How SECURE is Your Email and Patients’ Protected Health Information (PHI)?

Thursday, December 18th from 12 – 1 p.m. 

We will cover everything you need to know about e-mail security, HIPAA requirements, how to keep your e-mail and information safe, and we will be answering the questions you most want to know! Please click the link below to register, as well as submit specific questions you have about secure e-mail and keeping personal health information safe!


Viruses are like cobwebs in your house–you can never keep them out completely but with regular dusting you can do a lot to avoid or minimize them. Cryptowall is the latest in a string of ominous-sounding viruses making the rounds. It is a Trojan Horse, popping up as an innocuous-seeming e-mail and infecting a network by tricking people into installing it themselves.

worried woman

The most important thing to remember when dealing with viruses like these is to never download attachments that you aren’t expecting. Even if the e-mail appears to be coming from someone you know, if it is vague or there isn’t a reason for them to be sending you an attachment, double check that it is legitimate. A quick phone call can save a lot of headaches down the line. There are a few common e-mails circulating to watch out for in particular. Click through the gallery to see some examples.

Once a computer is infected, the virus begins by establishing a network connection to remote servers where it uploads connection information like the IP address, location, and system information from the infected machine. It then creates encrypted copies of all files, deleting the originals and leaving an encrypted version in its place in an effort to extract money for the decryption key. The virus expands beyond just a local computer, hopping onto files located on other drives–such as external hard drives, cloud-based storage that saves a local copy of files, and network shares (any drive that has been assigned a letter).

Once your drive has been infected, you will typically see three files in every directory with encrypted files:


Ethernet cable into computer

You may also see error pop-ups or data that looks garbled when attempting to open an encrypted file. If you believe your computer has been infected by this or any virus, IMMEDIATELY DISCONNECT YOUR COMPUTER FROM THE NETWORK! Just pull the network cable right out of it. You should also perform regular backups, stored offline, and maintain your anti-virus software.



MVP is a technology company based in Western New York that helps its partners achieve there corporate goals through the intelligent use of technology for over 10 years. MVP helps businesses like yours create the strong communication foundations needed to ensure success. We build reliable voice and data networks that secure sensitive company data, promote organizational growth, improve team productivity, and generate competitive business advantages. 

Our goal at MVP is to provide technical consulting services that identify critical business needs and proactively develop long-term solutions that are affordable and ensure the needs of your business are put first. 

MVP area of expertise focuses on 4 areas of technology. 

1. Telephony Solutions – MVP is an AVAYA Partner and also offers HoPs (Hosted Office Phone System) 

2. Managed IT Services – MVP provides Managed IT support and maintenance for any size network with end-user help-desk support. 

3. Cloud Computing – MVP offers Public, Hybrid and Private cloud computing solutions custom tailored to your specific needs. 

4. Development Services and solutions – MVP has the development expertise in house to help you evaluate your business process and implement an ERP solution that will streamline your operations. MVP has also developed a custom hosted software solutions for the funeral business. MVP is a SAP Business One partner. 

MVP show you how your IT should be managed and converged to work together in a cohesive network environment.