Big CITRIX Apps Announcement

Big Change #1: Quick Launch instead of Anonymous Icon

Quick Launch is going to replace the Allscripts Anonymous icon. After go live, when you double click it, it will open a browser and then automatically start Allscripts Sunrise Gateway. The browser window will look like this:

It is currently set to open the Calculator application, so that you can verify applications open quickly. If you have any problems with this, please reach out to the Service Desk and we will assist you.

Big Change #2: Launch Web instead of Apps

Due to software incompatibility with the new Allscripts program, we are switching to a new web interface called Launch Web. We will be redirecting all Apps requests to the new Launch Web on Wednesday 31st at 10am. If you click on your Apps icon, it will simply take you to the new portal as if you were using the Launch Web icon.

You will log in just like you would with the Apps page, but Launch Web has more functionality. First of all, it allows you to save “Favorites” and will default to your “Favorites” site. When you log in to Launch Web for the first time, your favorites will be blank and will look like this:

Click on Apps up at the top, and you’ll be presented with all of your Citrix applications, just like in the old Apps page. You can click on any of them and they will open as expected. You can also find the applications that you use most, and click the Details right next to the icon.

Here, you can select “Add to Favorites”

And when you log in next time, you can see an uncluttered view of just the applications you’ve selected.

Feel free to add as many applications to your favorites as you like. You can even drag and rearrange them!

Big Change #3: Remote Users

Instead of it will be

You can also get there from the employee portal.

The remote portal will work mostly the same way as it has, with the exception being Allscripts Remote. After the cutover, it will be renamed to Remote Allscripts Access.

If you have any problems, please reach out to the Service Desk at x2483 or

Cyber Attack Security Alert

A message from Mark Heckle, Director, Information Services.

Some of you may have heard about the major Cyber-Attack that has been ongoing over the weekend across many countries. The attack now encompasses 150 nations. We have taken some extra precautions over the weekend and watching our systems closely. This particular attack comes through a link or file in your email.

We need help from everyone in making sure you are proactive in protecting your resources, in particular, be vigilant in your scrutiny of email and unknown links.

Tips for email:

  • If an email asks for personal information DELETE IT.
  • DO NOT CLICK LINKS or FILES in email if you are uncertain of it.
  • NEVER reveal your password to anyone
  • Legitimate businesses including banks and the IRS will never request personal information through an email message.
  • If you are uncertain of any email, please reach out to IT.

Citrix Apps Update from IT

In July, the Citrix web page “Apps” will no longer be able to open Allscripts due to a software upgrade.

We have created a new interface called “Launch” which will be similar to “Apps,” that you will be able to access from a browser. There will also be some users who will have the option for a desktop application setup using Launch.

Please contact the service desk to schedule your PC’s change from “Apps” to “Launch.” We hope to have most machines migrated to the new “Launch” platform by the middle of May so that the transition during the Allscripts upgrade is seamless.


The new Citrix implementation:

  • allows you to save favorites
  • uses the same applications offsite as you do onsite easily (from an ARHS trusted device)
  • allows ARHS to make infrastructure changes seamlessly

Usage Changes:

  • badge access aka “Swipe and Type” will no longer work
  • Password Manager is deprecated and being phased out
  • the slightly different look which may take some getting used to

Try it!

You can try it now by browsing to from inside our network, or externally.

  • Click on the Apps tab at the top to see all of your applications
  • You can add favorites by clicking “Details” right next to the application name then Add to Favorites, and those will be on the first page you see when you log in.
  • This should allow everyone to hop in and out much faster!

We will plan to internally redirect the Apps web page to go to the Launch web page when the cut-over is ready. We will also be creating some documentation that can be downloaded or released as a Teds module.

Security Alert for “Smart” Internet-Connected Devices

Fraudsters successfully affected a record 15.4 million Americans in 2016, up 16% from the year prior, according to the new 2017 Identity Fraud Study from Javelin Strategy & Research. Bringing “smart” objects with you in public can provide opportunities for criminals to attack.

Staying Secure on the Road

1. Precheck

While your network at home or at work may be secure, you should assume that any network you connect to when traveling cannot be trusted.  You never know who else is on it and what they may be doing. Here are some simple steps that go a long way to protecting you and your data before you travel

  • The safest information is information you don’t have.  Identify what data you do not need on any devices you are bringing with you and then remove that information. This can significantly reduce the impact if your devices are lost, stolen, or impounded by customs or border security. If your trip is work related, ask your supervisor if ARHS is cool with you using your device abroad.
  • Lock your mobile devices with a strong password or passcode.  That way if its stolen or lost, its harder for people to access your information on it. In addition, all ARHS devices that are taken offsite are to have full disk encryption enabled.  For most mobile devices, this is automatically enabled when you use a screen lock.
  • Install or enable software on your device so you can remotely track where your device is, even wiping it, if it has been lost or stolen.  These services have the unfortunate side effect of only working when they’re turned on.
  • Update your devices, applications, and anti-virus software before leaving so that you are running the latest versions.  Many attacks focus on systems with outdated software.
  • Do a complete backup of your devices.  This way, if something does happen to them while traveling, you’ll still have all of your original data in a secured location.

2. Lost / Stolen Devices

Once you begin your travel, ensure the physical security of your devices. For example, never leave them in your car where people can easily see them, as criminals can simply smash your car’s window and grab anything of value they can see.  While crime is definitely a risk, according to a recent Verizon study, people are 100 times more likely to lose a device than have it stolen.  This means always double-check you still have your things as you change locations.

3. Wi-fi Access

password memeAccessing the Internet while traveling often means using public Wi-Fi access points, such as ones you find at a hotel, a local coffee shop, or the airport. There are two problems with public Wi-Fi: you are never sure who set them up and you never know who is connected to them. As such, they should be considered untrusted. In fact, this is why you took all the steps to secure your devices before you left. In addition, Wi-Fi uses radio waves, which means anyone physically near you can potentially intercept and monitor those communications. For these reasons, if you do use public Wi-Fi, you need to ensure all of your online activity is encrypted. For example, when connecting online using your browser, make sure that the websites you are visiting are encrypted. You can confirm this by looking for ‘HTTPS://’ and/or an image of a closed padlock in your address or URL bar. In addition, you may have what is called a VPN (Virtual Private Network), which can encrypt all of your online activity when enabled. This may be issued to you by work, or you can purchase VPN capabilities for your own personal use. If you are concerned that there is no Wi-Fi you can trust, consider tethering to your smartphone. Warning: as we mentioned earlier, this can be expensive when traveling internationally. Check with your service provider first.

4. Public Resources

Do not use public computers, such as those in hotel lobbies or at cyber cafes, to log in to any accounts or access sensitive information. You have no idea who used that computer before you, and they may have infected that public computer accidentally or deliberately. Whenever possible, use only devices you control and trust.  At best, public computers are good for public information, such as checking the weather or catching up on the news.  Signing in to any accounts, such as your Google account, could be an invitation to hackers who might be watching.

5. Remember to lock your devices

Just like here at ARHS, you need to remember to lock your device whenever you leave it.  If they didn’t physically take the device, they could still have time to install software that would allow them to remote control your machine, capture all your keystrokes, or even worse… set your desktop background to a picture of David Hasselhoff.  The WindowsKey + L is a keyboard shortcut to lock your computer.

Remember, no one in IT will ever ask you for your password.  Do not ever give someone in IT your password.  That puts both of you at risk and in violation of HIPAA compliance.