BMN Blog

AUG 14
What Makes a VoIP Phone System HIPAA Compliant? By Christina Southern, C Spire Business in Technology

VoIP is a game-changer for the healthcare industry’s communication landscape, allowing for quicker, more reliable communication. However, it also brings with it a multitude of HIPAA concerns that can be confusing to navigate.

Read More
 
JAN 25

A recent global study by the Ponemon Institute finds that the financial damage caused by a data breach has risen by 6.4 percent in the last year and now costs companies an average of $3.86 million each.

Read More
 
OCT 30

National Cybersecurity Awareness Month was created in 2004 by the Department of Homeland Security and the National Cyber Security Alliance to remind us that each we all have the power to make the Internet safer.

Read More
 
JUN 07
Work-Arounds are Jeopardizing Your Patient Data By Christina Southern with TekLinks in Technology

One of the greatest challenges healthcare organizations face today is clinical application interoperability – the communication between computer systems, applications, or software to allow them to work in conjunction with one another.

Read More
 
FEB 08
Think You've Figured Out HIPAA Compliance? Sorry, You're Probably Wrong. By Robbie Morris VP of Healthcare and Security Solution Services with TekLinks in Technology

We hate to break it to you, but there's a HIPAA requirement you’re more than likely doing wrong. The Department of Health & Human Services’ Office for Civil Rights (OCR) is cracking down on requiring a true Healthcare Security Risk Analysis.

Read More
 
FEB 06
Preparing for your Annual Security Audit By Ron Prevatte Director of Sales and Business Development with Integrated Solutions in Technology

Most companies assume their cyber security is pretty good… until a breach happens and then you find out where the holes were. We often find that apathy and a lack of being proactive may cost you lots of money. An annual security audit is a necessity for all medical practices and companies in todays ever changing world of technology. It is a vital part of protecting your digital assets and cyber security plan for your organization. It’s not just about discovering any vulnerabilities or shortcomings, rather it’s about opportunities to strengthen your network security.

Read More
 
Powered by Bondware
News Publishing Software

The browser you are using is outdated!

You may not be getting all you can out of your browsing experience
and may be open to security risks!

Consider upgrading to the latest version of your browser or choose on below: