Docs use pen and paper after computers scrambled amid global outbreak Source: UK hospital meltdown after ransomware worm uses NSA vuln to raid IT <<UK hospitals have effectively shut down… Read more UK hospital meltdown after ransomware worm uses NSA vuln to raid IT →
…. And a load of them say they’ll keep using it in 2017 Source: 90 per cent of the UK’s NHS is STILL relying on Windows XP • The Register… Read more 90 per cent of the UK’s NHS is STILL relying on Windows XP →
Our new whitepaper regarding iTAM, the operating-system independent IT-Asset-Management solution, based on R&P renowned managed project office methodology is available. The MPO allows customers to perform a quick asset management analysis, regardless of operating systems in the network, data center or on-premise of the organisation. The underlying toolset allows much more than the iTAM asset-management. It is part of the suite that also does disaster recovery, patch- and release-management and backup- and restore automation. With the right dashboard, management can easily manage licensing issues and be informed about the state… Read more Assetmanagement iTAM for license-management – new Whitepaper available →
Innovecs is ready to help healthcare providers with customized tech solutions. Outsource the development of your CRM solution to our experienced team: Read more: When healthcare providers need CRM software development outsourcing Some of you have already seen that we took up a new mandate beginning of this month. We are proud to mention our new partner Innovecs, an emerging R&D-house with incredible growth speed has entered into a collaboration agreement with R&P. Especially in healthcare, reliability and dependability are key. The recent blog-post on healthcare CRM is a good… Read more When do healthcare providers need CRM software development outsourcing? →
This is the thing BPM often ignores – to the chagrin of both customers and employees. In the algorithms of any given BPM-implementation, there is a need to be able to overrule the machine by individuals and these individuals need to be entitled and properly empowered to do so. There are too many incidents in which an exception from the rule is called for but not catered for. Gregory Bufithis mentions this in his analysis of the case of the infamous UA airline incident: Southwest Airlines and its “hub social team” that… Read more How algorithms REALLY created that corporate nightmare at United Airlines – Gregory Bufithis →
“From what I understand they have tools to collect CDRs (Call detail record) that are generated on GSM core networks for billing purpose (who is calling who, etc.),” x0rz said. “They are deep into these systems.” There are more than 1,000 files included in the dump and it’s unknown whether any of the vulnerabilities being exploited remain unpatched. Read on here
Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago. Source: Security flaws in Pentagon systems “easily” exploited by hackers | ZDNet Not only for the Pentagon, it would be a great idea to install a suitable solution for Disaster Recovery (DR), just in case.
Applying IT Disaster Recovery/Business Continuity During the development of Security Policies for an organization that was at the beginning of a journey towards safeguarding their own (and their customer’s) data,… Read more The Ransomware-Attack Has Hit Us! Now What? →