Who’s Minding the Electronic Store?

I recently couldn’t fill a prescription online because the third party that processes pharmaceutical products for my drug plan was hacked. Little did I know at the time this would be an ongoing problem affecting a substantial part of our healthcare system. We’ll leave policy debates to others and focus on what we can do.

The hack was made at Change Healthcare, a subsidiary of UnitedHealth Group, that manages healthcare technology pipelines and processes 14 billion transactions a year. The company said ransomware criminals ALPHV, or Blackcat, had claimed responsibility for the attack but did not say whether it paid or negotiated a ransom. WIRED has reported a ransom payment of $22 million. The company said its investigation determined that Change Healthcare, Optum, UnitedHealthcare, and UnitedHealth Group systems have been affected.

The American Hospital Association has called it “the most significant cyberattack on the U.S. healthcare system in American history.” Providers can’t get paid for services provided, which affects their ability to pay their bills. They can’t preauthorize procedures or authorize payments for prescriptions. The tragedy is that a lot of people can’t afford to lay out the money for prescriptions, much less procedures. Pharmacies are scrambling for drugs. Treatment is not being provided.

But that’s not the end of the problem. Patient records – sensitive personal information – may have been compromised, and that’s another set of issues.

United Healthcare said it immediately disconnected Change Healthcare and started working with law enforcement agencies and cybersecurity experts. They instituted workarounds, including manual processes to submit information, check eligibility, look at claim status to make claims, clear prior authorizations, and fill prescriptions.

While most of us are nowhere near the size of United Healthcare, we can be ransomware targets and suffer just as significantly on our own level. And on our own level, we must be willing to make the necessary investments in our technology because we depend so much on its operating performance and reliability. A good plan to prevent problems looks something like this:

  1. Make sure all your hardware can run the most up to date software for your operating system, cybersecurity, and apps. For example, Microsoft will no longer support Windows 10 a year from now. You may need to upgrade to systems capable of running Windows 11. Newer versions of other software may not run on Windows 10.
  2. Have a documented process in place to make sure updates for operating system, security, and application software are automatically downloaded and installed on every piece of equipment in your office. You also need to verify the process is being followed.
  3. Have an emergency response plan with people trained to implement it as soon as a problem is detected. That plan may include disconnecting systems from the internet and processes to reconnect or work without full web-based capabilities.

We can help you by assessing your technology assets and liabilities; procuring and installing new technology; and developing an emergency response plan. Call us – 973-433-66776 – or email us for an appointment.

Living and Growing with Technology

We have kids and grandkids who have never known life without wireless technology, and now we’re moving on to AI. Whether you’re a business or a family with an array of technology comfort zones, there’s an array of paths you can follow to help you keep it all together.

I believe one of our biggest dangers with technology is online shopping. Did you see who had the most ads? According to my observations, it was Temu, the Chinese shopping site. What’s the red flag? There are two: 1.) data collection and 2.) legal recourse.

With every purchase you make, Temu collects a tremendous amount of personal data, including, of course, the credit card number you use to buy stuff. AI, which is really the use of superfast computers that can digest and regurgitate massive amounts of data, makes it possible to analyze every aspect of your shopping preferences. Even if you guard the privacy of your data persistently and diligently, some well-programmed AI can find out things you never knew about you. Conceivably, it helps Temu and similar websites present you with product choices and price points that will generate a purchase.

And because Temu is based in China, it operates under Chinese law, not US law. Not only will you not have the same legal recourse in China to protect you from financial loss, you likely won’t have the same regulatory protection about what data is collected and how it’s protected.

Another convenience we like is setting up automatic payments for products or services that are linked to our credit card or bank account. It’s a convenience for consumers and providers, and you can sometimes get a discount for automatic payments.

I dread the day my payment info gets hacked, and there’s no convenience factor that makes it worth the risk of being hacked. If you agree, there are two critical steps you can take to minimize your risk: 1.) Reset your login credentials for your financial accounts and the sites that draw automatic payments. 2.) Set up two-factor authentication (2FA) for every website account that offers it; biometrics and text messages to a device only you can access are best.

Biometrics can include facial recognition, and it offers the best combination of safety and convenience, especially for phones and tablets. Unless somebody has stolen your device and used your digital passcode to get into your settings and take a picture of themselves to reprogram your facial ID, only you can respond. Using a mobile device for a text is good because you should have the device in your possession for the authentication process. The use of authenticator apps such as Microsoft Authenticator or Google Authenticator is a good step.

Younger people typically take more easily to these new authentication methods, but those who are older or not entirely comfortable with technology should find them easy to use once they’re properly installed and configured.

Staying with the theme of age and technology, we have an elderly client who had some issues with a new computer. We tend to think older people are more comfortable with a computer, but we found the client preferred to have a second iPad. We associate iPad and iPhone use with younger people who can easily adapt to a different way of doing things with really quick thumbs. But there are keyboards for any mobile device, and those who use hearing aids can take advantage of Bluetooth with their devices.

The biggest challenge with using a tablet or phone in place of a computer is setting up ways to download, store, and use files with apps mostly associated with a computer. Multitasking is more difficult with a tablet or phone, but we can accommodate most needs for most people.

With tech playing such a large part of everyone’s business and personal lives, it makes sense to tailor the technology to the person rather than the other way around. If you or someone you know has special technology needs, call us – 973-433-6676 – or email to discuss ways to make technology work.

Nimble and Quick

Being nimble and quick is more a matter of knowledge than pure speed. By assessing a new client’s comfort level with technology and knowing what computer to buy and where to get it, we worked together on a holiday miracle. It took a lot of cooperation among parties who’ve worked together to make it happen.

Naturally, as you might imagine, the story begins a few days before Christmas – Dec. 20, at 4 p.m. to be exact – and it involved a new client who had been referred by an existing client. The client’s laptop computer had died, and they needed a new one. But the timing complicated matters. In addition to the holidays, we had a vacation planned during the week between Christmas and New Years Day.

From talking to the client, we learned their comfort level with technology, and we knew what type of laptop they needed, including all the performance specs. We basically had two days to get the computer to the client and have it up and running.

We have a trusted distributor who can get us the equipment we need fast, and they had what our client needed. They said they couldn’t have it ready – configured to the client’s specs – until the next day.

I didn’t have time for me to drive to their warehouse, pick up the computer and a printer, too, but the client was willing to get it late Thursday. They brought the computer to our office first thing Friday morning, and by noon, everything was set up, including the printer, and they were on their way. They still can’t believe they had new equipment purchased, configured, and ready for use in less than 48 hours.

A month later, we got an email from a client at 8:15 a.m., and we saw it 15 minutes later. The client had spilled tea on their laptop’s keyboard, and it didn’t work. We figured the tea probably shorted the electronics in the keyboard. Regardless, the client was leaving town later that day and needed something that worked.

We knew that the damaged computer was put in service in 2018 and determined that we could get a new one for the same price. But by that time, the client was in the air. We sent an email asking them to call us when they landed so we could explain the available options.

We recommended that we have the computer shipped directly to them. They called us when it was delivered the next day, and we walked them through the set-up process. By 5 p.m., it was completely set up, and the client was ready to do business.

The secret to pulling off both successes was knowing what resources were available, knowing the clients’ technical capabilities and being able to make decisions right away. Had they been working with a larger IT service company, their requests would have had to go through a chain of command to authorize the arrangements and go through a purchasing process. With our personal service, we dealt directly with the clients and the equipment suppliers.

If you or someone you know needs equipment immediately, if not sooner, call us – 973-433-6676 – or email us, and we’ll mobilize our resources.

A Tip to Speedup OneDrive

For the most part, the cloud is a safe place to store your files, but we have clients who prefer to have the files they’re working on stored on their hard drives. OneDrive is good for up to 150,000 files, but it can take longer than we like to retrieve files after you blast through that storage level. Here’s a tip to speedup retrieval: Use the Add Shortcut to OneDrive.

The Add Shortcut to OneDrive option does not sync anything to your computer; it just creates a link or bookmark to the document library or folder in your OneDrive for Business. This way, you can access the content from any device using the OneDrive app or website. You can also share the content with others more easily using OneDrive. However, you need to have an internet connection to access the content, and you cannot work offline.

The Sync option syncs the entire document library or folder to your computer using the OneDrive sync app. This way, you can access the content from your File Explorer or Finder, and you can work offline. Any changes you make will be synced automatically when you go online.

Just be aware that synching large libraries or folders can take up a lot of storage space on your computer and affect performance.

Microsoft recommends using the “Add Shortcut to OneDrive” option over the “Sync” option in certain scenarios. They include:

  • The document library contains a large number of files that would take up too much space on your computer’s hard drive.
  • You need to access the files from a device with limited storage space.
  • You need to access the files from a device that is not owned by you.

Just to recap, the “Sync” option downloads the entire document library to your local machine, while the “Add Shortcut to OneDrive” option adds a shortcut to the library to your OneDrive folder on your local machine. The option you choose depends on your specific needs and circumstances.

If you’re synching all your data now and want to set up the OneDrive shortcut, talk to us. If you don’t set up the shortcut properly, it could be the technology equivalent of following GPS directions off the road and into a swamp. You risk losing all your data, and that can be more expensive than just trying to fix a computer.

Call us – 973-433-6675 – or email us to set up an appointment to set up your OneDrive shortcut.

Do You Speak ‘Search’?

The New Outlook’s web-based email client has powerful search functions to help you cut through the sheer volume of messages we store and don’t always sort. Taking advantage of them will require you to learn about “search” language, which has its roots in Boolean searches that offer precise options to find information. They use AND to expand a search, OR to introduce options, and NOT to exclude information.

