Wednesday, May 30, 2012

Power Cords for Laptops - Are they all the same?

If you’re like me, you rely heavily on some sort of a computer for work and/or play.  For me, my “computer” comes in the form of a laptop, iPad, and iPhone.  You could say I have at least one of these devices on me at all times.  Of course, I use my laptop for the heavy lifting – it’s portable and convenient.  One of the most important laptop accessories is a power cord.  There’s nothing more frustrating to me than to run low on battery power and not have my power cord.

Believe it or not many users have more than one power cord.  Power cords are pretty lightweight and easily fit in small spaces.  So having one at home and another at work or in the car or in your briefcase or luggage is very sensible.  That way you are sure to have one whenever you need it.
These days, a fully charged laptop battery will last approximately two to five hours.  Odds are, sooner or later you will need to rely on more sustainable power.  Not only can a power cord keep your laptop up and running at peak performance, it can also protect it in case of a power surge.  And of course it enables you to charge your battery. 

Just as not all laptops are made equal, power adapters have varying voltage outputs.  Using the wrong laptop adapter can damage your computer.  Even though a Dell power cord may fit in your HP laptop, it doesn’t mean it will work properly.  Different laptop models have different power requirements.  

If you are going to buy a power supply, getting the right one is crucial.  If you like to “live on the edge” and save some money, you can shop around to find one that will fit your needs.  What you need to know is that power adapters are rated for voltage and current.  You might see a power supply rating such as 15.6 V/8A.  Basically, you need to make sure the voltage output is the same and the current is the same or above the power requirements.  For example, if your current power supply has a rating of 15.6 V/5 A, then a 15.6V/8 A is a suitable.  That is, as long as the connector is the same as well – meaning it’s the same size and polarity and doesn’t wiggle when it’s connected. 

Although purchasing a power cord from the original manufacturer can be more expensive, they are usually made of higher quality and better materials.  And some even come with a short warranty to ensure that they work properly.  Find the model number on your current power adapter or use your laptop’s model number to find the correct power supply from the manufacturer.

All power cords are not the same so take time to find which one will work best with your device. Sometimes power cords do seem overpriced, but for many people who are always on the go, the price is small compared to productivity.  

If you are in the market for a new or replacement power cord and would like some help, give Kardon Tech a call.

Wednesday, May 16, 2012

Where is the next data breach?

                Data security is the ever present concern for the health industry. Doctor/Patient confidentiality is imperative for medical personnel. With recent changes to HIPAA regulations and the HITECH Act, as part of the ARRA stimulus, have brought the importance of data security back to the forefront of medical concerns.
                In recent years, we have also seen that it is a concern that can never be taken for granted. An analysis from on data breaches documented by shows that security breaches in the healthcare industry dwarf the number of breaches from other industries. And, those breaches have increased in recent years.
                It is also important to note that these breaches have come from many different directions in many different forms. Magnetic data tapes were stolen from a GRM Information Management Services’ vehicle in New York city, in another situation a laptop containing medical information was stolen from the Sutter Health Foundation in Sacramento, and health records were downloaded from a server in Utah’s Department of Health. Data breaches can hit close to home, as well. Emory released information about a data breach connected to misplacing 10 backup disks affecting more than 300,000 patients. Unfortunately, these breaches are not unique, either. More than a hundred data breaches with similar stories are found across the countries from government offices, hospitals, data management companies, doctor’s offices, and billing companies.
                Just from the above listed scenarios, we see that personal and medical information related to nearly 8 million patients was breached through hacking, thievery, and laziness and from multiple mediums (backup tapes and disks, office hardware, and cyber information). These events highlight the importance of security in all manner of data management. Computer hardware should be secured and monitored. Backups need to be stored securely. Old data should be decommissioned in a safe and secure manner. And, password management continues to be often overlooked.
                These data breaches can cause lost contracts and lawsuits (as is the case with GRM Information Management Services) and add billions in costs to the healthcare industry as security efforts continue to rise. It is important to note that any company associated with the healthcare industry is at risk. Companies should not allow themselves to relax thinking that only big companies or hospitals are targeted. Improper data security connected with one backup or one disgruntled employee can leave a company vulnerable to fines and lawsuits.
                The development of a security plan and security controls can be intensive and overwhelming, especially for smaller companies. Kardon Technology provides the assistance required by companies that do not have a fully-staffed compliance department to help with the ever changing data security environment.
                These security and compliance plans help tackle all avenues of breach protection from basic computer protection through patch management and antivirus control to advanced backup protection (with Managed Online backup) and user control management. And, with the available Risk Analysis, we can monitor known vulnerabilities, as well as identify possible security flaws.  Contact Us to schedule your HIPAA/HITECH Compliance Readiness complimentary evaluation.