Vulnerability Assessment

Vulnerability Assessment & HIPAA Compliance Scans

Vulnerability Assessment and HIPAA Compliance Scans for Healthcare Vulnerability Assessment and Compliance laws aren’t something new if you’re coming from the financial or retail industry. For example, PCI Compliance was introduced in the late 90’s to help protect your personal and credit card information from criminals. Now, with the advent of the Patient Protection and…

Details
MAARS logo

MAARS – Patient Appointment Reminder Service

Patient Appointment Reminder Service Recently, the healthcare practitioner’s world was turned upside-down by government compliance and reporting requirements. These changes require staff to master healthcare technology while providing quality patient care. As a result, your staff has less time to make valuable appointment reminder calls. In fact, using a Patient Appointment Reminder Service is your…

Details
Medical Practice Network Security

A Comprehensive Guide to Medical Practice Network Security

Medical Practice Network Security Guide Medical practice network security is paramount when designing a new medical office network. Now that security hazards are on the rise, practices are faced with many technology challenges. Most notably, they need to protect their networks from internet threats. However, to meet this challenge, practice owners must first understand the…

Details
Video Surveillance for Healthcare

Video Surveillance for Healthcare – Protect Your Practice

Security and Protection from Within your Walls   Now more than ever, Electronic Protected Health Information (ePHI) is increasingly valuable on the black market. That’s why it’s crucial to protect your practice from hackers and cyber-criminals. However, many providers and practice administrators overlook the need for protection from within their walls. As a result, disgruntled…

Details
NextGen Healthcare

NextGen EHR and Practice Management

Why NextGen Ambulatory EHR and Practice Management? In the past, other Ambulatory EHR solutions were deemed cheaper and better tailored to the small medical practice’s needs. Then came along government mandated compliance in 2010. With these changes, Enterprise Solutions, like NextGen Healthcare, were better engineered for complexity. Now, the specialty EHR software companies are struggling to…

Details
ePHI security breach

Patient Data Compromised by Third Party Vendors

ePHI Security Breach at Large Healthcare Provider in Arizona In recent media coverage, Banner Health revealed that hackers might have accessed their patient health insurance records. As a result, cyber criminals compromised up to 3.7 million patient records. Unfortunately, this ePHI security breach occurred because hackers obtained access to their servers through a third party food service…

Details
Destroy old hard drives

How to Destroy Old Hard Drives…the Extreme Way!

Why You Should Destroy Old Hard Drives As a Technology Services Provider, we understand the importance of protecting your data and ensuring confidentiality. That’s because we constantly hear stories about misguided technology practices compromising patient data. As a result, we advise our clients to destroy old hard drives properly as part of their ongoing security…

Details
Drive Encryption

Security Risk Analysis & Drive Encryption

Security Risk Analysis & Drive Encryption Lately, there’s been confusion about hard drive encryption requirements for medical practices. So, it’s important to understand the difference between “addressable” and “required” as it pertains to your Security Risk Assessment. Shortly after the dawn of the Affordable Care Act in 2010, “addressable” was a term used to describe a…

Details