Russell Mickler Russell Mickler

How Managed IT Services Can Reduce Risk and Boost Productivity for Legal Teams

Mickler & Associates, Inc. offers managed IT services to help law firms in Vancouver, WA reduce risk, streamline workflows, and boost productivity while keeping client data secure.

Running a law firm means juggling a thousand moving parts — client meetings, court deadlines, document prep, research, and the occasional last-minute scramble to the courthouse. Technology should be making life easier (right?), but for many legal teams, it ends up being one more headache. That’s where managed IT services come in.

For law firms in Vancouver, WA, managed IT support isn’t just about “fixing stuff when it breaks.” It’s about building a reliable, secure, and efficient tech environment that reduces risks, streamlines your workflow, and frees you up to focus on what you do best: serving your clients.

Streamlined Document Management

Law is paper-heavy, but modern firms rely on digital document management systems to keep everything organized. Without proper oversight, these systems can get messy. Version confusion, misplaced or missing files, or clunky search functions that waste billable hours.

With managed IT services, your systems are configured and maintained so documents are secure, organized, and easy to find. Permissions can be set by case or team, ensuring the right people have access while keeping sensitive files locked down from unauthorized eyes. And because your IT partner is local, you can get fast help when a document issue threatens a deadline.

Faster, Smarter Case Research

Every lawyer knows that the speed and quality of research can make or break a case. But outdated systems, slow internet, or poorly configured legal databases are like trying to run a marathon in flip-flops.

Managed IT support can optimize your research tools, maintain high-speed connectivity, and ensure secure remote access so you can work from the office, the courthouse, or your living room without missing a beat. They can even recommend tech upgrades that make your research process smoother and more efficient.

Reliable Communication Tools

From client calls to video depositions, reliable communication tools are a must. Poor video quality, dropped calls, or glitchy conferencing platforms don’t just look unprofessional; they can stall a case or frustrate a client.

With a managed IT provider, you get communication systems that are tested, secured, and integrated into your workflows. Whether it’s VoIP phones, secure email, or collaboration platforms, your IT partner ensures these tools work seamlessly across devices and locations.

Reduced Risk Across the Board

Legal work is built on trust, and nothing shatters trust faster than a data breach or system failure. Managed IT services proactively monitor your network, patch vulnerabilities, and back up your data to reduce the risk of downtime or cyberattacks.

Instead of reacting to problems, they work to prevent them, saving you stress, money, and reputation damage. That’s a strategic application of IT. And because they’re in Vancouver, WA, they can even be on-site quickly if the unexpected happens. Try to ask that of your Upwork support guy in India.

The Bottom Line

For law firms in Vancouver, WA, managed IT services are like having an in-house tech department without the overhead. They keep your systems running, your data safe, and your team focused on winning cases instead of wrestling with technology.

Because when your tech works, you work better, and your clients notice. Let’s get to work!

R

Read More
Russell Mickler Russell Mickler

Top 5 Cybersecurity Threats Facing Small Medical Offices

Learn the top 5 cybersecurity threats facing small medical offices in Vancouver, WA, and how specialized IT support focusing on medical practices keeps your practice secure and compliant.

Increasingly, running a medical practice isn’t just about treating patients, but about caretaking the sensitive data and equipment that accompanies modern healthcare. Medical practitioners are inundated with classified forms of information (medical records, chart notes, insurance and billing details, state identifications, tax records) — all prime targets for cybercriminals — all protected in some form by state and federal law. And the reality is that the small medical office is at an even greater risk than the big hospitals: cybercriminals rightly assume you’ve fewer resources to afford an IT department.

Let’s break down the top five cybersecurity threats facing small medical offices today, and how to defend against them.

1. Phishing Attacks

That “urgent” email asking you to click a link or verify your password? Classic phishing. That unpaid invoice from some @gmail.com account? Think twice. These emails often look legitimate, sometimes even mimicking vendors or government agencies, but they’re trying to scam you. One wrong click can expose your login credentials, defraud you of needed cash, or install malware.

Pro Tip: Tighter technical controls surrounding email are one part of a solution. Train staff to spot suspicious emails, use multi-factor authentication (MFA), and filter inbound mail to block obvious scams. That training is also required by HIPAA.

2. Ransomware

Ransomware locks your files behind a layer of encryption until you pay the attacker. For a medical office, that can mean losing access to patient records, appointment schedules, and billing systems, which can impact reputation and patient care. In some cases, it might mean hefty civil penalties.

Pro Tip: Never pay a ransom. That simply makes you a paying (returning) customer to a cybercriminal. Instead, plan on catastrophe — whether it’s ransomware, an earthquake, or a fire, the safeguard is the same. Keep regular, encrypted, off-site backups and test your recovery process. That way, even if ransomware strikes, you can restore systems without paying the ransom and can get back to work as quickly as possible.

