The numbers tell the story.
National Cybersecurity Awareness Month was created in 2004 by the Department of Homeland Security and the National Cyber Security Alliance to remind us that each we all have the power to make the Internet safer.
One of the greatest challenges facing the healthcare industry isn’t a political issue, it’s a geographic issue. What if I told you that approximately 50 million Americans (17 percent of the total population of the US) have limited access to high quality healthcare because they live in rural communities? Rural healthcare has a unique set of challenges including not only geographic but also economic and lifestyle factors.
Malware are created with the intent to damage or disable our mobile devices, computers or servers. These attempts can include disrupting computing or communication operations, trying to steal sensitive data, accessing our private networks, or hijacking our systems to exploit their resources. With the tremendous growth in email and internet use over the last couple of decades, we have seen a corresponding explosion of growth in malware
One of the greatest challenges healthcare organizations face today is clinical application interoperability – the communication between computer systems, applications, or software to allow them to work in conjunction with one another.
According to a recent study by the Cleveland Clinic, more than one-third of physicians are in a silent battle with professional burnout. Physicians dealing with mental, emotional and physical exhaustion become less able to provide quality care to their patients and find themselves leaving the medical profession altogether…or worse. It’s the “or worse” scenario that worries Dr. Debbie Kolb of Madison.
According to the Ponemon Institute – www.ponemon.org - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.
2018 marks 23 years since Children’s of Alabama entered the primary care market, expanding our footprint and brand awareness outside of our main campus on Birmingham’s Southside and strengthening our relationship with doctors who care for kids.
We hate to break it to you, but there's a HIPAA requirement you’re more than likely doing wrong. The Department of Health & Human Services’ Office for Civil Rights (OCR) is cracking down on requiring a true Healthcare Security Risk Analysis.
When Michele Kong was a little girl growing up in Malaysia, she knew the world was filled with both wonder and danger. She surprised herself and her family when she managed to kill a not-so-small python that slithered into their home. She laughs now remembering the incident, but she said someone had to do it to protect her family, and she had the shovel.
Most companies assume their cyber security is pretty good… until a breach happens and then you find out where the holes were. We often find that apathy and a lack of being proactive may cost you lots of money. An annual security audit is a necessity for all medical practices and companies in todays ever changing world of technology. It is a vital part of protecting your digital assets and cyber security plan for your organization. It’s not just about discovering any vulnerabilities or shortcomings, rather it’s about opportunities to strengthen your network security.
We all recognize that healthcare is evolving at a rapid pace. With this evolution, the need to share patient information to positively impact quality care, provide a seamless patient experience, plus save time for your staff to coordinate care is of critical importance. By making the most of new technology, today’s office equipment can easily and securely, help you do just that.
Your business' data could be compromised by the most unlikely of sources -- your own IT manager.
Over the past couple months, I’ve encountered multiple chilling examples of IT staff gone rogue. Of course, this isn't happening every day. But when it does, it's especially damaging to organizations with a one-person IT department. These lone IT managers often hold the keys to the kingdom. No one person - IT expert or not - should ever have complete control over passwords, access, processes, etc. Why? Consider these two recent incidents:
Moving a medical practice can be a daunting task. A medical office move can be a result of needing a bigger space, physician retirement, or practice acquisition. While making patients aware of a major change is most certainly a priority, it is equally important to make sure their documents and all office data and service equipment survives the move as well.
You may not be getting all you can out of your browsing experience
and may be open to security risks!
Consider upgrading to the latest version of your browser or choose on below: