What you need to know about EHR hardware

August 6th, 2018
What you need to know about EHR hardware

Medical history, vaccine status, lab test results, and other medical records are libraries unto themselves. Checking such files without the aid of computers can be cumbersome. Thanks to EHR, hospital staff can access these information with ease.

EHR stands for “Electronic Health Record,” and a lot can go into getting your practice ready for one of these data-sharing, network-connected, enterprise-wide information systems.

Why Healthcare needs Mobile Device Management

July 2nd, 2018
Why Healthcare needs Mobile Device Management

Surveys and studies show that wireless device usage in the healthcare industry is growing at an exponential rate, falling in line with the general trend in today’s society. The IT staff must work harder to monitor all the devices using the network, but there are Mobile Device Management (MDM) solutions that can make their jobs easier.

How to defend against insider threats

June 5th, 2018
How to defend against insider threats

First off, what is an insider threat in healthcare? An insider threat is an individual inside an organization discovered to have been accessing healthcare records without authorization. Healthcare companies must take steps to reduce the potential for insider threats, which is their top source of security incidents.

How HIPAA Impacts Social Media Usage

May 7th, 2018
How HIPAA Impacts Social Media Usage

Social Media can be an effective tool for sharing experiences, building professional connections, and broadcasting conventional healthcare announcements to the public. However, careless posts that have client or patient-specific information could ruin the reputation of any healthcare organization.

Cybersecurity approaches to keep PHI safe

April 2nd, 2018
Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough.

Top 3 ways to prevent Spectre and Meltdown

March 5th, 2018
Top 3 ways to prevent Spectre and Meltdown

Data security is critical to the healthcare industry. Hospitals and clinics need to ensure medical records are protected at all times to stay HIPAA-compliant. But with Spectre and Meltdown affecting every server, all healthcare providers are at risk of data breach.

Improving healthcare data storage

February 5th, 2018
Improving healthcare data storage

As more medical practices adopt electronic health records (EHR), running out of digital storage is becoming an increasingly common issue. HIPAA-regulated practices don’t always have the option of cloud solutions, but virtualization is a secure and cost-effective alternative.

Is EHR useful?

January 1st, 2018

The fact that the world is going digital is unprecedented. With that in mind, the healthcare industry has also decided to embrace the digital trend in the form of EHRs. Short for electronic health records, this new type of data management system aims to improve on traditional paper-based ways.

Key points from Protenus’ new report!

December 4th, 2017
Key points from Protenus’ new report!

In November 2017, healthcare data security and privacy company Protenus released a report on the most common security breaches in healthcare. Here are a few key takeaways.

Insiders are a bigger threat than hackers

Protenus is one of the largest security vendors for electronic health records (EHRs) and their mid-year review sheds some important light on the most common types of security breaches in healthcare.

Mobile devices and HIPAA compliance

November 6th, 2017
Mobile devices and HIPAA compliance

Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices.