a

 


September
2013

In this
issue:

Welcome

Protect Small Business from Fraud and
Cybercrime

Patch Right and Keep Hackers Out

Avoid Repeating Yourself

Business Continuity Tip –

Welcome


Fall is just around the corner and so are a
couple of security events that might impact
your business.


For our medical clients who fall
under HIPAA, 9/23/2013 is the
deadline for incorporating the final
HIPAA provisions passed in January
2013. You will need to review your
existing policies and procedures to
include those changes. If you would
like to talk about this in more
detail, please call 541-779-4777 to
RSVP a spot next Thursday,
9/19/2013, here at Tekmanagement. We
will review these changes with you
and we will also have a free
Business Associate template that has
the updated language for your use.

 


For
our clients who deal with Credit Cards, the
PCI Security Standards Council is on track
to introduce Version 3.0 in November 2013.
There is a great “Change Highlights”
document you can download

HERE
.  We will continue to educate
ourselves as they release more information
so that we can help you comply with these
changes. PCI recognizes that after these
changes are published, it will take some
time to implement in your business. Version
3.0 will become effective on January 1,
2014, however Version 2.0 will remain active
until December 31, 2014. So, it looks like
you will have a year to adopt the changes in
your business.


A big thanks to all who helped or supported
those who worked on the fires this past
season!


Scott – President, Tekmanagement Inc.

Your comments are always welcome via email
at
scott@tekmanagement.com



7 Ways to Protect Your Small Business from
Fraud and Cybercrime
used with permission from SBA.gov
by Caron Beesley

How secure are your small business assets from fraud, identity theft and cybercrime?


According to the
Association of Certified Fraud Examiners (ACFE)
, companies with less than 100 employees lose approximately $155,000 as a result of fraud each year. Small businesses also have a higher fraud rate than larger companies and non-business owners. One of the most frequent sources of fraud is credit card abuse – largely due to the fact that few business owners actually take the time to go through every line item on their bill or choose to mingle business and personal accounts.

Read
More



Patch right and keep hackers out


used with
permission from HP Technology at Work

In the arms race between network administrators and hackers, battles are fought over the security holes in enterprise software. Your best defence is the patches that vendors release to plug those holes.

Vendors are working to make patching easier and more trustworthy – like Microsoft and its monthly Patch Tuesday release – but you shouldn’t necessarily deploy every patch to every system in your enterprise the day it’s released. To best protect your network, you should develop a plan for patching that is based on best practices and tailored to your unique enterprise.


Read
More




Avoid repeating yourself: Create a Word macro


used with permission from Microsoft
by Emily Warn

Repeatedly entering the same information in document after document, over and over…there has to be a quicker way, right? Word macros can save you time (and potentially, some sanity) by automating repetitive tasks.

Let’s say you’re a real estate agent. Every time you sell a house you have to add a client’s name and address to multiple documents. Creating a macro automates adding all of a client’s contact information wherever you need to.


Read
More


Business Continuity Tip
When Lightning StrikesSummer is the peak season for one of the nation’s deadliest weather phenomena – lightning. In the United States, an average of 53 people are killed each year by lightning, and hundreds more are severely injured. Agility has assembled the following resources to help prepare both your employees and your business.


  • Lightning Safety
    – Educate employees, friends and family on the dangers associated with strong thunderstorms and lightning.

  • Lightning Protection System
    – Install a lightning protection system (otherwise known as a “lightning rod”) to protecting your building and other assets.

  • Surge Protectors
    – To protect your electrical equipment, UL-listed surge arrestors should be installed on the main electrical service panel, as well as incoming phone, cable, satellite and data lines.

Just
for Laughs

Quote
of the Month


The first principle is that you must not fool
yourself, and you are the easiest person to
fool.

Richard
Feynman


Tekmanagement, Inc.

800 O’Hare Parkway  |  Medford, OR  97504
|  (541) 779-4777  |


www.tekmanagement.com