BMN Blog

AUG 14
What Makes a VoIP Phone System HIPAA Compliant? By Christina Southern, C Spire Business in Technology

VoIP is a game-changer for the healthcare industry’s communication landscape, allowing for quicker, more reliable communication. However, it also brings with it a multitude of HIPAA concerns that can be confusing to navigate.

Read More
 
JUL 10

There is no one simple solution that will eliminate all business security risks. However, organizations can build a robust internal culture of security that can profoundly decrease those risks. This approach starts from the top down.

Read More
 
JUN 13
Are your Portable Devices Safe? By Curtis Woods, President at Integrated Solutions, LLC in Technology

Over the last few years, cell phones have become computers, capable of much of the functionality that your office computer has. This is also true for small portable devices such as iPads, Windows and Android tablets. Are these devices and applications as secure as those you use from your clinic? In most cases, the answer is no.

Read More
 
MAY 01

Over the past several years the healthcare industry has become the number one target of cyberattacks. These attacks have exposed tens of millions of customers’ identities worldwide, costing an estimated $1 billion USD in losses.

Read More
 
JAN 25

A recent global study by the Ponemon Institute finds that the financial damage caused by a data breach has risen by 6.4 percent in the last year and now costs companies an average of $3.86 million each.

Read More
 
DEC 12
Big Changes Coming with Microsoft Systems By Curtis Woods, President at Integrated Solutions, LLC in Technology

January 14, 2020 is a special day for Microsoft Corporation (you know that little company that controls 82.88 percent of the computer software market share). On that date, Microsoft will end the life of some of the major software that businesses use. End of life means that the manufacturer will no longer support the product. This list includes:

Read More
 
JUL 30
EHR in the Cloud? – Make sure the I’s are Dotted and the T’s are Crossed By Curtis Woods President at Integrated Solutions, LLC in Technology

Is your EHR application in the cloud or are you considering moving to a cloud based provider? If so ensuring that you know the providers processes for data backup, disaster recovery and overall security are extremely important.

Read More
 
JUN 14
Malware Detection and Prevention: the never-ending battle By Ron Prevatte, Director of Sales and Business Development with Integrated Solutions in Technology

Malware are created with the intent to damage or disable our mobile devices, computers or servers. These attempts can include disrupting computing or communication operations, trying to steal sensitive data, accessing our private networks, or hijacking our systems to exploit their resources. With the tremendous growth in email and internet use over the last couple of decades, we have seen a corresponding explosion of growth in malware

Read More
 
JUN 07
Work-Arounds are Jeopardizing Your Patient Data By Christina Southern with TekLinks in Technology

One of the greatest challenges healthcare organizations face today is clinical application interoperability – the communication between computer systems, applications, or software to allow them to work in conjunction with one another.

Read More
 
APR 03

According to the Ponemon Institute – www.ponemon.org  - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.

Read More
 
Powered by Bondware
News Publishing Software

The browser you are using is outdated!

You may not be getting all you can out of your browsing experience
and may be open to security risks!

Consider upgrading to the latest version of your browser or choose on below: