Windows 7 End of Support On Its Way

Given the multitude of severe security vulnerabilities already disclosed in 2018, it’s important to note that Sunday, January 14th, 2018 marked an important date in Windows operating system history.

Why You Can't Rely on the Government to Protect Your Data


When it comes to keeping information secure, many might think the government is at the forefront of the latest technology trends. However, according to one ex-FBI agent, it's the hackers that are paving the way.

9 Critical Steps to Securing Your Texts

In 2011, The Joint Commission banned the use of short messaging service (SMS) text messages between physicians, licensed independent practitioners, and other healthcare providers. As announced by The Joint Commission in May 2016, it “has revised its position on the transmission of orders for care, treatment, and services via text messaging for all accreditation programs.”

How Your IT Provider Can Save You Legal Headaches

Long-term post-acute care (LTPAC) is one of the most regulated industries in the country. LTPAC litigation is on the rise and multimillion dollar verdicts are not uncommon. New state and federal statutory claims, burdensome eDiscovery demands, and arguments against arbitration agreements have made resolving disputes difficult without invasive legal proceedings.

More Best Practices for Secure Web Browsing

Last week we shared with you 10 best practices to help keep you safe while browsing the web. Here are another 9 things you can to do to help protect you and your business.

10 Best Practices for Secure Web Browsing

We all know how easy it is to get distracted while surfing the ‘Net.  A related story here, a special offer there, and suddenly you’re running in a whole different direction from where you started. However, that seemingly innocuous link may prove to be a trap, divulging information you never intended to share. So it’s increasingly important you develop browsing habits that will help you improve the security of your online activities.

Below we've put together a list of simple recommendations that will significantly strengthen your browsing security.

Protect Yourself From Malware

Prevent Malware with Smart Online Behavior
 

Virtual Server Provisioning...give it a chance!

EMR, EHR, payments, outcomes, payroll, email and more…that’s a lot for your server(s) to handle, which means it’s potentially another source of IT worry for you. Each time you have to reboot, update, implement or change your server applications and systems, or simply want to temporarily increase server capacity during peak periods, you run the risk of costly and time consuming fixes, errors, crashes, virus infiltration and so on. That’s why many businesses “provision” their servers - preparing them with appropriate systems, data and software to make it ready for network operation – based on their resource requirements. 

Taking it one step further, businesses who provision their servers virtually see even more resource and cost benefits:

Are you at risk for HIPAA violations?

Last week it was announced by the Department of Health and Human Services that it will receive a $50,000 settlement from an Idaho organization. The agreement came after allegations the group lost a laptop with health information for 441 patients.  Read the article here.

Disaster Recovery Basics for Post-Acute Care Providers

Written by Berry Brunk, CIO Consultant at VCPI