Phoenix IT SupportPhoenix Computer Specialists are your local tech support specialists. Contact Us today for all your “Valley Of The Sun” IT and computer support needs.
Communication. On-site, e-mail, and telephone updates. The online service portal further helps facilitate the communications process.
Tell us about a specific experience with us that you were happy with.
Friendly, personal service. Midnight, middle of the week, I'm attending to a server error and Dave and Dianne show up because they "were just down the street."
What are the biggest benefits you've received or experience since hiring us?
1. Technical advisement. Staff is able to communicate with me at "my" level.
2. Weekly support, updates, and "TLC" (our machines and me!).
Fire Chief Jim Haner
Sun City Fire District
Medicaid Breach in South Carolina
We talk a lot about the kind of damage that hackers can do if they manage to infiltrate a company’s network. We talk about the havoc that someone could wreak if he stole or found a laptop with company information on it. But we often gloss over or completely neglect to mention the devastation that an unscrupulous or disgruntled employee can cause. Sadly, that’s a mistake that employers live to regret every day.
Department of Health and Human Services employee Christopher Lykes was arrested and, according to WMBF News, charged with “five counts of Medically Indigent Act confidentiality violations and one count of disclosure of confidential information,” for accessing and then emailing to his own Yahoo! email address the personal information of more than 228,000 South Carolina Medicaid recipients. The information that DHHS entrusted to Lykes contained the Medicaid recipients’ names, addresses and Social Security numbers.
No one knows where Lykes sent the information, why he wanted it or what he intended to do with it, all things that DHHS and the State Law Enforcement Division (SLED) are trying to find out. SLED has confiscated Lykes’ company and personal computers, including a laptop, as part of its investigation.
A hole in DHHS’ security system that allowed employees to gain access to sensitive information without having to justify why they needed access to it has since been closed, DHHS director Tony Keck told WMBF.
Incidents like the one involving Sykes serve as excellent examples of why companies need strict email monitoring policies and security measures that prevent employees from emailing, copying to a USB device, or even printing or downloading to their desktops or laptops, sensitive company or client information.
No one likes to feel distrustful of others. Unfortunately, not everyone is honest and trustworthy. So, those business leaders who are truly committed to the success of their businesses will heed the aforementioned cautionary tale and make haste to start plugging the holes in their own security systems.