There is no doubt that technology has brought improvements to almost every professional field, including healthcare. While the medical field has been slower to adopt technology and software improvements, we are seeing the use of web-based software increase in place of using paper, which is due in part to mobile and tablet devices that have become commonplace. We should now focus on utilizing the technologies that we’ve created to set a new standard of secure but, accessible provider and patient data.
Through ongoing advancements in healthcare technology, healthcare providers and patients can now access broader communication applications thanks to advances in data storage. These advancements have improved collaboration, increased communication outlets and have transformed the way data is stored and shared.
On March 19, the Alabama Department of Public Health (ADPH) issued mandatory health orders to medical practices statewide to delay all elective medical and dental procedures until April 6th. On March 28, the order was amended such that non-emergency procedures are postponed further notice. Under these guidelines, Medical and dental practices have had to reduce office hours and/or close their office.
Unfortunately, significant events like the COVID-19 pandemic typically lead to a rise in phishing attacks that leverage the ongoing situation to fool people into providing confidential information or downloading malicious software. Now is a good time to remember a few key characteristics of phishing attacks to help prevent being a victim of a phishing attack.
We live in a three-dimensional world, where many physicians and surgeons diagnose, treat and operate on patients using flat images, but that is not the case at Children’s of Alabama. Seven years ago, I helped open Children’s first 3-D laboratory, which provides cutting-edge technology through advanced visualization. We help our medical staff provide a clearer, less invasive and more realistic view of joints and organs. With this type of information, doctors can also give patient families a clearer vision and understanding of their child’s condition.
By now you have probably heard this and read it a thousand times. But one last time, we will cover it with some background on the whys and how’s.
With more healthcare organizations moving to VoIP (Voice-over-Internet Protocol) for their phone and communication needs, it’s important to understand the technology and how to make it work for your business needs. So let’s start with the basics.
Information Technology now dominates almost every part of our daily lives and in most cases, we do not have to think or worry the outcomes. We trust that what we input on our phones, keyboards and tablets will result in the right answer. With these repetitive motions it has allowed our business to grow and flourish. But what happens when those items break?
VoIP is a game-changer for the healthcare industry’s communication landscape, allowing for quicker, more reliable communication. However, it also brings with it a multitude of HIPAA concerns that can be confusing to navigate.
Yesterday, I received a text from my eye doctor informing me that I have not scheduled my yearly exam and need to make an appointment. The notification was an electronic version of the Annual Patient Postcard reminders. But unlike the old postcards, the text included links to automatically call the office or direct me to visit self-scheduling. Booking that appointment has been on my to-do list for weeks, but I seem to only remember to do it after the office has closed. Yet, with one click and about two minutes of my time, the mission was accomplished. That’s when it dawned on me – healthcare is going “Amazon.”
There is no one simple solution that will eliminate all business security risks. However, organizations can build a robust internal culture of security that can profoundly decrease those risks. This approach starts from the top down.
Sound processes are essential to the success of any business. This is even more important in healthcare, where the ever-changing environment makes process improvement vital in order for a practice to prosper.
Over the last few years, cell phones have become computers, capable of much of the functionality that your office computer has. This is also true for small portable devices such as iPads, Windows and Android tablets. Are these devices and applications as secure as those you use from your clinic? In most cases, the answer is no.
As our society transitioned to mobile phones, a frequently overheard question and related advertising theme was “Can you hear me now?”
Check-ups, tests, and results. Doctors provide, measure, and deliver data to patients every day, often with profound implications. Financial advisors, at least the diligent ones, offer the same to their clients. Much of our data focuses on helping people have confidence that they can do what they want to do and not run out of money at the same time. Approaches and technical tools may vary, often with significant differences in degrees of sophistication. It has been common practice for advisors to use these tools to help project a portfolio’s ability to provide income for retirement. Rates of return are calculated, spending requirements input, withdrawal rates assumed, and end-of-life portfolio values projected.
Atrial fibrillation (AFIB), a condition in which the heart fires so rapidly that the upper chambers quiver instead of beating in a normal rhythmic pattern, is the now most common arrhythmia condition worldwide and is recognized as a global health problem with its burden of morbidity and mortality resulting from embolic stroke. AFIB is expected to double by 2030.
In 2016 Forrester Research analysts focused their attention on emerging social phenomenon in consumer behavior. They identified several key social trends that are impacting our industry’s ability to adapt to changing policy, market trends and patient needs. One trend they observed was the rapid adoption of new solutions and the abandonment of solutions that didn’t immediately provide value. This trend was seen across all industries.
January 14, 2020 is a special day for Microsoft Corporation (you know that little company that controls 82.88 percent of the computer software market share). On that date, Microsoft will end the life of some of the major software that businesses use. End of life means that the manufacturer will no longer support the product. This list includes:
One of the most frustrating things PC users can experience is slow performance or freezing while using their normal programs. It can make even the simplest tasks take several times longer and greatly slow down your work day, which impacts patient care as well. While it will sometimes mean there could be hardware issues and your PC needs an upgrade, there are several steps that you and your IT support can take to speed up the performance of your PC through cleanup tools, anti-virus and anti-malware scans, or optimizing settings.
Malware are created with the intent to damage or disable our mobile devices, computers or servers. These attempts can include disrupting computing or communication operations, trying to steal sensitive data, accessing our private networks, or hijacking our systems to exploit their resources. With the tremendous growth in email and internet use over the last couple of decades, we have seen a corresponding explosion of growth in malware
I recently visited a specialty practice at a major health system. As I approached the registration desk a posted sign directed me to a standing kiosk to sign in. The family member I accompanied to the visit was unable to stand at the kiosk, so I provided the needed information and signed her in. Although it was a quick and seamless process, I was concerned because if I needed assistance, there were no employees to ask. Many practices have implemented kiosk sign-ins and have someone to assist a patient with the process if needed. Practice administrators have made the decision to implement kiosk to assure verification of the current insurance policy and prompt the patient to pay any out of pocket expense before they see the doctor. Many of the kiosk solutions allow a pre-registration via email to allow the patient to populate data and upload information from their own device at their convenience. Benefits of Kiosk Sign-ins include: reduction in the staffing at the front desk, decrease in patient wait time, and most impressively is the increase of time of service collections.
One of the greatest challenges healthcare organizations face today is clinical application interoperability – the communication between computer systems, applications, or software to allow them to work in conjunction with one another.
It is especially important for smaller practices to be mindful of Electronic Protected Health Information (ePHI) security regulations – a breach of ePHI can lead to costly notification requirements and potential monetary penalties under the HITECH Act. Managing physicians of small independent practices hold many responsibilities, including the duty to comply with the Security Rule within HIPAA regulations. This article provides a brief overview of federal ePHI compliance safeguards required in a practice. While not meant to be a comprehensive discussion of all requirements, it highlights legal considerations and safeguards a practice must implement to comply with HIPAA ePHI regulations. The federal Security Rule under HIPAA requires a health care provider (typically known as a Covered Entity) to have the minimum ePHI safeguards, listed below.
As today’s healthcare drive pushes practices even further down the path of pay for performance versus the older models of pay for volume, administrators and executives throughout healthcare are researching and implementing ideas to provide an overall better experience for patients.
In 2012, I read this article that made me question much of what I thought I knew about my profession of serving clients as a guide for their financial decisions. The designation following my name for which I had worked so hard at obtaining? Good, but not enough. The incredible technology –from complex financial forecasting to automated investment management? Lacking.
According to the Ponemon Institute – www.ponemon.org - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.
If you surveyed managing physicians and office managers from the Birmingham area about their business continuity plans, how confident do you think they would be with their Disaster Recovery solution? Do they feel prepared? Have they even thought about it?
Physicians and other medical care professionals spend years studying, training and preparing themselves to provide best possible care to their patients. In many instances, these professionals spend the bulk of their attention and energy on treating their patients and meeting the day-to-day challenges that come with providing the best care possible. Unfortunately, practicing in today’s economic climate within a medical industry undergoing a vast transformation has forced many medical professionals to place equal value on business issues that effect their practice. Often times, the business of operating a medical practice is never discussed in medical school. Instead, many healthcare professionals are forced to learn fundamental business principles on the fly in private practice. With the emergence of electronic medical records and coding, many healthcare providers and practices are spending a substantial amount of time concentrating on the business of healthcare in addition to patient care. Of all the business issues that must now be prioritized by the medical industry, medical billing and managing account receivables can bear the most burden of all.
The state’s first spine procedure using the Mazor Robotic System in conjunction with intraoperative imaging was performed by neurosurgeons with Neurosurgical Associates, PC at St. Vincent’s Birmingham.
Did you know a single patient health record can earn cybercriminals 10 times the price of a stolen credit card number on the black market?
The Office of Civil Rights is auditing small and large healthcare providers alike, imposing multi-million dollar fines in some cases. Meanwhile, the same electronic storage, mobile devices, and cloud-based applications that patients, doctors, and healthcare staff want to use often compromise a practice’s ability to keep that patient data safe.
It has now been two years since the implementation of ICD-10, everyone survived! While denials have been minimal, the goal of implementing ICD 10 to acquire more specificity and a complete picture of health has not been fully achieved. Physicians and managers have created a new set of shortcuts to assure payment of claims, relying on paper superbills or inappropriate conversions from ICD 9 to ICD 10.
Moving a medical practice can be a daunting task. A medical office move can be a result of needing a bigger space, physician retirement, or practice acquisition. While making patients aware of a major change is most certainly a priority, it is equally important to make sure their documents and all office data and service equipment survives the move as well.
You may not be getting all you can out of your browsing experience
and may be open to security risks!
Consider upgrading to the latest version of your browser or choose on below: