Get ready for the next wave of ransomware

September 4th, 2017
Get ready for the next wave of ransomware

The WannaCry and Petya ransomware attacks were a huge wakeup call for healthcare organizations to update their security software. Unfortunately, hackers evolve at an incredible rate, and they’ve developed a new ‘Locky-like’ ransomware strain that can catch many in the healthcare industry off guard.

Blockchain and healthcare: what to expect

July 31st, 2017
Blockchain and healthcare: what to expect

Blockchain is the newest technology to fuel the Silicon Valley hype train. Everyone is talking about the wonderful things it can do, but few have explained how it works in layman’s terms. Stay ahead of your competition with a crash course in this new and exciting technology!

What is blockchain?

Although the technology was first associated with Bitcoin and other digital currencies, blockchain is not exclusive to the financial sector.

MR to be removed from Google search

July 3rd, 2017
MR to be removed from Google search

Google has recently made changes to its personal information policy, including a major one for the healthcare industry. The search giant has begun removing private medical records from its search results, preventing cybercriminals from taking advantage of these resources that were previously available after only a few keystrokes.

Prevent ransomware with HIPAA compliance

June 5th, 2017
Prevent ransomware with HIPAA compliance

Keeping up with HIPAA regulations may be a pain for most healthcare institutions, but it does provide guidelines on how to protect your organization from devastating cyberattacks. That said, following HIPAA rules may be your best shot in fending off ransomware like WannaCry.

Kanye West and HIPAA: an unlikely lesson

May 1st, 2017
Kanye West and HIPAA: an unlikely lesson

A few generations ago, healthcare workers had far fewer opportunities to gossip about patients. But with social media and instant messaging, healthcare employees have plenty of opportunities to breach information before realizing what they’ve done.

The rising popularity of telemedicine

April 3rd, 2017
The rising popularity of telemedicine

Telemedicine means exactly as it sounds — a medical service delivered via telephone or any communications technology. It sounds like a new development in medicine, but it’s really not. Although there have been many great advances in healthcare, most people prefer the conventional way of getting treatment at the hospital or clinic.

Healthcare software: a healthy development

March 6th, 2017
Healthcare software: a healthy development

Healthcare providers have a lot on their plate: Caring for patients is first and meeting compliance regulations comes at a close second. Hospitals and smaller practices truly benefit from technology experts coming on-site, installing all the right IT systems, and leaving clearly outlined instructions, amounting to a swift and inexpensive process.

2017 HIPAA forecast: 3 important reminders

January 30th, 2017
2017 HIPAA forecast: 3 important reminders

When talking about IT within the healthcare industry, it’s pretty difficult for conversations to stray too far from HIPAA compliance. And as the number of audits and penalties continue to increase, those conversations only become more prevalent. As small- and medium-sized businesses review their policies at the beginning of a new year, let’s cover some of the most fundamental HIPAA considerations, right here.

Technology integration benefits patients

January 2nd, 2017
Technology integration benefits patients

Quick, name an industry that hasn’t been vastly improved by new technologies. It’s not easy to do, and would be especially difficult to argue when discussing medicine, where hi-tech advancements make everything possible from transdermal glucose monitors to genome sequencing.

Malware booby traps images to steal EMRs

December 5th, 2016
Malware booby traps images to steal EMRs

A piece of malware known as Stegoloader continues to wreak havoc on healthcare companies that inadvertently download it under the guise of product keys. The malware steals information from infected machines and spreads itself through the compromised network.