3. Insider Threats

Not all threats to your practice come from outside. Disgruntled employees or even untrained staff can accidentally — or intentionally — compromise data and patient confidentiality. From downloading sensitive files to plugging in infected USB drives or stealing patient information, insiders pose real risks. HIPAA’s Security Ruling forces you to implement adequate safeguards to protect patient data from internal threats as well as external. Sometimes, the bad guys live with us.

Pro Tip: Practice the principle of least privilege. Limit access to sensitive systems, monitor activity logs, and implement role-based permissions so staff only see what they need.

4. Outdated Software

I get it: nobody likes change. That old workstation running Windows 7 (a depreciated operating system), Word 2016 (a depreciated productivity application), or the decade-old medical software you still rely on? They’re comfortable, but outdated systems often lack security patches and have lasting, well-known vulnerabilities, making them easy targets. Hackers actively scan for these vulnerabilities. But beyond that, the Security Ruling obligates you to run software that is monitored for security risks and patched, which requires regular upgrades.

Pro Tip: Keep operating systems, EMRs, and all applications updated. Partner with an IT provider who can schedule updates without disrupting daily operations and keep you on task for asset replacement.

5. Unsecured Devices

Between mobile phones, tablets, and laptops, today’s medical offices are full of devices that can access patient data from anywhere. If those devices aren’t secured, encrypted, or tracked, they become strategic weak points.

Pro Tip: Enforce device encryption on all devices, require strong passcodes, and set up remote wipe capabilities in case a device is lost or stolen. An Incident Response Plan (also required by the Security Ruling) tracks your response to these problems over time, and demonstrates your “due care” obligations.

The Role of Managed IT Services

I feel doctors and medical staff already wear enough hats. Expecting them to also act as cybersecurity experts isn’t realistic. That’s where a managed IT partner like me comes in.

With proactive monitoring, data encryption, HIPAA-compliant systems, and round-the-clock support, IT services that directly address your Security Ruling obligations give you peace of mind. Instead of worrying about cyber threats, you can focus on patient care, knowing your practice is protected. HIPAA’s goal is to implement good risk management practices addressing ePHI. That’s what we all want to do, right? Manage risk more effectively?

Conclusion

Cybersecurity for medical practices isn’t optional; the Security Ruling’s expectations are clear. By understanding these top five threats and putting the right defenses in place, small medical offices in Vancouver can stay compliant, protect patient trust, and keep care running smoothly.

If you’re ready to strengthen your defenses and simplify IT, it may be time to talk with a local healthcare-focused IT consultant who knows the risks and how to prepare for them. Give me a buzz.

R

Read More
Russell Mickler Russell Mickler

No, Microsoft 365’s OneDrive Is Not HIPAA-Compliant

Learn how to make Microsoft OneDrive HIPAA-compliant for your Vancouver, WA medical practice. Licensing, BAAs, security, training & audits explained.

So you’re a savvy business manager for a medical practice in Vancouver, WA.

Let’s talk about something not-so-fun but super-important: HIPAA compliance with OneDrive. Yes, you want your files available to you, but you also want your Electronic Protected Health Information (ePHI) to be safe and secure, right? In accordance with the Security Ruling?

Here’s the lowdown.

1. OneDrive Can Be HIPAA-Compliant. It Starts with Licensing.

Using OneDrive out of the box is not HIPAA-compliant, and it is certainly not compliant with a Personal Microsoft Account. The road to compliance begins with the right licensing. If you’re looking for HIPAA compliance with OneDrive, you must be using a Microsoft 365 Business Premium or E1, E3, or E5 Plans.

That’s the beginning point: are you using an enterprise-level M365 product? If not, it’s against Microsoft’s T&Cs to store classified forms of information in OneDrive; you shouldn’t be using it for this purpose. Without an enterprise-level plan and proper configuration, you’re not covered, and storing PHI in OneDrive would violate Microsoft’s terms and HIPAA’s Security Ruling requirements.

2. You’ll Need a Business Associate Agreement (BAA).

The Security Ruling requires a Business Associate Agreement (BAA) with any third party handling PHI, including Microsoft. Good news: Microsoft automatically provides a BAA for those enterprise-level plans. Here’s how to check on the BAA status:

How to Check the BAA Status of Your Organization

  1. Sign in to the Microsoft 365 admin center with your Global Administrator credentials.

  2. Go to Billing > Subscriptions.

  3. Find your M365 subscription and click on it.

  4. Look for the section titled Optional Privacy and Security Contractual Supplements.

  5. Within that section, locate the Office 365 and CRM Online HIPAA/HITECH Business Associate Agreement.

  6. If the BAA is available, the system will allow you to accept it, or it will indicate that it is already included with your subscription.