Boolean searches are rooted in an algebraic method developed in the mid-19th century by the English mathematician George Boole. It’s fundamental to modern computing, and today’s database searches are based mainly on Boolean logic, which allows us to specify parameters in detail. If you think of your email inbox as a database, Boolean concepts apply to your searches.

Fortunately, we don’t need to remember our high school or middle school algebra to search our Outlook inboxes. Cheap data storage (it really is cheap even if you balk at paying for it) lets us keep messages for years…and years…and years. We can have hundreds of thousands of messages in one big folder or dozens of subfolders across several email accounts.

In a typical search, you likely type in a statement (the instructions for the search) that consists of the sender’s name, and often you’ll see a list of options that ties the sender to a subject line or specific content. The computing power harnessed by AI presents you with choices based on what your computer thinks you are looking for. It’s not an efficient way to search your emails for specific information. It’s more like using terms like “hot” and “cold” when looking for a hidden object.

Using Boolean terms, you can give your computer more specific instructions. For example, if you have written me emails for advice on antivirus and malware software, you can pinpoint my responses by typing Norman Rosenthal AND antivirus into the search box. You can also type it in this way: Norman Rosenthal +antivirus.

If you’re not sure whether the subject was spelled antivirus or anti-virus, you can type in: Norman Rosenthal AND antivirus OR anti-virus. If we had email exchanges about antivirus software or malware and want to restrict it to just antivirus, you could type in: Norman Rosenthal AND antivirus NOT malware or Norman Rosenthal +antivirus -malware.

That’s essentially how Boolean searches can work in your email boxes, but they’re not the only kind of search you might need. You can use a statement to find all the unread emails in your inbox. Unread emails can cover several days and pile up when you’re especially busy.

Note that the same search techniques and languages apply to searching your Sent Items.

The New Outlook has removed Unread as a category of messages you can click on. But you can still find them by typing this into the search box: isread:no. This will give you a list of unread messages. There is also a prompt for unread messages when you open the search box, but the list may differ from the list generated by the isread:no statement.

With the increase in the use of email, email manageability and security will become more tightly intertwined, especially for offices with multiple people collaborating on servicing the same accounts, clients, or patients. Good practice for subject lines on outgoing emails will help manage searches for your inbox and messages you’ve sent. The subject line may also influence how email spam and security filters handle your email (see Quarantined Messages and Email Security).

We’ve hit the highlights here. Every organization or person has specific email handling needs. Call us – 973-433-6676 – or email us with specific questions about email management. We all have a ton of emails; don’t let them weigh you down.

Quarantined Messages and Email Security

You may be getting emails from Microsoft about quarantined messages and wondering what’s going on. The short explanation is that Microsoft’s email filters are getting better and that the company is trying to protect you from harmful attachments and links that can compromise your tech system’s integrity.

We typically don’t know about a message we haven’t seen until the sender contacts us because we haven’t responded to them. In today’s age of more sophisticated phishing campaigns, deep fakes, and more malicious code, we rely on our email systems, such as Outlook and Gmail, to protect us from ourselves with stronger filters. Too many people are careless about opening attachments or clicking links that lead to scams. Even the most careful person can fall victim to clicking on something they shouldn’t. So, Microsoft makes you take an extra step or two in hopes you will slow down and give more thought to the action the sender wants you to take.

It used to be enough to check your spam or junk mail folder in Outlook, and it’s still important with the New Outlook. As filters get more robust, more messages get diverted there, but, as the commercials say, wait, there’s more. You are likely getting messages from Microsoft that they have quarantined messages based on their parameters for determining if a message may be part of a phishing campaign or has a malicious link or attachment.

If you have Office 365, you won’t be able to access the quarantined message in your inbox. Instead, you’ll get a message with the following information for each quarantined message:

  • Sender: The email address of the sender of the quarantined message.
  • Subject: The Subject line of the quarantined message.
  • Date: The date/time that the message was quarantined in UTC.

You’ll also get a link. If you don’t understand what’s going on, you probably feel safer just deleting the message with the link. However, because the filters are more robust – based on an array of factors – you could miss a useful or important message.

Individuals and office administrators who use Office 365 as a web app can find their quarantined messages by clicking on this link: https://security.microsoft.com/quarantine?viewid=Email. It takes you to a Microsoft Defender page where you will see who each message was from and why it was quarantined. Messages are held there for 30 days. During that time, you can release a message, which will send it to your inbox, where you can open it and decide what you want to do. You can also delete a message directly from the quarantine page. We recommend you bookmark this link.

Of course, these security measures put an onus on senders, especially those who legitimately send bulk email, to ensure their DNS records are up to date and follow accepted anti-spam policies for outgoing mail.

We can help you by reviewing your incoming and outgoing email settings to maximize your security and email handling efficiency. Call us – 973-433-6676 – or email us to talk about it.