-
by
K Logan
| Mar 19, 2015
Patients are increasingly mobile, and with an increased turn over in the patient landscape, medical practices are challenged with a new tier of administrative work. When you factor in the adoption of Electronic Health Records (EHR) and the necessary compliance with the HITECH Act and Meaningful Use programs, it becomes even more challenging to send, receive and share patient records and medical information in a secure and compliant manner.
Full story
-
by
K Logan
| Feb 23, 2015
Upon audit, 24% of practices failed to meet standards for Electronic Health Records (EHR) incentives they'd received. Small practices had to repay the government an average of $16,862. Out of those audit failures, nearly 70% were because the practice did not conduct an annual risk assessment, required by the Health Insurance Portability and Accessibility Act (HIPAA).
Full story
-
by
K Logan
| Feb 05, 2015
When it comes to document management, the focus is often on just that: managing documents. While this might make documents easier to find, it doesn’t necessarily simplify locating information.
Full story
-
by
K Logan
| Jan 29, 2015
Few agencies covered under the Health Information Portability and Accessibility Act (HIPAA) feel confident about the Office of Civil Rights (OCR) or Department of Health and Human Services (DHHS) poking around. Despite this, there are a number of ways that this might become the case. Here are 5 tips to take control of your HIPAA compliance.
Full story
-
by
K Logan
| Jan 20, 2015
Gone are the days where business telephones are hunks of plastic tied to a wall line. So what does a company need in order to ensure the best customer service available to their clients? Today’s phone systems can multiply the productivity of each employee, enable a more mobile workforce and, most importantly, enhance your customer service.
Full story
-
by
K Logan
| Nov 19, 2014
By now you’ve likely heard of “The Internet of Things.” Perhaps you dismissed it as some expression referring to the amount of things you can get done via digital technology. To some extent, that is true. The “Internet of Things” describes any device linked to the internet that allows for coordinated activities and the exchange of data between the device and a host device. These devices do not need to be of the same type to work together.
Full story
-
by
K Logan
| Nov 11, 2014
When it comes to cybersecurity, an ounce of prevention is worth a pound of cure. That is to say, most malware, including ransomware, is easier to prevent than fix. While many organizations have policies about cybersecurity, a lot of these policies have not been updated in a while. Some other organizations simply rely on people to use common sense, which can prove detrimental if the wrong employee encounters a threat they are unfamiliar with.
Full story
-
by
K Logan
| Nov 04, 2014
Ransomware is a type of malware that restricts use of the infected computer or mobile device so that users cannot access applications and files. The malware creator demands a ransom to “unlock” the computer. Considering the lucrativeness of this threat, this type of cybercrime is expected to continue increasing.
Full story
-
by
K Logan
| Oct 24, 2014
Cybersecurity is an increasingly dangerous threat to businesses and organizations of all sizes, and it spans across websites, emails, mobile devices and other wireless appliances. The damages don't come lightly for those affected. Between loss of reputation, data losses, potential fines and spying, organizations face hefty financial losses that can last several years.
Using the most up to date available reports from the leading security analysts, we've put together a handy cybersecurity infographic to help organizations understand the different threats they face and their probability of being attacked.
Full story
-
by
K Logan
| Oct 14, 2014
As companies increasingly discover the true potential that information provides, demand for document management software continues to grow rapidly. As this trend continues, more software companies are offering free or low-cost document management add-ons to existing software you might be using.
The old adage “there’s no such thing as a free lunch” comes to mind, and certainly software is not the exception to this rule – not by a longshot. With vendors offering up these add-on features, it’s important to point some key reasons that a free document management solution may be more hindrance than help.
Full story
-
by
K Logan
| Aug 26, 2014
A new threat was unveiled at the recent Black Hat 2014 security conference in Las Vegas. The exploit can invade your network using common USB devices, a highly ubiquitous tool with a fatal flaw. They aptly named this vulnerability badUSB.
Full story
-
by
K Logan
| Aug 21, 2014
With the right language, your security policy can mitigate threats and reduce the impact of any breaches that do happen. The result is a boost in productivity, a reduction in network downtime, and the ability to provide reassurance to customers that their personal and financial information is safe in your hands. Here are 6 essential things your IT security policy needs to address.
Full story
-
by
K Logan
| Aug 21, 2014
Traditionally, phishing attacks were sent en masse. In response to protective measures, some cyber criminals have changed their tactics to a more targeted approach – spear phishing.
Full story
-
by
K Logan
| Aug 14, 2014
By the year 2017, 91 percent of businesses are projected to have integrated the cloud into their organization.When you lay out the benefits to businesses, it is clear to see why so many organizations are expected to transition to cloud in the next three years: competitive advantage. Cloud computing is taking the business world by storm, and it shows no sign of letting up.
Full story
-
by
K Logan
| Aug 04, 2014
Printers are a ubiquitous presence in nearly every business. Despite their frequent use, they are often forgotten when companies strategize about how to save costs. That's because most people don’t think about how much money toner costs or how the placement of printers impacts their cost. For many managers, these costs are all seemingly inevitable, and not worth the effort to get under control. Unfortunately, unmanaged print costs can account for thousands of wasted dollars.
Full story
-
by
K Logan
| Jul 22, 2014
Although businesses rely more heavily on technology, many of them are missing some of the ways that standard office equipment can improve productivity and reduce paper-intensive processes. Scanners as part of Multifunction printers (MFPs) or copiers allow for a seamless flow of information from the constant streams of digital and paper coming through the office.
Full story
-
by
K Logan
| Jul 18, 2014
According to Symantec, digital security threats have risen by 300 percent for small and medium businesses between 2011 and 2012. Yet 66 percent of SMBs are not concerned about IT threats. Companies need solid security policies to help protect their assets. Here is what you should consider before you create your IT security policy.
Full story
-
by
K Logan
| May 07, 2014
With the recent release of the climate change report, it is clear that we should all take as many actions as we can to lower our impact on the environment. While going “green” is often associated with a big bill, the majority of these practices are common sense ways to cut back on costs around the office as well.
Full story
-
by
K Logan
| Apr 18, 2014
The Heartbleed Bug has been all over the media in the past week, but a lot of myths and uncertainties still surround the bug. Here is everything you need to know about the bug, how it works, what it affects and what you can do about it.
Full story
-
by
K Logan
| Apr 08, 2014
After today, April 8th, people still using Microsoft's Windows XP Operating System will be facing tremendous risks.
Full story