3. What Does the BAA Cover?

Microsoft’s BAA is the legal contract that allows covered entities (such as your healthcare clinic or practice) to use Microsoft cloud services with ePHI. Here’s what the Microsoft BAA covers:

Scope of Services. The BAA applies to certain Microsoft 365/Office 365, Azure, Dynamics 365, and OneDrive for Business/SharePoint Online services that are classified as “in-scope” for HIPAA. Only those services listed in Microsoft’s HIPAA/HITECH offering are covered — using non-covered Microsoft products with PHI could put you out of compliance. Example:

  1. Microsoft 365/Office 365. This includes services like Outlook, Teams, SharePoint, and OneDrive when used within a qualifying environment.

  2. Microsoft Azure: Various Azure services, such as App Service, Azure Active Directory, and Azure Resource Manager, are covered.

  3. Microsoft Dynamics 365: Core Dynamics 365 services are included in the BAA.

  4. Microsoft Power Platform: Services like Power BI, Power Apps, and Power Automate can be covered.

  5. Microsoft Intune: Intune online services are also covered by the BAA.

Security Safeguards. Microsoft agrees to implement administrative, physical, and technical safeguards to protect PHI that align with the Security Ruling:

  1. Data encryption (at rest and in transit)

  2. Access controls

  3. Data segregation

  4. Audit logging

Use and Disclosure of PHI. Upon executing the BAA, Microsoft commits to:

  1. Using PHI only to provide the contracted services (not for advertising or unrelated purposes).

  2. Not disclosing PHI unless required by law or explicitly permitted by the BAA.

Breach Notification. Microsoft must:

  1. Notify you without unreasonable delay if they discover a security breach or unauthorized disclosure of PHI.

  2. Provide details to meet your HIPAA Breach Notification Rule obligations.

Subcontractors. If Microsoft uses subcontractors (for hosting, support, etc.), Microsoft must ensure those subcontractors also comply with HIPAA safeguards and obligations.

Customer Responsibilities. This part is crucial. The BAA doesn’t make you “automatically compliant.” You’re still responsible for:

  1. Configuring security settings (e.g., MFA, audit logs, DLP).

  2. Training your staff on HIPAA policies.

  3. Running HIPAA risk assessments.

  4. Ensuring you only store PHI in covered services.

3. Volume Encryption.

But we’re not done yet. The volume OneDrive writes to on your PC or Mac must be encrypted, typically using either Microsoft’s BitLocker or Apple’s FileVault. You should have asset control records demonstrating the encrypted state of these machines.

4. Access Control.

Machines that use and access ePHI must have strong access controls (passwords, biometrics, etc.) enabled in the operating system. The Microsoft accounts used to access OneDrive should be protected using 2FA/MFA.

5. Monitoring.

One of the core tenets of the Security Ruling is endpoint monitoring. You must be aware of the state of devices (PCs, Macs, phones, tablets) accessing ePHI at all times, including their operating system patching, encryption status, antivirus status, overall mechanical health, and fitness for purpose.

6. Do a HIPAA Risk Assessment.

HIPAA compliance isn’t just about filling lists of checkboxes — it’s about understanding and responding to risks. A proper risk assessment helps you match Microsoft’s plans and add-ons to your needs. Without it, you might end up under‑protected or paying for licensing and Technical Controls you don’t need. Understanding where you are in your compliance journey is essential to know how much further you need to go.

7. Configure Security Settings Thoughtfully.

Here’s where things get hands-on. Depending on your Microsoft plan, you may need to enable or add Technical Controls like:

  • Identity rules and permissions.

  • Audit logging to monitor who’s doing what and when.

  • MDM (Mobile Device Management) and EPM (Endpoint Management)

  • Policies for data loss prevention (DLP), session timeouts, and sharing restrictions

8. Training.

You can have the bulletproof tech setup with strong Technical Controls, but if your people don’t know how to use it right, you’re still at risk. Training should cover how to save files correctly, avoid disclosing PHI in file names or links, and be aware of what not to do. Annual training for your staff is a requirement of the Security Ruling anyway.

9. Written Policies & Procedures.

HIPAA requires Administrative Controls (written policies and procedures) that govern how these safeguards work to protect ePHI. If no written material exists, how could you verify management intention against actual practice? Policies and procedures are the administrative framework necessary to communicate management’s expectations and reconcile those expectations against actual practice.

10. Audits and Corrective Action.

It’s essential to introduce audits to identify and address compliance gaps. Those resolutions should be captured as corrective actions, and these activities demonstrate “Due Care” — a legal requirement to demonstrate competency and avoid accusations of negligence.

Have more questions? I’ve got answers.

R

Read More