Four password management systems

The password is the main way we identify ourselves online. We need these to access nearly every account and service we use. Hackers know this and often target this area. One way to minimize the chance of your accounts being hacked is by using different passwords for...

USB device poses security threat

While computer systems have undoubtedly changed the way we do business, there are downsides to this, with one of the biggest being security. It’s challenging to keep your systems completely secure, especially since new threats are uncovered on a near daily...

5 Common security issues

It’s probably safe to say that the security of your networks and systems is something you are concerned about. In truth, the majority of businesses do have security measures in place. The question you therefore need to ask yourself is if the measures you have...

ICD-10 delayed?

In a surprising move, the House of Representatives approved a bill that includes a delay to mandatory ICD-10 implementation until October 2015. After the announcement we are sure that many medical practices breathed a long sigh of relief. The problem: Without a fix to...

Obtaining patient engagement

For the first time ever, achieving meaningful use depends on patient behavior: Meaningful use Stage 2 requires at least 5 percent of a health-care provider’s patients to be engaged in their own care— either through an electronic medical record (EMR) or an online...