all, we bring live solutions to you! In the world of technology, knowledge is power—these Roadshow events keep you at the forefront of technological innovation.


West Coast Texas Great Lakes New York City
Format: Brewery Tour Format: Texas Two Step Format: Cubs v Dodgers game Format: Night of Solutions
Focus: Virtualization and Security: Overcoming the Risks Focus: Security and Data Center Solutions Focus: IT Security – working solutions Focus: Emerging Vendors/Emerging Technologies
Date: April 27-28 2016 Date: May 5 Date: June 2 Date: June 23
Location: Orange County, CA Location: Houston, TX Location: Chicago, IL Location: New York City

We look forward to your participation!

Wireless Networks might be the most vulnerable when it comes to security.


In a wireless network there are a number of settings and facilities that can be utilized to increase the level of security and reduce the possibility of your data or network being compromised.

  • Netwave® units are shipped in a default condition with a number of fields set with generic strings. The Administrator “Username” and “Password” strings should be changed to prevent unwanted access to the configuration and management interface of the devices.
  • The SSID (Service Set Identifier) is a name broadcast by the Access Point allowing Clients to detect and connect to that Access Point. The SSID transmission can be disabled meaning that a Client must be provide the SSID of the Access Point before it will connect to it.
  • To secure the traffic flowing across a wireless link, encryption techniques can be employed. At ComNet would advise the use of WPA2 (Wi-Fi Protected Access) encryption running the AES (Advanced Encryption Standard) cipher.
  • The Access Point can also be preloaded with allowable MAC addresses and then it will look to block all other. In either point-to-point or point-to-multipoint systems both the traffic flow of Client wireless units and their devices can be managed based on their associated MAC addresses.

For more information, visit

Join us for the 9/18/15 Security Briefing Webinar


Event: Security Briefing Webinar: 7 Major security trends you should be aware of

Presented By: David Stelzl, speaker, author, and coach in high tech sales & marketing strategy

Date and Time:
Friday, September 18, 2015 @ 1:00 pm Eastern / 10:00am Pacific

Duration: 1 hour

“7 major security trends you should be aware of”

Are you talking about the most important thing to you clients right now? Hint, it’s not managed services.

Your clients are moving to the cloud, connecting everything to the Internet, and going mobile in every way imaginable – Gartner expects 80% of small and medium businesses to be on some form of cloud technology within 5 years. The big question is, “How safe is their data?”

Find out exactly what big company boards are asking their CISOs for right now, and what every small and medium business leader must have before they can make a decision to add more budget to security.

In this one hour workshop, I’ll be showing you 7 major trends and how both large and small businesses are being affected. Second, I’ll show you the one big mistake just about every company is making as they transition to new technologies to grow their business. Finally, we’ll cover several critical mindsets that must change if companies are going to keep their data out of the hands of cybercriminals, hacktivists, and nation-states.

All attendees will be entered into a drawing to win a $50 Amazon Gift Card.

Register Here:

Save your spot today! Make sure to register via the above link!


2015 Q2 Vendor Promotions

Ingram Micro brings you savings on the latest products and solutions from our top manufacturer partners. Here are this quarter’s (Q2 2015) rebates and promotions (click on links to access the promotional flyers):

Check Point

Flyer: Check Point – Q2 Promotions


Flyer: ESET – Q2 Promotions


Flyer: Fortinet – Q2 Promotions

Intel Security / McAfee

Flyer: Intel Security – Make the Move


Flyer: IOGear – Mobility for Android Promotions

Flyer: IOGear – New KVM Promotions

Flyer: IOGear – Q2 Promotions


Flyer: Jabra – More Margin Madness Promotions

Flyer: Jabra – Trade In Trade Up Promotions

Juniper Networks

Flyer: Juniper Networks – Q2 Promotions

Kaspersky Lab

Flyer: Kaspersky Lab – EDU Partner Promotions

Flyer: Kaspersky Lab – IM Partner Incentive


Flyer: ShoreTel – Starter Kit Promotions


Flyer: Symantec – NAM Promotions


Flyer: Verbatim – National Promos June 2015

Flyer: Verbatim – Q2 Promotions

Are your customers protected from the 7 Deadly IT Sins?

These 7 crucial security areas are often overlooked, creating weak spots that hackers love to exploit— putting your customers’ network and data at risk.

The Seven Deadly I.T. Sins

  1. Mobile Negligence: Managing and securing mobile devices is more than just important these days. It’s vital. Those flashy little devices in your users’ pockets are windows into their organization.
  2. Mac Malice: Hackers have malicious plans for Macs. New Mac Trojans, adware and ransomware threats are emerging every day, plus Macs are increasingly used to host and spread Windows Malware.
  3. Unsecure Wi-Fi: Employees and guests are connecting to the wireless network, but are there demons on their devices? Wi-Fi is a must but if it’s not secure the organization’s data and network is at risk.
  4. Unencrypted email: Sending unencrypted email is like sending a postcard in the mail – anyone with the means and motive can access it.
  5. Faulty Firewall: A company’s firewall is its first defense. So if it can’t keep up or is too complex to use effectively, it’s a Deadly IT Sin.
  6. Unencrypted Files: Data breaches are constantly hitting the headlines, leading to big fines and even bigger reputation damage.
  7. Delinquent web filtering: With 80% of all web malware hosted on compromised legitimate websites, simply blocking undesirable categories of websites is not enough.


Check out the 7 Sins today and learn how to secure organizations against them.

WEBINAR: Capture the Huge Security Driven Network Refresh Opportunity by leveraging Lancope

WEBINAR: Capture the Huge Security Driven Network Refresh Opportunity by leveraging Lancope

Wednesday, November 12, 2014

10:00am – 11:00am Pacific (1:00pm – 2:00pm Eastern)


Learn how Lancope and their partnership with Cisco can help you capture the $2B worth of existing network refresh opportunity by leveraging the power of Netflow and Lancope’s Stealthwatch. Jeff Edwards, Global Distribution Director for Lancope will show you how.

We will be announcing exciting new security driven network refresh bundles designed to make it easy and compelling for you to update and secure your customers existing infrastructure.

Register for this valuable webinar today to save your seat!


*Webinar attendees will be entered into a raffle drawing to win a $50 Amazon Gift Card after completing post-webinar survey.