Home

  
 
 

Search Knowledge Base


Knowledge Base Web View
Total Records: 103
ID Title Type Of Article
1024 
Setup Access to Compliance File Manager on SI Portal How To
993 
5 things customers want from their salesperson Sales and Marketing
778 
TPM Installed on Cheetah requires correct BIOS Version How To
730 
Parallels Connection Mode Change How To
728 
Cell Phone Policy for Conference Rooms and Meetings Company Policy
723 
Office 365 Appointment Feature Meeting Poll How To
722 
Managed Services Program Descriptions - Elite, Live, Guard How To
712 
Windows 10 multiple display - windows are moved and resized on display power cycle or sleep Support
694 
QuickBooks Stop from retaining Last Logged-In User on Startup of QuickBooks How To
687 
Fix for Error Call to GetCustomUI() for RibbonID "Microsoft.Excel.Workbook in Engage OLE" Support
675 
Browser Emulation Settings in the Registry allows IE version for specific applications How To
671 
Use Eversign with Engage for Digital Signatures on Quotes, Work Orders, Invoices and More How To
660 
3CX Client How to setup Auto Status Change on Workstation Idle How To
649 
Engage Online Portal Export Reports to Excel How To
643 
How To Find PC Name How To
599 
Consumption Marketing a function Consumption Economics: The New Rules of Marketing Case Study
598 
Dynamic Resource Allocation Strategy Workforce Management Case Study
597 
Hyper-Converged Threat Initiative IT Security Strategy Case Study
596 
Cyber Security and My Cloud Applications: Am I safe? Case Study
595 
What value does Data-Tech bring to a Cloud Provider Partnership? Case Study
594 
The solution was extremely reliable and the process couldn’t be simpler. Case Study
593 
Emergency Services Turn to 3CX Voice Over IP Phone System after Hurricane Strikes Case Study
592 
Kaseya VSA Over Other Tools What it Means for Our Clients Case Study
591 
Data-Tech Chooses Kaseya Over Major Competitor After Three Month Evaluation Case Study
590 
Tew and Associates Migration to Managed Services and Cloud Solution Case Study
Add New  Records per page  2 of 5   
Engage Knowledge Base Web View         Case Study          Print
Title Managed Security Services recovers stolen medical equipment for client      
Resolution
Case Study: VMS recovers stolen medical equipment for client
 
Case: Ex-Contractor for large medical group steals computers and medical equipment from a remote office. Data-Techs Versa Managed Services program was able to locate the stolen equipment and arrange for law enforcement recovery of all equipment along with verification that no sensitive security data was accessed or compromised.
 
Note: For security access to the client name in this case study has been kept confidential.
 
CTO for the client: "Data-Tech was amazing and helped us recover all the stolen equipment within 24 hours. The service provided by the specialized Versa Managed Services was invaluable to our recovery and verification that our sensitive data had not been accessed."
 
When a large medical group approached Data-Tech about a security review Data-Tech jumped at the chance to compare our Versa Managed Services program to one of our competitors.  Data-Tech immediately engaged the *Cyber-CATS engineering division of Data-Tech for a comprehensive security review.
 
The Cyber-CATS security review was able to show the medical group they were not fully leveraging the capability of managed services. Cyber-CATS were also able to expose several potential security risks that were easily addressed with the Versa Managed Services Security System.
 
The medical group was impressed with the Cyber-CATS and the security review.  An IT Management Transition was scheduled and the medical group was further impressed with the predefined Security Lockdown Protocol designed by the Data-Tech Cyber-CATS engineers.  The ability to do an overnight roll-out of automated protocols to change passwords, block open ports, disable remote control protocols and disable all known remote access software within a 30 minute time period for a smooth and secure IT Services Transition for 59 servers and 800+ workstations over 40 locations impressed the large medical group.
 
Recovery of Stolen Equipment
12 months into the service agreement with Data-Tech the large medical group experienced a break-in and theft at one of their remote offices.  Several computers and expensive medical equipment devices were stolen. The IT Director called Data-Tech's VMS 24 Support Hotline to see if the engineers could invoke the Remote DoD wipe protocol for the computers that were stolen to protect the data for HIPAA compliance.
 
*The Remote DoD wipe is a custom protocol script Data-Tech created to enable a Remote Department of Defense compliant cleansing of the hard disk.  DoD compliant fills the drive with 1's and 0's so there is 0 chance of Data-Recovery.
 
The support engineering team decided to do a location test first on the equipment.  They found one of the stolen computers stolen was Online with the Versa Prime server. The team was able to retrieve the local IP address of the workstation and lookup the Internet Provider. The Team then contacted the Internet Service Provider for an address to the location.  The Team had to conference call with the client's CTO and were able to get authorization for an address to the location of the online workstation. Local law enforcement was dispatched to the location given by the Internet Provider.  
 
The police were able to capture the criminals in the act of using the computer. They were also able to recover all of the stolen computers including all the medical equipment stolen from the office.  
 
The CTO remarked that the insight from the Data-Tech's engineering team to locate the equipment using the Versa Managed Services instead of simply wiping the hard drives allowed the medical group to recover all the medical equipment valued at over $250,000 dollars.
 
For HIPAA compliance the medical group had to report the equipment stolen.  HIPAA compliance states medical groups must not only report theft but must provide proof that no confidential data was accessed or compromised.  Through the Data-Tech Versa Managed Services program the engineers were able to run an Audit Report to verify no critical or confidential data was accessed or compromised.  Data-Tech's knowledge and experience with HIPAA compliance played an important role and allowed the team to be prepared for specialized compliance reports required.
 
CTO - "This Audit Report alone saved the medical group a potential HIPAA Security Fine in excess of 1 million dollars."
 
The Data-Tech Engineers and Cyber-CATS division engineers provided outstanding pre and post implementation services for this medical group and were praised by the principals for service above and beyond expectations and their knowledge and insight for the specialized needs of a large medical group.
 
 
 
*Cyber-C.A.T.S. - Computer & Advanced Technical Services
Cyber-Cats, a specialized division of Data-Tech, is an elite team of technical innovators focused on enhancing existing *cyber resources to advance business intelligence, operations and objectives. Merging multiple aspects of technology with people into an integrated solution for business by combining Hardware, Software, People and Automation. Cyber-Cats create a symbiotic relationship between Business, People and Advanced Technology.
 
 
Vendor *
Web Link
Date Entered 4/3/2019
You Tube Link
Type Of Article Case Study
Article ID 580


  Copyright    Lietz Development, Inc. 1996. All Rights Reserved.