Home
Videos uploaded by user “MapleTronics”
Is the Intel Compute Stick good for business use? - Review
 
05:15
In this video I talk about some of the business use cases for the Intel Compute Stick, and show you what comes in the box. **Remember to consult your IT provider before implementing any tech in your business.**
Views: 2586 MapleTronics
What is the HIPAA Security Rule?
 
02:48
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 2877 MapleTronics
Windows 10 Free Upgrade & Clean Install (Complete Tutorial)
 
06:40
Note: If you are moving from Windows 8 to Window 10 you have to be a on version 8.1. Why clean install? - http://mapletronics.com/blog/4-reasons-why-you-should-clean-install-windows-10 Link to the upgrade tool: https://www.microsoft.com/en-us/software-download/windows10ISO So as you probably know, if you have a valid copy of Windows 7 or 8 you can upgrade to Windows 10 for free. It’s actually really easy to do, and I’m going to show you how, but what’s kind of confusing and cumbersome is doing a clean install of Windows 10 while keeping your free upgrade. The issue is when you do the free upgrade you don’t get a license key. Instead your computer’s hardware gets registered with Microsoft. So the bottom line is once you upgrade to Windows 10 using the free upgrade offer you will be able to do a clean reinstall of Windows 10 on the same device at any time without a license key. And That’s exactly what we’re going to do in this video.
Views: 18242 MapleTronics
Android Email Setup (Exchange)
 
02:40
In this video we are setting up a an Exchange account on an Android device using the built in mail client.
Views: 15538 MapleTronics
How to Read & Understand the HIPAA Security Rule
 
55:30
You’ve heard us preach "read the Security Rule", now we’re going to show you how! We promise not to be boring.
Views: 1144 MapleTronics
A HIPAA Security Rule Conversation Full HD
 
29:26
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 1929 MapleTronics
Windows 10 Security Features
 
05:14
MapleTronics takes a look at some of the security, privacy, and manageability features of Windows 10.
Views: 3647 MapleTronics
iPhone Email Setup (Exchange)
 
01:54
In this video we are setting up a an Exchange account on an iOS device using the built in mail client.
Views: 15630 MapleTronics
HIPAA Risk Analysis Demystified
 
01:09:19
Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTronics https://www.linkedin.com/company/mapletronics-computers-inc. https://www.facebook.com/mapletronics http://mapletronics.com/blog Join us on June 24th for a straightforward discussion of what a Risk Analysis is, what it is not, and how to get yours started or improved today. We'll also cover the HIPAA rule that requires the Risk Analysis to help you better understand how it fits into the overall plan of ePHI security. Items We'll Cover Include: Is my organization required to perform Risk Analysis? How often do I need to perform a Risk Analysis? Where do I start? What is the scope of a Risk Analysis? When am I done? Now that I have a Risk Analysis, what's next?
Views: 546 MapleTronics
Technical Apprenticeship Program
 
03:02
http://mapletronics.com/apprenticeship The The Technical Apprenticeship Program is designed for people new to the world of IT who have demonstrated the proper aptitude and attitude for a rapid and intense immersion into what it means to be an IT professional in the MapleTronics context. The TA will begin in an entry level technical position and, upon achieving pre-determined bench marks in both technical and soft skill proficiencies, will advance to the next level of support within the organization. Apprenticeship Program is designed for people new to the world of IT who have demonstrated the proper aptitude and attitude for a rapid and intense immersion into what it means to be an IT professional in the MapleTronics context. The TA will begin in an entry level technical position and, upon achieving pre-determined bench marks in both technical and soft skill proficiencies, will advance to the next level of support within the organization.
Views: 152 MapleTronics
Setting up Office 365 Email on iPhone (iOS) Using Outlook
 
01:58
In this video we’re going to setup Office 365 email on iPhone using the Outlook app. Follow This link for a written version of this: http://mapletronics.com/docs/Office%20365%20Email%20on%20iPhone.pdf
Views: 2220 MapleTronics
When Is It Time for a Dedicated Firewall
 
