Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ......

5
This year’s Annual IT Conference, Back to the Future, was held on December 3, 2014 at the Crowne Plaza, James- burg, New Jersey. Con- ference speakers and presentations spanned a range of challenges that behavioral health providers face. June Noto, COO and Direc- tor of the IT Project, said, “Our goal is to help our nonprofit member organizations be bet- ter prepared to serve their clients – whether it is in the aftermath of a natural disaster or by adapting to ever-changing technology – and we selected our speakers and presenters with that goal in mind.” Followig is a short summary of some of the key speakers and presentations: To start off the day, the Keynote Speaker Dennis Morrison, Ph.D., Chief Clinical Officer of Netsmart, brought the audience through the growing pains of technological innovation with his presentation, The Role of Disruptive Innovation in Health Care. He discussed various cultural changes throughout history and some of their effects on established behavior. Citing innovations such as the printing press, radio, TV, iPhones and the Uber cab, Dr. Morrison explained how those innovations were met with resistance to the changes they cre- ated. This progressed to discussing the increasing consumer drive for using online apps for many health needs. As health applications’ popularity increases, so does the ability of professionals to monitor the activity for a more immediate response of assistance to patient needs. There were many key takeaways from the plenary presentation, Message Mapping for Emergency, Disaster and Crisis Commu- nication Effectiveness by Robert Chandler, Ph.D., from the Nicholson School of Communication, University of Central Florida. Dr. Chan- dler explained the need for preparing in advance as communication is difficult under the best of circum- stances and disasters are typically unexpected. At- tendees learned how the more stress an individual is under, the lower their ability to communicate will be. Dr. Chandler cited that the av- erage reading skill is at the 10 th Winter 2015 Android Security Pg. 3 Also in This Issue | iOS 8 Vulnerability Pg. 5 | Windows 10 Release Date Pg. 7 | NJAMHAA IT Conference a Huge Success! IT Conference keynote speaker, Denny Morrison (center), pauses for a photo with IT Project Director June Noto and IT Project Associate Director Ron Gordon. Plenary Speaker Robert Chandler (left) with IT Project Director June Noto [Continued on Page 8]

Transcript of Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ......

Page 1: Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ... Android and Tizen smartwatches As a category, smartwatches didn’t

This year’s Annual IT Conference, Back to the Future, was held on December 3, 2014 at the Crowne Plaza, James-burg, New Jersey. Con-ference speakers and presentations spanned a range of challenges that behavioral health providers face. June Noto, COO and Direc-tor of the IT Project, said, “Our goal is to help our nonprofit member organizations be bet-ter prepared to serve their clients – whether it is in the aftermath of a natural disaster or by adapting to ever-changing technology – and we selected our speakers and presenters with that goal in mind.”

Followig is a short summary of some of the key speakers and presentations:

To start off the day, the Keynote Speaker Dennis Morrison, Ph.D., Chief Clinical Officer of Netsmart, brought the audience through the growing pains of technological innovation with his presentation, The Role of Disruptive Innovation in Health Care. He discussed various cultural changes throughout history and some of their effects on established behavior. Citing innovations such as the printing press, radio, TV, iPhones and the Uber cab, Dr. Morrison explained how those innovations were met with resistance to the changes they cre-ated. This progressed to discussing the increasing consumer drive for using online apps for many health needs. As health applications’ popularity increases, so does the ability of professionals to monitor the activity for a more immediate response of assistance to patient needs.

There were many key takeaways from the plenary presentation, Message Mapping for Emergency, Disaster and Crisis Commu-nication Effectiveness by Robert Chandler, Ph.D., from the Nicholson School of Communication, University of Central Florida. Dr. Chan-dler explained the need for preparing in advance as communication is difficult under the best of circum-stances and disasters are typically unexpected. At-tendees learned how the more stress an individual

is under, the lower their ability to communicate

will be. Dr. Chandler cited that the av-

erage reading skill is at the 10th

Winter 2015

Android SecurityPg. 3

Also in This Issue|

iOS 8 VulnerabilityPg. 5|

Windows 10 Release DatePg. 7|

NJAMHAA IT Conference a Huge Success!

