email_encryption

Email Encryption for Healthcare and Business

Email Encryption for Healthcare and Business Email encryption is a HIPAA requirement for healthcare when sending patient information over email. Email encryption is also a useful tool for law firms, financial institutions, and businesses that need to protect legal documents and personal and financial information. What is Email Encryption? Email encryption is used to convert…

Details
Ransomware Attacks Healthcare

Ransomware Attacks Targeting Healthcare

Ransomware Attacks Targeting Healthcare   Ransomware attacks against medical practices are surging in the US over the past year. Ransomware is a term used to describe malicious software designed to block access to data until a sum of money is paid. Cybercriminals use ransomware because it is highly profitable and very difficult to trace. An infected email…

Details
NextGen Healthcare

NextGen Patient Portal Auto-Enrollment Processor

THE NEXTGEN PATIENT PORTAL AUTO-ENROLLMENT PROCESSOR is a NextGen Communication Services plug-in developed by NextGen Healthcare. The NextGen Patient Portal Auto-Enrollment plug-in automatically enrolls patients to your patient portal with some custom development by Innovative Computer Systems.  Some of the  complaints we have heard from our clients about NextGen Patient Portal are: “It takes our staff too long to…

Details
Vulnerability Assessment

Vulnerability Assessment & HIPAA Compliance Scans

Vulnerability Assessment and HIPAA Compliance Scans for Healthcare Vulnerability Assessment and Compliance laws aren’t something new if you’re coming from the financial or retail industry. For example, PCI Compliance was introduced in the late 90’s to help protect your personal and credit card information from criminals. Now, with the advent of the Patient Protection and…

Details
MAARS logo

MAARS – Patient Appointment Reminder Service

Patient Appointment Reminder Service Recently, the healthcare practitioner’s world was turned upside-down by government compliance and reporting requirements. These changes require staff to master healthcare technology while providing quality patient care. As a result, your staff has less time to make valuable appointment reminder calls. In fact, using a Patient Appointment Reminder Service is your…

Details
Healthcare Practice Security & Internet Defenses

Business Security and Virus Defense Strategy

Business Security and Virus Defense Strategy – Our Four Layer Defense All businesses need a security and virus defense strategy against phishing and malware. A virus, also known as malware, is a piece of software designed with malicious intent. Mild or moderate viruses can steal data and passwords, cause annoying pop-ups, or cripple your computer. In…

Details
Medical Practice Network Security

A Comprehensive Guide to Medical Practice Network Security

Medical Practice Network Security Guide Medical practice network security is paramount when designing a new medical office network. Now that security hazards are on the rise, practices are faced with many technology challenges. Most notably, they need to protect their networks from internet threats. However, to meet this challenge, practice owners must first understand the…

Details
Manage Your Healthcare Technology Budget

How to Manage Your Healthcare Technology Budget

Your Healthcare Technology Budget Medical practices should consider their unique needs when planning their healthcare technology budget. Now more than ever, the healthcare industry is driven by, and dependent on, a secure and reliable network infrastructure. This dependency is mainly due to the Affordable Care Act and strict government regulations and compliance laws. As a…

Details
Video Surveillance for Healthcare

Video Surveillance for Healthcare – Protect Your Practice

Security and Protection from Within your Walls   Now more than ever, Electronic Protected Health Information (ePHI) is increasingly valuable on the black market. That’s why it’s crucial to protect your practice from hackers and cyber-criminals. However, many providers and practice administrators overlook the need for protection from within their walls. As a result, disgruntled…

Details
Medicare – MACRA and MIPS

MACRA and MIPS in 2017

What are MACRA and MIPS? MACRA and MIPS, also known as The Medicare Access and CHIP Reauthorization Act of 2015, are poised to drive health care delivery and payment reform. As a result, this change affects clinicians, health systems, Medicare, and other government and commercial payers. On May 9, 2016, the US Centers for Medicare and Medicaid…

Details
Managed Services Provider

Managed Services Provider

What is a Managed Services Provider? A Managed Services Provider, also known as an “MSP,” is an IT industry term used to describe an outsourced IT department. MSP’s assume the ongoing technological responsibilities for their clients. Typically, a Managed Services Provider offers services such as help desk, onsite support, data backup, network security, phone system…

Details
NextGen Healthcare

NextGen EHR and Practice Management

Why NextGen Ambulatory EHR and Practice Management? In the past, other Ambulatory EHR solutions were deemed cheaper and better tailored to the small medical practice’s needs. Then came along government mandated compliance in 2010. With these changes, Enterprise Solutions, like NextGen Healthcare, were better engineered for complexity. Now, the specialty EHR software companies are struggling to…

Details
ePHI security breach

Patient Data Compromised by Third Party Vendors

ePHI Security Breach at Large Healthcare Provider in Arizona In recent media coverage, Banner Health revealed that hackers might have accessed their patient health insurance records. As a result, cyber criminals compromised up to 3.7 million patient records. Unfortunately, this ePHI security breach occurred because hackers obtained access to their servers through a third party food service…

Details
stolen ePHI crippling healthcare

Stolen ePHI Crippling Healthcare Practices

Stolen ePHI Crippling Healthcare Practices Around the World In the past few days, I’ve been following a hot topic at a public technology forum focused on IT security. As an IT professional, I need to emphasize the risks of connecting unsecured devices to your network. A USB Flash Drive is a perfect example. When possible,…

Details
Destroy old hard drives

How to Destroy Old Hard Drives…the Extreme Way!

Why You Should Destroy Old Hard Drives As a Technology Services Provider, we understand the importance of protecting your data and ensuring confidentiality. That’s because we constantly hear stories about misguided technology practices compromising patient data. As a result, we advise our clients to destroy old hard drives properly as part of their ongoing security…

Details
Managed IT Services Provider Acquisition

Managed IT Services Provider Acquisition

Managed Services Provider Acquisition Innovative Computer Systems is actively looking to acquire a Managed Services Provider in the New York Metropolitan area. Ideally, we prefer an MSP with a client base in Healthcare and at least fifty percent recurring revenue. We’re also open to a merger of equals if there’s a strong synergy between our…

Details
Healthy Server Room Environment

A Healthy Server Room Environment

How to Design and Maintain a Healthy Server Room Environment Server high availability is crucial for your medical practice or small business. That’s why it’s so important to maintain high standards for your server environment. In fact, a healthy server room environment will minimize downtime, and maximize potential revenue. That’s why we compiled the following…

Details
Common Computer Terminology

Improve Your Technology Vocabulary

Improve Your Technology Vocabulary As one of the leading providers of Healthcare IT for over two decades, we understand that technology lingo can be a foreign language to healthcare providers and their staff. Not only can technology be intimidating, there are thousands of new computer terms being introduced each year. We know this can be…

Details