Protecting Patient Data

Healthcare professionals work with an astounding amount of Protected Health Information (PHI) every day. In this age of technology and interconnectivity, much of that information is electronic Protected Health Information (ePHI) in a digital format. The technology has brought its benefit of vastly shortened timeframes in sending, receiving and accessing information. Its caveat is the potentially increased visibility and risk for exposure or retention. Technology has…

Posted on Oct. 16, 2015 in Security

The Update Blues

There are never more dirty words regarding computers to the average user than “reboot,” especially when it comes to updating computers with patches. Windows Updates can take some time to download, install, and almost always require a reboot. This takes away from the user’s productive time and, worse yet, forces them to close all those open documents and spreadsheets and websites. It’s more than just inconvenient…

Posted on Jul. 31, 2015 in Security

The Power of the Pause-Click

The average office worker in the United States clicks a mouse roughly 5,000 times per day, according to various non-scientific sources. This wouldn’t be something a healthcare worker would normally associate with computer security or care in dealing with Protected Health Information (PHI). Mouse clicks are routine ways of opening emails, navigating web pages, allowing program updates, and accessing the vast majority of interfaces on a…

Posted on May. 29, 2015 in Security

Selecting the right computer for remote abstracting

When buying a computer to work remotely, shoppers are still faced with the bevy of choices that can make the purchase experience seem a bit bewildering at times. Thankfully with the advent of consumer feedback through online reviews and the incredibly competitive nature of the computer manufacturing process, it is really difficult to buy a bad computer today. Even better for users is the peace of…

Posted on Mar. 19, 2015 in Security