BMN Blog

OCT 08

Just as it’s common for our families to have “Dr. Mom,” it’s also common for one spouse to serve as the family’s Chief Financial Officer (CFO). The family CFO takes the lead in paying bills, making investment decisions, selecting insurance policies and employee benefits, etc. This division of labor is common because one spouse may have more interest in financial matters, and the set-up works fine - as long as both spouses are physically and mentally healthy.

Read More
 
OCT 01
The Art of IT Service By Joe Johnston, Technical Solutions Architect in Technology

Information Technology now dominates almost every part of our daily lives and in most cases, we do not have to think or worry the outcomes. We trust that what we input on our phones, keyboards and tablets will result in the right answer. With these repetitive motions it has allowed our business to grow and flourish. But what happens when those items break?

Read More
 
AUG 14
What Makes a VoIP Phone System HIPAA Compliant? By Christina Southern, C Spire Business in Technology

VoIP is a game-changer for the healthcare industry’s communication landscape, allowing for quicker, more reliable communication. However, it also brings with it a multitude of HIPAA concerns that can be confusing to navigate.

Read More
 
JUL 10

There is no one simple solution that will eliminate all business security risks. However, organizations can build a robust internal culture of security that can profoundly decrease those risks. This approach starts from the top down.

Read More
 
JUN 13
Are your Portable Devices Safe? By Curtis Woods, President at Integrated Solutions, LLC in Technology

Over the last few years, cell phones have become computers, capable of much of the functionality that your office computer has. This is also true for small portable devices such as iPads, Windows and Android tablets. Are these devices and applications as secure as those you use from your clinic? In most cases, the answer is no.

Read More
 
MAY 17
HIPAA Myths and Misconceptions By Loretta Duncan, FACMPE in Business

Trying to comply with HIPAA can be a challenge for healthcare providers, especially when there is so much confusion about specific aspects of the rules. Policyholders contact SVMIC almost every day for assistance with HIPAA-related issues. In fielding those calls and emails, we have identified some commonalities.

Read More
 
MAY 06

Check-ups, tests, and results. Doctors provide, measure, and deliver data to patients every day, often with profound implications. Financial advisors, at least the diligent ones, offer the same to their clients. Much of our data focuses on helping people have confidence that they can do what they want to do and not run out of money at the same time. Approaches and technical tools may vary, often with significant differences in degrees of sophistication. It has been common practice for advisors to use these tools to help project a portfolio’s ability to provide income for retirement. Rates of return are calculated, spending requirements input, withdrawal rates assumed, and end-of-life portfolio values projected.

Read More
 
MAY 01

Over the past several years the healthcare industry has become the number one target of cyberattacks. These attacks have exposed tens of millions of customers’ identities worldwide, costing an estimated $1 billion USD in losses.

Read More
 
MAR 19
Healthcare Staff: Are You Prepared for an Active Shooter? By Teresa Fields, Debbie Franklin, Marie Howatt, and Lisa Rawlings. in Business

We have heard a lot from the media on active shooter events throughout the U.S., but how many of these include healthcare facilities? The Homeland Security and the FBI define “active shooter” as “an event where one or more persons actively engage in killing or attempting to kill people in a populated area.” Statistics show active shooter incidents involving healthcare facilities are less common than other events, but they can occur, so planning may save lives.

Read More
 
JAN 25

A recent global study by the Ponemon Institute finds that the financial damage caused by a data breach has risen by 6.4 percent in the last year and now costs companies an average of $3.86 million each.

Read More
 
DEC 12
Big Changes Coming with Microsoft Systems By Curtis Woods, President at Integrated Solutions, LLC in Technology

January 14, 2020 is a special day for Microsoft Corporation (you know that little company that controls 82.88 percent of the computer software market share). On that date, Microsoft will end the life of some of the major software that businesses use. End of life means that the manufacturer will no longer support the product. This list includes:

Read More
 
NOV 05

A look at the calendar tells us that we only have a short time left in 2018. That means many practices will be looking to complete their Security Risk Assessments in order to either qualify for the 2018 Merit-based Incentive Payment System (MIPS) or to simply fulfill their obligations to comply with the HIPAA Security Rule.

Read More
 
OCT 30

National Cybersecurity Awareness Month was created in 2004 by the Department of Homeland Security and the National Cyber Security Alliance to remind us that each we all have the power to make the Internet safer.

Read More
 
JUL 30
EHR in the Cloud? – Make sure the I’s are Dotted and the T’s are Crossed By Curtis Woods President at Integrated Solutions, LLC in Technology

Is your EHR application in the cloud or are you considering moving to a cloud based provider? If so ensuring that you know the providers processes for data backup, disaster recovery and overall security are extremely important.