05:01
In this video Casey Williams (One of our network engineers) talks about firewalls and when it is time to move away from using a standard all-in-one router.
Views: 196 MapleTronics
The HIPAA Security Rule - Risk Analysis
 
01:41
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 151 MapleTronics
Hacking Healthcare: The Current State of Healthcare Data Security
 
56:12
Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTronics https://www.linkedin.com/company/mapletronics-computers-inc. https://www.facebook.com/mapletronics http://mapletronics.com/blog The material presented in this webinar has been used by organizations of all sizes and is purposefully designed to be used by the largest to the smallest CEs, BAs, and subcontractors. Whether you’re a representative of a hospital, insurer, care management firm or a clinic, dental office and billing company, you will benefit from learning the topics addressed in this webinar. In this session, attendees will learn about: - HIPAA Security Rule Risk Analysis - Review of SR related policies and procedures - A practice risk analysis methodology - What you are facing in 2015 and how to be prepared A major goal of the HIPAA Security Rule is to protect the privacy of individuals’ health information while allowing CEs and BAs to adopt new technologies to improve the quality and efficiency of patient care. Thus, as technology continuously improves, you need to stay educated and prepared to provide the best experience for your clients.
Views: 476 MapleTronics
Maintaining IT Infrastructure - IT Business Strategies Part 4
 
06:49
The success of a modern day business can be held hostage by its IT infrastructure. However, with careful preventative IT infrastructure maintenance, one has nothing to fear. This video discusses IT maintenance philosophies pertaining to software, hardware, and infrastructure. Moreover, in order to correctly implement an IT maintenance plan, one must develop the company’s IT expectations, create an IT business strategy that is well communicated to the executive team, and design a quantitative analysis that measures the activities of the maintenance plan.
Views: 135 MapleTronics
The HIPAA Security Rule - What is a Security Officer?
 
01:43
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 435 MapleTronics
What is the biggest HIPAA Security Misconception?
 
02:25
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 77 MapleTronics
What's the deal with HIPAA Security Rule audits?
 
02:23
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 75 MapleTronics
Setting up Office 365 Email on Android Using Outlook
 
01:34
In this video we’re going to setup Office 365 email on Android Using the Outlook app. Follow this link for a written version of this: http://mapletronics.com/docs/Office%20365%20Email%20on%20Android.pdf
Views: 9477 MapleTronics
How did MapleTronics get it's start?
 
01:12
MapleTronics' CEO, Wes Herschberger talks about the beginnings of MapleTronics.
Views: 38 MapleTronics
HIPAA Security Awareness & Training: The Best Defense Is a Good Offense
 
01:00:59
More than one-time training, security awareness is about protecting your organization from your biggest threat of all...your own people. Join us as we deep dive into one of the most investigated compliance issues. Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTro... https://www.linkedin.com/company/mapl.... https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 586 MapleTronics
HIPAA Security Rule - You can do it!
 
01:24
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 108 MapleTronics
HIPAA Policies & Procedures: Making Them Real
 
01:02:21
Join us as we discuss how to build real policies and procedures that you and your company can live with. Learn some pitfalls to avoid as well as best practices to help you build an effective foundation to your Security Rule compliance program. Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTro... https://www.linkedin.com/company/mapl.... https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 248 MapleTronics
Transitioning Theory into Practicality - IT Business Strategies Part 6
 
04:42
The process of effectively implementing and maintaining an IT infrastructure vital for the success of a modern day business:1) Determining what the IT expectations are2) Developing an IT business strategy based on IT expectations3) Communicating the IT business strategy to the executive team4) Creating a plan of activities that supports the IT business strategy; who does what5) Implementing measurable reports on planned activities6) Auditing the IT business strategy every year This video discusses the overall process of transitioning from theoretical IT strategy to practical implementation.
Views: 29 MapleTronics
Network Security - What Business Owners Need to Know
 
