Filter by Category:

Working While Traveling: Tips to Avoiding a Security Breach

With the holidays approaching, many more people travel with laptops and mobile devices in the hopes of working remotely. This can present an increased opportunity for inadvertent breaches and data loss. Each year, over 600,000 laptops are lost or stolen just in domestic airports, with 69 % of those devices unrecovered. Nationally, a laptop is stolen every 53 seconds. Additionally, 113 smartphones are lost or stolen…

Posted on Oct. 14, 2014 in Corporate Security

Q&A: Multiple Primary or Recurrence?                 

Q: Patient is in the registry software system for a primary colon cancer status 1 (no evidence of this tumor), type of first recurrence 00 (pt. became disease-free after treatment and has not had a recurrence). Most recent follow up note on 1/21/14 states patient has metastatic disease to the lungs and liver. Physician states in follow up note patient has metastatic colon cancer. Is this…

Posted on Oct. 10, 2014 in How Should I Code This?

Letter to My Computer

Dear Computer, I have friends and family, but you are often my best friend. When life gets really wild, I need you to be the constant calm in the flurry of my day! I visit you just about every day and I rely on you to be awake (working) and cheery (making some sound, but not too loud) when I am drinking my cup of coffee…

Posted on Oct. 7, 2014 in From Our Perspective