Read More
 
JUL 11
Combatting fraud in the Medical Industry By Sarah Propper, CPA with Pearce, Bevill, Leesburg, Moore, P.C in Business

Fraud. It’s an ugly thing and it’s everywhere, the medical industry is no exception.  When most people think about fraud, they think about white collar criminals stealing millions of dollars from big name companies, or the “dark web” where most of our social security numbers and credit card numbers are floating around just waiting for a buyer.  The truth is most businesses will experience some type of fraud during their operation.  It is so important for owners and business managers to be constantly vigilant to protect their practices.

Read More
 
JUN 14
Malware Detection and Prevention: the never-ending battle By Ron Prevatte, Director of Sales and Business Development with Integrated Solutions in Technology

Malware are created with the intent to damage or disable our mobile devices, computers or servers. These attempts can include disrupting computing or communication operations, trying to steal sensitive data, accessing our private networks, or hijacking our systems to exploit their resources. With the tremendous growth in email and internet use over the last couple of decades, we have seen a corresponding explosion of growth in malware

Read More
 
JUN 07
Work-Arounds are Jeopardizing Your Patient Data By Christina Southern with TekLinks in Technology

One of the greatest challenges healthcare organizations face today is clinical application interoperability – the communication between computer systems, applications, or software to allow them to work in conjunction with one another.

Read More
 
MAY 16
ePHI Safeguards Requirements and Small Practices: What Physicians Need to Know By Hayley Scheer, J.D., LL.M. Health Law Attorney, Cabaniss, Johnston, Gardner, Dumas & O’Neal LLP in Regulatory

It is especially important for smaller practices to be mindful of Electronic Protected Health Information (ePHI) security regulations – a breach of ePHI can lead to costly notification requirements and potential monetary penalties under the HITECH Act.[1]  Managing physicians of small independent practices hold many responsibilities, including the duty to comply with the Security Rule within HIPAA regulations.  This article provides a brief overview of federal ePHI compliance safeguards required in a practice.  While not meant to be a comprehensive discussion of all requirements, it highlights legal considerations and safeguards a practice must implement to comply with HIPAA ePHI regulations.  The federal Security Rule under HIPAA requires a health care provider (typically known as a Covered Entity[2]) to have the minimum ePHI safeguards, listed below.

 

Read More
 
APR 03

According to the Ponemon Institute – www.ponemon.org  - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.

Read More
 
MAR 26
Where’s Your Patient Data Hiding? By Robbie Morris, Teklinks in Technology

They were surprised, and you likely be will, too. Of the hundreds of healthcare organizations I’ve helped document HIPAA and meet compliance requirements, most are unaware that their Patient Health Information (PHI) is exposed in some way. If a cyber attacker took advantage of this situation, it could cause damage to your patients, bring giant HIPAA fines, and a loss of reputation.

Read More
 
MAR 22
The Tax Cuts and Jobs Act: An Overview for Physicians By Mark Baker, Principal, Jackson Thornton CPAs and Consultants, January 9, 2018 in Business

The new tax reform law — commonly referred to as the "Tax Cuts and Jobs Act" (TCJA) — is the most significant tax legislation in decades. Although the law was passed only a few weeks ago, the impact on the economy and business outlook cannot be overlooked as the stock market rally continues and both individuals and businesses appear the most optimistic in quite some time.

Read More
 
MAR 09
Calmness in the storm By Patrick Mullins AAMS® with Raymond James / Private Client Group in Business

Between phone calls with clients on another day in the financial trenches at Raymond James & Associates, I brainstormed for a good topic to pontificate upon to the readers of this fine publication, and I hope you’ll agree I found it.

Read More
 
FEB 13
A Physician’s Insider Guide for Social Security Disability Cases By Janet Cox , Attorney at law with Cox Disability Law in Regulatory

Physicians serve on the frontlines of our healthcare system, and by extension the many social programs guaranteed by the Social Security Administration. It’s a large responsibility and we owe them a debt of gratitude. These dedicated care providers, across many areas of practice and at varied levels within our medical system, help more than 57 million children and adults who live with disabilities across the United States.

Read More
 
FEB 08
Think You've Figured Out HIPAA Compliance? Sorry, You're Probably Wrong. By Robbie Morris VP of Healthcare and Security Solution Services with TekLinks in Technology

We hate to break it to you, but there's a HIPAA requirement you’re more than likely doing wrong. The Department of Health & Human Services’ Office for Civil Rights (OCR) is cracking down on requiring a true Healthcare Security Risk Analysis.