01:09:42
Wes Herschberger, CEO of MapleTronics, discusses the importance of network security and how business owners can protect their businesses. "There are two kinds of big companies in the United States. There are those who've been hacked and those who don't know they've been hacked." FBI Director James Comey Cyber security can feel overwhelming, and the items this slide deck covers will inform you on how to better prepare your business. 1) Why would a hacker target your business 2) What data should you protect 3) Avoiding security negligence 4) What can you do to protect your company www.mapletronics.com
Views: 127 MapleTronics
What If...A Colleague Walks By
 
00:14
With anticipation through the roof, your new laptop is finally here; you hastily plug it in and fire it up. Alas, what if a colleague walks by? We can fix that. www.mapletronics.com
Views: 133 MapleTronics
HIPAA Security Rule - Where does encryption fit in?
 
59:08
Join us for a discussion about a topic that is often misunderstood and often incorrectly implemented.
Views: 108 MapleTronics
HIPAA Security Rule - How to Build Your Team
 
54:35
Join us a s we discuss how to build staff and operate your Security Rule Compliance Team. Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTro... https://www.linkedin.com/company/mapl.... https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 195 MapleTronics
Onsite, In-person, & Remote Training from MapleTronics
 
01:54
Gloria Moser our Training Coordinator talks about the types of training MapleTronics offers.
Views: 227 MapleTronics
The Business Case for HIPAA Security
 
01:00:26
Of all the reasons to pursue HIPAA compliance, this may be the best one! Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTro... https://www.linkedin.com/company/mapl.... https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 167 MapleTronics
What Your Business Needs to Know about the Cloud
 
22:40
Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTronics https://www.linkedin.com/company/mapletronics-computers-inc. https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 112 MapleTronics
Our YouTube LiveStream/Webinar Setup
 
02:07
This is just a quick behind the seances of our YouTube livestream/webinar setup.
Views: 25 MapleTronics
MapleTronics Email Protection - End User Guide
 
04:23
This guide shows you how to use the new MapleTronics Email Protection Console. http://mapletronics.com/signin
Views: 150 MapleTronics
MapleTronics Client Portal - Overview and Tickets
 
02:14
This video will give you a quick overview of the client portal, and how to submit and manage tickets with ease. Music from: bensound.com
Views: 150 MapleTronics
Two Factor Authentication: What It Is & Why Your Business Needs It -with Tim Troyer
 
10:20
Tim Troyer is one of our Sr. Network Engineers. In this video he talks about two factor authentication. It’s one thing to have a password, but because of the advances made by people who want to get into the critical information that we want to protect, two factor authentication is a necessity.
Views: 120 MapleTronics
Managing Distributed Hardware Risk - IT Business Strategies Part 5
 
07:34
IT management decisions are based on the company’s IT expectations, which affects the IT business strategy, which determines the level of distributed risk for “The Stack.” For example, if productivity is of up most importance, downtime less than two hours, then decisions about the components of the infrastructure’s systems and subsystems need to be made that support this level expectations. This example should be extended to all levels of “The Stack:” software, hardware, infrastructure, and connectivity. This video discusses the plethora of options for managing distributed risk, which ultimately is determined by the company’s IT expectations and IT business strategy.
Views: 45 MapleTronics
Minimizing Technology Disruptions - IT Business Strategies Part 3
 
08:26
Technology disruptions are extremely costly to a business; often, one IT problem can easily result in a cascading effect that engenders issues throughout the entire company. For example, if an employee encounters a computer problem during his normal daily activities, he will naturally turn to a colleague and ask if he has seen this problem. The colleague probably hasn’t experienced this issue, so they will reach out to another colleague before actually contacting the company “IT Guru,” if they have one. As a result, everyone who is working on that problem is away from the business at hand. This video discusses the importance of minimizing technology disruptions and how to prepare for and manage these situations.
Views: 17 MapleTronics
Mapletronics Hosted Exchange Email Filter   End User Guide
 
03:08
In this video we are going to look at the mail filter that comes with our Hosted Exchange service. If you have one of our Hosted Exchange accounts you can access your email filter by browsing to mapletronics.com/signin and clicking the Email Quarantine link under Hosted Exchange.
Views: 27 MapleTronics
The Importance of Setting IT Expectations - IT Business Strategy - Part 1
 
