Blog

Medical Practice

Why Medical Practice IT Support is Crucial to Your Business

As in most industries, technology has become a huge part of the healthcare industry. Technology-driven equipment, patient notification systems, and electronic medical records have changed the way patients are treated. Technology continues to advance the treatment available to patients and improve the options available to the healthcare industry. But, with these advances, also comes complications as medical professionals work to…

HIPPA Compliance

7 Steps to Maintain HIPPA Compliance

The world of technology continues to change the way we do business. As more medical practices turn to online form completion and advanced medical records databases, it is important to assess your HIPPA compliance efforts. HIPPA compliance is an important part of any medical practice. Healthcare organizations are required, by law, to comply with HIPPA regulations. If you are found…

Feds fine eClinicalWorks $155M for EHR performance issues

A major vendor of electronic health record systems for physicians, eClinicalWork, will pay the federal government $155 million to settle a False Claims Act lawsuit contending that its products are faulty. The settlement is the first of its kind for a healthcare information technology company facing formal charges that its systems did not help providers achieve objectives of the Meaningful…

Medical Devices Reportedly Infected in Ransomware Attack

HITRUST investigations show that medical devices were infected in the recent WannaCry ransomware attack that affected 150 countries. The recent WannaCry ransomware attack that infiltrated more than 150 countries and forced some European healthcare organizations to suspend certain services reportedly infected certain medical devices as well. HITRUST explained in an email update that its investigations found that MedRad (Bayer), Siemens, and other…

Top 10 Tips for Cybersecurity in Health Care

We will speak in detail about each section over the coming days but for now here is the list. Not in any order 1. Establish a Security Culture 2. Install and Maintain Anti-Virus Software 3. Use Strong Passwords and Change Them Regularly 4. Protect Mobile Devices 5. Maintain Good Computer Habits 6. Use a Unified threat management Firewall 7. Plan…