IT Conference keynote speaker, Denny Morrison (center), pauses for a photo with IT Project Director June Noto and IT Project Associate Director Ron Gordon.

Plenary Speaker Robert Chandler (left) with IT Project Director June Noto

[Continued on Page 8]

Page 2: Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ... Android and Tizen smartwatches As a category, smartwatches didn’t

Bits

and

Byt

es

Winter 2015

Bits and Bytes

2 3Winter 2015

The IT Project Offers

Unbeatable Values!

Bundled Services

Individual Services

The IT Project3575 Quakerbridge Road

Suite 102Mercerville, NJ 08619

[email protected]

Block of 100 Hours: $7440 ($74.40/hour)

Block of 75 Hours: $5998 ($79.98/hour)

Block of 50 Hours: $4350 ($87.00/hour)

On-site network support (LAN/WAN): (Troubleshooting and/or

new installations, system software installations, configurations, backup

software support)

Asset inventory management- Call us for details

Computer based forms development/deployment:

Develop and distribute your computer use policies and

procedures

Develop strategic technology plan- Call us for details

On-site (your facility) Training Services:

Web site development

Project Management

Special Projects (database development/report writing)

*$100.00/hour

$10/unit (one PC setup= 1 unit)

$75.00/form

$1000 flat fee

$2000 flat fee

$650/Full Day

Call us for pricing

Call us for pricing

Call us for pricing

Rate Card

IT ProjectYour guide to tomorrow

DM

H

S - N J A C P - D

DD

NJAMHA

Bundled Services

Individual Services

The IT Project3575 Quakerbridge Road

Suite 102Mercerville, NJ 08619

[email protected]

Block of 100 Hours: $7440 ($74.40/hour)

Block of 75 Hours: $5998 ($79.98/hour)

Block of 50 Hours: $4350 ($87.00/hour)

On-site network support (LAN/WAN): (Troubleshooting and/or

new installations, system software installations, configurations, backup

software support)

Asset inventory management- Call us for details

Computer based forms development/deployment:

Develop and distribute your computer use policies and

procedures

Develop strategic technology plan- Call us for details

On-site (your facility) Training Services:

Web site development

Project Management

Special Projects (database development/report writing)

*$100.00/hour

$10/unit (one PC setup= 1 unit)

$75.00/form

$1000 flat fee

$2000 flat fee

$650/Full Day

Call us for pricing

Call us for pricing

Call us for pricing

Rate Card

IT ProjectYour guide to tomorrow

DM

H

S - N J A C P - D

DD

NJAMHA

Bundled Services

Individual Services

The IT Project3575 Quakerbridge Road

Suite 102Mercerville, NJ 08619

[email protected]

Block of 100 Hours: $7440 ($74.40/hour)

Block of 75 Hours: $5998 ($79.98/hour)

Block of 50 Hours: $4350 ($87.00/hour)

On-site network support (LAN/WAN): (Troubleshooting and/or

new installations, system software installations, configurations, backup

software support)

Asset inventory management- Call us for details

Computer based forms development/deployment:

Develop and distribute your computer use policies and

procedures

Develop strategic technology plan- Call us for details

On-site (your facility) Training Services:

Web site development

Project Management

Special Projects (database development/report writing)

*$100.00/hour

$10/unit (one PC setup= 1 unit)

$75.00/form

$1000 flat fee

$2000 flat fee

$650/Full Day

Call us for pricing

Call us for pricing

Call us for pricing

Rate Card

IT ProjectYour guide to tomorrow

DM

H

S - N J A C P - D

DD

NJAMHA

New Jersey Association of Mental Health and Addiction Agencies, Inc.

The Neuman Building3575 Quakerbridge Road, Suite 102

Mercerville, NJ 08619Tel: 609-838-5488Fax: 609-838-5489

E-mail: [email protected] Site: www.njamhaa.org

Copyright © 2015 New Jersey Association of Mental Health and Addiction Agencies,

Inc. Reproduction in any manner, except as authorized by the Copyright Act of 1976, is

prohibited. All rights reserved.

