Our Take on Healthcare Tech Since 1997

The Inevitable HCIS Downtime

The Inevitable HCIS Downtime

What goes up must come down. As healthcare processes have become more and more automated and healthcare organizations transferred to electronic health records to simplify patient data management, a new set of challenges has emerged. Security of electronic patient data is one, mainly due to HIPAA and other governmental regulations. Healthcare information system (HCIS) reliability is another challenge.

Continue reading

TOPIC COLLECTION: Cybersecurity

Recent cyberattacks on healthcare facilities have had significant effects on every aspect of patient care and organizational continuity. They highlight the need for healthcare organizations of all sizes and types to implement cybersecurity best practices and conduct robust planning and exercising for cyber incident response and consequence management. As the number of cyberattacks on this sector increases, healthcare practitioners, facility executives, information technology professionals, and emergency managers must remain current on the ever-changing nature and type of threats to their facilities, systems, patients, and staff. The resources in this Topic Collection can help stakeholders better protect against, mitigate, respond to, and recover from cyber threats, ensuring patient safety and operational continuity. 

Continue reading

The Application Developer’s Conundrum: Advancing the Technology While Maintaining Backward Compatibility

As software developers, we’re always working on enhancing our technology. We aim to progress our solutions’ functionality to the leading edge rather than just keeping it up-to-date with the current trends. Applications are typically developed based on the latest operating systems and servers (currently Windows 2016), however the OS that our customers have installed and use can be older, such […]

Continue reading

Everything You Need to Know About Ransomware Attacks (But Were Afraid to Ask)

Ransomware Attacks Ransomware has been in the news a lot in recent weeks following attacks on businesses (less-publicized) and hospitals (Kentucky, Three Hospitals, CA Hospital, etc.). As a service to the healthcare community, we are providing a centralized resource for information on the issue, as well as links to pro-active and reactive remediation. What is Ransomware? According to Trend Micro, Ransomware is a type of […]

Continue reading

Our Answers to the Top 5 Questions on Downtime Patient Verification (DPV)

Downtime Patient Verification (DPV) works with our NetSafe business continuance product, which ensures that the latest patient information is available in the event of an HCIS downtime or a system failure. Using that information, DPV can generate and print bar-coded patient ID wristbands which can then be scanned against that patient’s paperwork for a correct match. Q: What is the primary benefit of […]

Continue reading

Ensuring an Effective Product Implementation

When customers are getting ready to implement one of our software products, they want to make sure they perform certain tasks and allocate the resources necessary to make the implementation effective and executed in a timely fashion. Here’s a check list of action steps for you: Have your server set up. Before any implementation begins, customers need to have the right […]

Continue reading

The Reality (or Myth) of Interoperability: Is it the Death of Plug and Play?

When interoperability was introduced, the thinking was that it would simplify everything and lead to a virtual integration of disparate applications. Technology would be plug and play, seamlessly and automatically working together. However, that has proven to not be the case. Although interoperability in essence seems simple, there is a lot that can go wrong with it, and it is […]

Continue reading