10:54
Determining the company’s information technology (IT) expectations is a vital part of business success. From the employees’ perspective, they want to be able to sit down and begin their work right away without any disruption; basically, they “just want the crap to work.” From the employer’s perspective, they want dependability, efficiency, and unnecessary complication with their IT assets; similarity, they also “just want the crap to work.” This video discusses the three major aspects of IT expectations: Productivity, Business Continuity, and Security.
Views: 96 MapleTronics
What type of solutions does MapleTronics offer?
 
02:07
http://mapletronics.com/solutions
Views: 84 MapleTronics
Why Your IT Shouldn’t Run Your HIPAA Compliance
 
52:03
We are aware that there were some audio sync problems with the live stream. We are working on fixing them for the next stream. Many Covered Entities go down the wrong path of thinking (or hoping) that their IT department or company ‘has the ball’ when it comes to their compliance. In this webinar, we’ll discuss why that’s not only dangerous to assume, but can actually cause you to have more issues than if you did nothing. Feel free to ask questions here in the chat, or email your questions to [email protected] and we will try to answer as many as we can at the end of this presentation. Like subscribe and follow us at: https://www.youtube.com/user/MapleTro... https://www.linkedin.com/company/mapl.... https://www.facebook.com/mapletronics http://mapletronics.com/blog
Views: 76 MapleTronics
MapleTronics - A Conversation with the CEO (Full)
 
31:57
This is a conversation with MapleTronics' CEO, Wes Herschberger. In this video he talks about everything from how we got our name to where business technology is going.
Views: 103 MapleTronics
What's the passion behind MapleTronics?
 
01:08
MapleTronics' CEO, Wes Herschberger talks about why we do what we do.
Views: 70 MapleTronics
We Know Your Network
 
04:00
We work with a lot of clients but we also know even the small details about their networks. MapleTronics' CEO, Wes Herschberger talks about how we do it.
Views: 65 MapleTronics
What's Your Approach to Cyber Security?
 
07:01
Subscribe to our YouTube Channel: https://www.youtube.com/MapleTronics Cyber security can be seen as daunting and difficult to manage; however, we've simplified this area of IT into four sections: Access, Enforceable Policy, Endpoint, and Perimeter. Once segmented into these sections, creating a cyber security plan is easier to plan and implement. Find us here: Website: http://mapletronics.com Facebook: http://facebook.com/mapletronics Twitter: https://twitter.com/mapletronics LinkedIn: https://www.linkedin.com/company/1012753
Views: 29 MapleTronics
Building an IT Business Strategy - IT Business Strategies Part 2
 
08:26
Once the IT expectations are established, the next step is to build an IT business strategy. This is somewhat of a loaded proposition, because every IT business strategy will be just as unique as the uniqueness of the company. Nonetheless, there are general areas of one’s IT infrastructure to build a strategy around: Hardware Refresh, Maintenance, Support, Security, and Uptime strategies, for example. This video discusses the transition from IT expectations to IT business strategy.
Views: 62 MapleTronics
HIPAA Security - What's the first thing I need to do?
 
00:46
Whereas the HIPAA Privacy Rule deals with Protected Health Information (PHI) in general, the HIPAA Security Rule (SR) deals with electronics Protected Health Information (ePHI), which is essentially a subset of what the HIPAA Privacy Rule encompasses. MapleTronics' HIPAA experts sit down to have an informative conversation about these topics, and hopefully, you find our discussion helpful.
Views: 60 MapleTronics
Welcome to the NEW Mapletronics.com
 
05:11
We are excited to officially launch the new Mapltronics website. This quick video shows you some of our favorite features on the new website and how to access them.
Views: 56 MapleTronics
How do we find out what our clients really need?
 
02:19
MapleTronics' CEO, Wes Herschberger talks about finding the clients needs and form fitting solutions to those needs.
Views: 55 MapleTronics