Read More
 
FEB 06
Preparing for your Annual Security Audit By Ron Prevatte Director of Sales and Business Development with Integrated Solutions in Technology

Most companies assume their cyber security is pretty good… until a breach happens and then you find out where the holes were. We often find that apathy and a lack of being proactive may cost you lots of money. An annual security audit is a necessity for all medical practices and companies in todays ever changing world of technology. It is a vital part of protecting your digital assets and cyber security plan for your organization. It’s not just about discovering any vulnerabilities or shortcomings, rather it’s about opportunities to strengthen your network security.

Read More
 
NOV 01
When an IT Manager Goes Rogue By Jennifer Lagutin, TekLinks in Technology

Your business' data could be compromised by the most unlikely of sources -- your own IT manager.

Over the past couple months, I’ve encountered multiple chilling examples of IT staff gone rogue. Of course, this isn't happening every day. But when it does, it's especially damaging to organizations with a one-person IT department. These lone IT managers often hold the keys to the kingdom. No one person - IT expert or not - should ever have complete control over passwords, access, processes, etc. Why? Consider these two recent incidents:

Read More
 
OCT 23

There is a lot of confusion about SSDI and SSI, the two types of disability benefits that can be received from Social Security. The definition of disability is the same under both programs, but that is where the similarity ends. The following is a very basic description of the disability programs provided under the Social Security Act, titles II and XVI.

Read More
 
OCT 23
Utilizing New Patient Forms and Credit Applications By Brian M. Cloud, Esq. at Cloud Willis & Ellis, LLC in Regulatory

No matter the size of the business, a successful business must be paid promptly and in full. However, often a business, including a medical practice is dealing with numerous overdue accounts receivables.  Such a financial position can be commonplace in today’s business environment.  Although this financial condition is often perceived as “normal” or “accepted” business practice”, savvy business owners should collect promptly and protect their rights in resolving overdue receivables with the proper policy and procedures in place.  Effective policy and procedures generally begin with utilizing a new patient form and/or the credit application.

Read More
 
OCT 12
ARE YOU PREPARED FOR YOUR BUSINESS ASSOCIATE’S HIPAA BREACH? By Beth Pitman, JD, CHPC, Waller, Lansden, Dortch & Davis LLP in Regulatory

  As of September 30, 2017, the Department of Health and Human Services Office of Civil Rights (OCR) has received notices of 237 breaches. 46% occurred as result of hacking or IT security incidents; many at the business associate level.  Ransomware is rampant and projected to increase 670%.  As a covered entity, although a breach occurs at your business associate, under HIPAA, you are responsible for your protected health information and responding to the breach.  OCR has been clear that breaches of 500 or more records will be investigated. Given the significant increase in breaches over the past few years, advance preparation is critical and can reduce the cost and burden of breach response. 

Read More
 
OCT 02

Did you know a single patient health record can earn cybercriminals 10 times the price of a stolen credit card number on the black market?

The Office of Civil Rights is auditing small and large healthcare providers alike, imposing multi-million dollar fines in some cases. Meanwhile, the same electronic storage, mobile devices, and cloud-based applications that patients, doctors, and healthcare staff want to use often compromise a practice’s ability to keep that patient data safe.

Read More
 
MAY 04
OVER SIXTY YEARS OLD AND STILL MISUNDERSTOOD By : Janet Cox , Attorney at law with Cox Disability Law in Regulatory

Social Security Disability under Title II of the Social Security Act*

Surveys have shown that most Americans know little about Social Security law and the vital benefits it provides. By far, the least understood Social Security benefit is Social Security Disability Insurance (SSDI). This lack of knowledge has been measured through objective testing in various academic studies. Anecdotally, I know this to be true based on recurring questions and comments I have received from the public and clients alike over the last several decades of my work as a social security disability attorney.

Read More
 
APR 27
Recycle Electronics and Keep Your Practice Safe By Blake Perry CTO at Keep IT Simple in Technology

Recycling electronics is a great way to help conserve and reuse valuable resources and materials found in many gadgets, including glass, plastics, and various metals such as copper, gold, palladium, and silver. Many electronics, especially computers and televisions, contain toxic materials such as cadmium, lead, and mercury. Recycling and reusing electronics helps to keep these toxic materials out of our landfills and water supply.

Read More
 
Powered by Bondware
News Publishing Software

The browser you are using is outdated!

You may not be getting all you can out of your browsing experience
and may be open to security risks!

Consider upgrading to the latest version of your browser or choose on below: