While the costs tied to protection can be daunting, especially for small organizations, the costs only increase after an attack.
Continue readingCategory Archives: IT Challenges
WannaCry Ransomware Attack – Heading Off Future Attacks
As you know, the “WannaCry” ransomware attack has impacted hundreds of thousands computers with Microsoft operating systems in more than 150 countries around the globe. Several hospital networks in the UK and other countries were included in the attack. We hope your hospital was not one of them.
Continue readingTOPIC COLLECTION: Cybersecurity
Recent cyberattacks on healthcare facilities have had significant effects on every aspect of patient care and organizational continuity. They highlight the need for healthcare organizations of all sizes and types to implement cybersecurity best practices and conduct robust planning and exercising for cyber incident response and consequence management. As the number of cyberattacks on this sector increases, healthcare practitioners, facility executives, information technology professionals, and emergency managers must remain current on the ever-changing nature and type of threats to their facilities, systems, patients, and staff. The resources in this Topic Collection can help stakeholders better protect against, mitigate, respond to, and recover from cyber threats, ensuring patient safety and operational continuity.
Continue readingThe Application Developer’s Conundrum: Advancing the Technology While Maintaining Backward Compatibility
As software developers, we’re always working on enhancing our technology. We aim to progress our solutions’ functionality to the leading edge rather than just keeping it up-to-date with the current trends. Applications are typically developed based on the latest operating systems and servers (currently Windows 2016), however the OS that our customers have installed and use can be older, such […]
Continue readingThe Rise of Medical Identity Theft
When thieves take your personal data to get prescription drugs, doctor care, or surgery, it can endanger your health and trash your finances
Continue readingPonemon: 89 percent of healthcare entities experienced data breaches
Half are caused by criminal cyber attacks, half by human error.
Continue readingEverything You Need to Know About Ransomware Attacks (But Were Afraid to Ask)
Ransomware Attacks Ransomware has been in the news a lot in recent weeks following attacks on businesses (less-publicized) and hospitals (Kentucky, Three Hospitals, CA Hospital, etc.). As a service to the healthcare community, we are providing a centralized resource for information on the issue, as well as links to pro-active and reactive remediation. What is Ransomware? According to Trend Micro, Ransomware is a type of […]
Continue readingEnsuring an Effective Product Implementation
When customers are getting ready to implement one of our software products, they want to make sure they perform certain tasks and allocate the resources necessary to make the implementation effective and executed in a timely fashion. Here’s a check list of action steps for you: Have your server set up. Before any implementation begins, customers need to have the right […]
Continue readingThe Reality (or Myth) of Interoperability: Is it the Death of Plug and Play?
When interoperability was introduced, the thinking was that it would simplify everything and lead to a virtual integration of disparate applications. Technology would be plug and play, seamlessly and automatically working together. However, that has proven to not be the case. Although interoperability in essence seems simple, there is a lot that can go wrong with it, and it is […]
Continue readingPonemon: Business continuity management vital for data breach recovery
Average cost per lost or stolen record is less for organizations employing BCM, group finds.
Continue reading