Editor in ChiEf June A. NotoEditors Shauna Moses Debra L. Wentz, Ph.D.Art dirECtor Jeremy TimbermanWritErs June A. Noto Ron Gordon Arthur Powis Kurt Wurmser Mark DePazza

Staff Contributors

From the Director – Bits and Bytes

As we embark upon a new year, I reflect on matters of the past, and look forward to new opportunities in the future. Looking forward is always more exciting to me than dwelling on the “what could haves” of the past. But , 2014 certainly had some great moments, and the IT Project was in full swing offering free educational workshops to mental health and substance use treatment providers. The IT Conference held in December was another smashing success. I want to thank everyone who participated!

The keynote delivered by my esteemed friend and colleague, Dr. Denny Morrison, the Chief Clinical Officer at NetSmart, Inc., was on disruptive innovation. I know that, as computer and networking professionals, we tend to think that all innovation relies on some form of computer technology. But,

innovation, at its heart, is the use of any technology, especially the technologies available in the era of the innovation. Dr. Morrison pointed out that one of the biggest innovative disruptions in our society was the invention of the printing press in the mid 1400’s. Whereas monks of the era were hand scribing bibles that would take years to produce, the printing press cut the time significantly for a fraction of the cost , yet it was met with much criticism from the Church, which wanted to control or censor what was being written in the day. History states that the printing press was the most powerful innovation of our time. Through the rapid distribution of information, knowledge has been able to be spread and public opinion molded like nothing before television or radio was introduced in the past century. And nothing is truer about the Internet, and computers in general, which can rapidly, almost instantaneously, deliver terabytes of information in the time it takes to type it and hit the Enter key. But, had it not been for the

printing press, and all of the innovation that led up to it – after all, someone had to invent paper and ink before Gutenburg could invent the printing press – the computer, as we know it today, would never have come about.

“So, what does this all have to do with the IT Project?” you might be asking. The IT Project will continue to investigate new and upcoming innovations, wearable devices and apps, interactive communications, technology for treatment and support of behavioral health issues, and we will continue to promote the adoption and implementation of electronic health records. Whether the behavioral health industry is ready for it or not, progress will continue to be made, and the early adopters are those who stand the best chance at succeeding. The next best chance at success is to

get involved and have your voice heard. Unders tanding th at impl ement ing technology solutions isn’t always in the budget, I encourage you to use the power of your voice to enact change. The IT Professional Advisory Committee meets only FOUR times a year. By participating on this committee, you have direct access to the IT decision makers at DMHAS.

Peace,

- June NotoDirector, IT Project

From the Director

“The early adopters are those who stand the best chance at succeeding.”

Bits&Bytes

Even though 2014 had seen its share of suc-cessful product releases, the year

has also seen its share of failed mobile products, smartphones, tablets, and more. Amazon Fire PhoneOne of the most notable failures was Amazon’s Fire Phone, setting a prime ex-ample of how not to develop a product. The Fire Phone was more about serv-ing Amazon not its customers. Products such as the Fire Phone are the result of forgetting that your products for cus-tomers keep you in business.

Samsung Galaxy S5This year’s Galaxy products suffered from less than de-sirable software advances and an inferior physical presentation due to its sub-standard enclosures. Apple iPad Mini 3 and iPad Air 2The new iPads are not much better than last year’s iPhone 5s. Adding the Touch ID sensor is a pleasant but not groundbreaking up-grade as it had already been seen on the iPhone 5s.

Android and Tizen smartwatchesAs a category, smartwatches didn’t make great strides for the consumers. The more noticeable disappointments were led by Android and Tizen OSes.

Samsung Galaxy Note Pro 12.2Samsung gave us its 12-inch Galaxy Note Pro 12.2 , demonstrating that big-ger is not always better. It is not the most physically easy device to hold and use for its size.

Samsung Knox on AndroidWhen Samsung was promoting its Knox security technology, vendors prom-ised support for Knox. Unfortunately, that backing failed beyond the initial press releases. Adding to that issue, potential customers snubbed paying $3 per user per month for Knox along with the MDM fees for Galaxy users.

Tizen, Firefox OS, and Ubuntu TouchSome excitement was generated by mobile OSes like Tizen, Firefox OS and Ubuntu Touch. Despite their Open Source origins, they come off as deriva-tives of Samsung and Intel, Mozilla, and Canonical, respectively. Google Docs for iOS and AndroidAs good as Office for iOS is, Google Docs falls considerably short for mobile users. It will make you feel glad that you have a real word processor at your of-fice or home, or convince you to switch to Office or iWork on an iOS device. For more details, please see http://tinyurl.com/pc5458b.

Major Mobile Flops of 2014

According to a new report from Trend Micro Inc., on-going security vulnerabilities on the Android mobile platform are still plaguing developers and allow-ing the bad guys to make inroads on iOS attacks. The security company released its latest quarterly security roundup that included a section devoted to mobile concerns, which indicated that 75 percent of Android users were affected by the FakeID vulner-ability and Android browser flaws, providing “a big challenge to developers.” The FakeID vulnerability allows apps to impersonate legitimate ones, the report stated. The Same Origin Policy bypass vulnerability also allows attackers to potentially gather data from users who input their in-

formation on legitimate websites with Android’s de-fault browser. Google has released patches for these vulnerabilities, but these do not always reach the ma-jority of users due to mobile patch deployments rely-ing on device manufacturers and telecom providers. “As more vulnerabilities in Android are discov-ered and while the Android update fragmenta-tion still exists, the more likely cybercriminals will use exploits in mobile devices,” Trend Micro said. For more information, please see: http://adtmag.com/articles/2014/12/03/android-security-prob-lems.aspx

Android Security Challenges Mobile Developers

Page 3: Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ... Android and Tizen smartwatches As a category, smartwatches didn’t

Bits

and

Byt

es

Winter 2015

Bits and Bytes

4 5Winter 2015

Bits&BytesBits&Bytes

The pros of Microsoft Internet Explorer 11 are that it is faster and more standards-compliant than previous versions. It has a more efficient interface with better se-curity and privacy features, as well.

The cons are that there is no syncing and no WebRTC support, and it will only install on Windows 7 and 8.1.

Internet Explorer had been frequent-ly derided for not being a “modern” Web browser. Those days are now be-hind it as Internet Explorer 11 (IE 11) has been made available on Windows 8.1, and also for the more widely used Windows 7. It has been recognized as leadings in the areas of graphics hard-ware acceleration and touch input.

InstallationEven though IE 11 requires Windows 7 with Service Pack 1, it is touted as hav-ing low system requirements: a 233MHz processor, 512MB of RAM, a Super VGA graphics adapter, and 70MB of hard disk space—so it should run comfortably on older PCs.

InterfaceThose who upgrade from IE 10 or even IE 9 will notice very little change in the browser’s interface. PerformanceWith IE 11, JPG decoding has been en-hanced with the implementation of “hard-ware acceleration” leading Microsoft to claim this technique is up to 45 percent faster than using the CPU. However, IE 11 does rank as the browser with the second highest amount in used RAM.

Standards and CompatibilityMicrosoft has included support for WebGL in its browser. Other ma jor

browsers have incorporated support for the 3D language for quite some time, whereas Microsoft previously thought 3D graphics should use standard HTML5 features and take advantage of hardware acceleration mentioned above. IE 11 will now support Google’s faster SPDY replacement for the standard HTTP web protocol—but only on Windows 8 and 8.1.

Security and PrivacyAlthough IE has a questionable past when it comes to security, it has made improvements with concerns of malware in recent years. There is a separate menu called Safety, where you can control its privacy and security settings. NSS Labs, in its recent test study, showed that IE 11 detected and blocked more than 99 percent of socially engineered malware.

IE does treat privacy very seriously. Upon its initial setup, the check box for “Do Not Track” is set to “on” by default, disappointing many web ad firms. IE 11 adds a “Do Not Track exceptions API” to

let you control tracking. In conjunction, IE’s Tracking Protection feature will ac-tually allow blocking of third-party in-teractions and cookie placing based on TPLs—tracking protection lists—created by independent privacy organizations, to which you can subscribe. IE also in-cludes a private browsing mode, called InPrivate browsing, which prevents cookies, temporary Internet files, history

and other data from being stored dur-ing the browsing session. Developer ToolsA revamped developer tools in version 11 of the browser is available if you just tap F12, which also brings you to devel-oper tools that Microsoft uses internally to measure page load performance. For the full article, please see: http://www.pcmag.com/article2/0,2817,2427047,00.asp

iOS 8 Vulnerability has “Severe” Security ConsequencesA vulnerability identified by FireEye mobile security shows that Apple devices are vulnerable to “Masque Attacks” in which malicious apps installed on the devices can then replace other genuine applications.

Hackers initiate a “Masque Attack” by tricking a victim into downloading a fake application. To do this, the hacker uses what looks like an in-house application in order to entice the victim to download it. Once installed, the malicious application can replace authentic applications, such as banking and e-mail applications. Actions like this can give the hacker access to bank account login information and e-mail accounts.

It has also been found that data from the original application often remains cached and open to the malicious application. This means that sensitive information like login credentials can be stolen without the victim ever even logging into his accounts. FireEye gave several technical nuances, as well, including that apps distributed using enterprise provisioning profiles (“EnPublic apps”) are not subjected to Apple’s review process. Therefore, the attacker can leverage iOS private APIs for powerful attacks, such as background monitoring (CVE-2014-1276), and mimic iCloud’s UI to steal the user’s Apple ID and password.

What can you do to protect your device?FireEye warns not to install any apps from third party sources other than the official Apple App Store. Don’t click “install” on any pop-up message from a third party website and always click “don’t trust” and uninstall the app immediately if iOS shows an alert from an “Untrusted App Developer”.

If you think you may have been the victim of a “Masque Attack”, FireEye specifically recommends: “iOS 7 users can check

the enterprise provisioning profiles installed on their iOS devices, which indicate the signing

identities of possible malware delivered by Masque Attacks, by checking ‘Settings - >

General -> Profiles’ for ‘PROVISIONING PROFILES.’” iOS 7 users can report suspicious provisioning profiles to their security departments. Deleting a provisioning profile will prevent enterprise signed apps, which rely on that specific profile from running. However, iOS 8 devices do not show provisioning profiles already installed on the devices and we suggest taking extra caution

when installing apps.

The bug affects 95 percent of all Apple mobile devices. To understand

how many people are impacted by this issue, consider that Apple sold 51.6 million

iPhones and iPads in the past quarter alone. The vulnerability had been communicated to

Apple in July of this year.

Ravi GanesanPresident

[email protected]

Leading by example.

Chris ManganoVice President, Sales & Marketing

[email protected]

Internet Explorer had been frequently derided for not

being a “modern” Web browser. Those days are

now behind it.FireEye warns not to install any apps from

third party sources other than the official Apple App Store.

Microsoft Internet Explorer 11: Pros, Cons and Features

Page 4: Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ... Android and Tizen smartwatches As a category, smartwatches didn’t

Bits

and

Byt

es

Winter 2015

Bits and Bytes

6 7Winter 2015

As an important part of any secure computer environment, the antivirus application should receive some careful consideration. Neil J. Rubenking of PC Magazine recently offered his review of the antivirus applications he has tested. The following are excerpts from his testing. “If you don’t have antivirus protection installed, shame on you—there’s something for everyone in the extremely large antivirus field. If you’ve already seen to setting up protection, see how your choice stacks up to the competition. Here are the best from the current crop of commercial antivirus products,” Rubenking wrote. Hands-On Testing“For every antivirus review, I run a hands-on test of the product’s ability to detect and prevent malware attacks. I also check each product’s ability to detect and prevent download of the very latest malware. Starting with a feed of links from London-based MRG-Effitas, I sift out those that point directly to a malicious executable online. Using executable file links makes it easy for me to measure success. If a malicious download reaches the desktop, the antivirus failed. If it

wipes out the file during download, or blocks access to the URL completely, it succeeded,” according to Rubenking.

The Best Products“The antivirus field is huge; I currently track dozens. In a field that big, there’s room for multiple products to earn the title of Editor’s Choice,” Rubenking said.

“Three products share the Editor’s Choice honor for best overall antivirus:

Bitdefender Antivirus Plus 2015 - $39.95 at BitDefender

Kaspersky Anti-Virus (2015) - $27.20 at Amazon

Webroot SecureAnywhere Antivirus (2015), $19.99 at Webroot.

Long-time Editors’ c h o i c e N o r t o n Antivirus no longer exists as a product

separate from the cross-platform multi-device security service.

[There is also] Symantec Norton Security - $19.99 at Amazon,” according to Rubenking.

Whatever your antivirus needs may be, there are more than two dozen well regarded applications that should meet those requirements. If you encounter any difficulties making your decision, you should consult PCMag’s roundup of the best free antivirus apps as there are some excellent choices that won’t impact your budget.

Bits&BytesThe Best Antivirus for 2015

Call Rob Molinaro for all your data and telecommunication needs.

Tell him that the IT Project referred you!215-922-1862

[email protected]

Mike Carruthers401.780.2300 ext. 115

www.smartnet.com

Jimmy [email protected]

919.655.1827

Dana WhiteDirector, Business [email protected]

(610) 428.4411

Windows 10: Release Date, Price, News and FeaturesWith Windows 8 and now Windows 8.1, Microsoft tried – not entirely successfully – to make tablets part of a continuum that goes from number-crunching workstations and high-end gaming rigs through all-in-one touchscreen media systems and thin and light notebooks down to slender touch tablets.

The general consensus is that it still has a long way to go to produce a unified OS. Recently, Microsoft publicly made the first steps to doing just that, with Windows 10. Skipping the Windows 9 name entirely, the Redmond, Wash. firm aims to step into the next generation of computing with the right foot forward.

You will soon be able to download Microsoft ’s Windows 10 Technica l Preview by venturing over to its Windows Insider Program website. You will need a Microsoft account to get it, and it is worth bearing in mind that it is not the finished article, so it may be a bit rough around the edges.

Is the new OS any good? Read our hands on Windows 10 review.

While there is little information regarding the Windows 10 Road Map currently available following the event and the Technical Preview, this is what we know so far regarding the stymied release of Windows 10:

• The event on September 30 announced the release of the Technical Preview of Windows 10 for laptops and desktops, often referred to as WTP, DP (Developer Preview) or CTP (community technology previews). This is just over three years after Microsoft unveiled the first public beta build of Windows 8, known as

Windows Developer Preview.• Microsoft released its Windows

Insider Program on October 1st, designed to keep early adopters up to date with the latest preview builds of Windows 10.

• Starting with Technical Preview for laptops and desktops, the preview build will extend to servers shortly after.

• As of October 7, the preview build became available to Windows 7 users, as well.

• Consumer preview builds will not be available until early next year, according to Microsoft’s Terry Myerson.

• The Technical Preview will end sharply on April 15 of next year, which conveniently leaves right off at...

• Microsoft’s Build 2015 conference next April, at which the company will talk more about Universal Apps and likely issue a Windows 10 release date.

• Finally, the company promises that Windows 10 will ship to consumers and enterprises “later in the year” in 2015, Myerson said.

For full article please see: http://tinyurl.com/lkwcwrm

Chris [email protected]

615.477.7588

Nick [email protected]

212.780.1450

Bits&Bytes

Contact: Megan Remy ([email protected])(913) 696-2819

For the full article, please see http://www.pcmag.com/article2/0,2817,2372364,00.asp

Page 5: Also in This Issue - NJAMHA · Pg. 7|Windows 10 Release Date ... led up to it – after all, ... Android and Tizen smartwatches As a category, smartwatches didn’t

Bits

and

Byt

es

Winter 2015

8

grade level, which can drop four grades under stress. Crisis always finds the weakest link, making meaningful preparation for a strong communication plan key.

In order to overcome the many challenges of communicat-ing during crisis, Dr. Chandler suggests making specific instructions for the three categories in which communication is necessary: People, Processes, and Technology. Having pre-pared messages in advance that are short (three sentences) and having multiple messages will help. Also, create a list of people with whom the organization needs to communicate.

One of the workshops presented was Data Breaches are on the Rise: How to Stay off the HIPAA Wall of Shame, presented by Miranda Alfonso-Williams, CIPM, CIPT, CIPP/E/US, of the WAM Consulting Group. Attendees learned more of the finan-cial incentives hackers have to target the many vulnerabili-ties in organizations, including hard drives, multi-function devices, smart phones and USB drives. Discussed were the HIPAA compliance obligations in regards to each type of data breach and the respective risks to the clients and agencies.

Michael Lande of Maureen Data Systems gave attendees a live demonstration of Microsoft’s Cloud service, Office 365. Par-ticipants saw hands-on how to perform live video chats and conferences, as well as collaborative working documents, such as Excel files that can be edited over the Internet by multiple users.

Return on Investment: Conversion to Voice Over Internet Pro-tocol and Hybrid Phone Systems was presented by Ivo Allen, Founder and President of Hunter Technologies, beginning with the options of VOIP: being fully hosted in the Cloud or a hybrid combination of traditional phone service and the Cloud hosting. Discussed were the many advantages of using VOIP, which include its more economic cost, no geographical boundaries and its rich media services. Attendees also were

made aware of how to make a well-rounded decision about VOIP by learning about its weaker attributes, which include voice quality, power and carrier dependency, its need for bandwidth and also its vulnerability to hacking.

More Training Always Being PlannedBe on the lookout for upcoming notices about the next IT Conference. In the meantime, don’t forget to take advantage of the free trainings we are offering through the IT Project contract with the Division of Mental Health and Addiction Services, which include a full-day workshop on Coding and Billing for Mental Health and Addiction Services Training: Code Updates: CPT, ICD-10, DSM-5 and HCPCS Level II Code Changes on February 9, 2015 from 8:30 a.m. to 3:30 p.m. at the RWJ Conference Center in Hamilton, NJ. Visit www.njamhaa.org/free-trainings for detailed informa-tion and registration information.

Where else can you get trainings for FREE other than NJAMHAA’s IT Project?!

IT Project Proudly Recognizes IT Heroes at Annual IT ConferenceNJAMHAA’s IT Project team was delighted to honor the following individuals as IT Heroes during the recent conference:

• Robert Arroyo, Director of IT, FAMILYConnections, Inc. IT Hero - Individual

• Amr Osman, John Brooks Recovery Center (JBRC), IT Hero – Outstanding Use of New Technology

• Greg Muller, CIO, Health Republic Insurance of New Jersey, IT Hero – Excellence in Technology

• Ani Vosbikian, Data Analyst Twin Oaks Community Services, Honorable Mention

Recently, the Internet Architecture Board (IAB) announced a protocol to restore the trust of users in the internet. The IAB recommends that encryption be “the standard across the web” and should be the default at all levels of the Internet. The IAB believes that ubiquitous encryption can help address the shortcomings of the original design and protect users from attackers and surveillance, reported the Post.

Meanwhile, in the same month that the IAB called for more security and privacy, the fate of an anti-privacy program known as permacookies remains uncertain. Permacookies is a program initiated through mobile carriers AT&T and Verizon, which assigns an undeletable identification number to mobile customers’ online activity. Unlike normal cookies, which can be de-leted or blocked entirely, permacookies cannot be removed by the users. The information about the individual’s browsing is then sold to advertisers.

After an outcry from advocates and consumers, AT&T has stated that it will now allow its customers to opt out of the per-macookies. However, Verizon will not at this time change its permacookies. For people wishing to maintain their privacy while perusing the Internet, two recommendations are using wi-fi connections to bypass the cellular network altogether and using a VPN, which can offer privacy.

While IAB Calls for Internet Privacy, PermaCookies May Maintain their Presence

NJAMHAA IT Conference a Huge Success! [Continued from Page 1]

Bits&Bytes