The following is a guest blog post by Eric Fischer is the Digital Marketing Specialist for Estone Technology. As more and more practices, both small and large...
EHR Security
In theory, you want everyone who accesses a patient’s health data to leave a clear footprint. As a result, it’s standard to assign every clinician using EMR...
The good people at ClinicSpectrum recently shared a look at why small practices are at risk for a cyber attack. They label it as why your EHR is at risk for a...
The following is a guest blog post by Mike Semel, President and Chief Compliance Officer at Semel Consulting. The federal Office for Civil Rights just...
The following is a guest blog post by Mike Semel, President and Chief Compliance Officer at Semel Consulting. If your cyber security and compliance program is...
The following is a guest blog post by Anna Drachenberg, Founder and CEO of HIPAA Risk Management. Our firm has been helping dentists and other healthcare...
When we start purchasing our EHR, many times we don’t spend enough time thinking about what happens when we reach the end of life for the software...
A hospital administrator reminding us of security issues of paper medical records & faxes: (bottom of page) #EHR #HIE — CORHIO (@CORHIO) July 25...
Providers that use cloud-based EMRs should have an outside party audit the EMR before they begin using them in production, according to a Journal of Medical...
Black-hat hackers are beginning, slowly but at an increasing pace, to lock down and encrypt medical data, then demand a ransom fee before they’ll turn...