Top Menu

How the cloud is transforming education

How the cloud is transforming education

School IT departments have generally been on the front foot when it comes to embracing new technologies, and teachers who also embrace the latest technologies can reap the benefits faster. The cloud has opened up their world, and technology is poised to finally deliver on its promise to transform education. Assisting teachers The cloud has […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Clean Desk Policy Keep the minimum amount of paper PHI on your desk – only the documents you are working on at the moment. Why? A clean desk produces a positive image – you are organized and respect patients’ privacy. Sensitive documents left in the open can be stolen by a malicious entity. Remember to: […]

Continue Reading
Preparing for the new analytical doctor

Preparing for the new analytical doctor

A new generation of doctors and medical students is changing the way data informs: The doctors’ interpretations of the information they have The treatment plans the make These changes in approach can carry significant implications for the IT systems that support all those decisions. Network implications Much of the heavy lifting for advanced healthcare analytics […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Protecting a Patient’s Privacy Well-known individuals or celebrities have the same rights to privacy as anyone else. Privacy violations involving celebrities are further complicated due to the higher exposure that may follow these types of patients. Remember: Do not access a patient record unless it is necessary in order to perform your job. Do not […]

Continue Reading
Healthcare IT Services icon

HIPAA TIPS: Implementing a Security Management Process – Part 2

Document Your Process, Findings, and Actions The HIPAA Security Rule requires you to document your risk analysis and HIPAA-related policies, procedures, reports, and activities. Also, if you are attesting for Meaningful Use, you are required to retain all records that support attestation. Review Existing Security of ePHI (Perform Security Risk Analysis) In the risk analysis […]

Continue Reading
Looking after your security involves understanding the security of your third parties too

Looking after your security involves understanding the security of your third parties too

Today’s diverse IT environment is calling for a rethink of how information and intellectual property is secured from potential attackers. It is now crucial to have prudent strategies for dealing with the security levels of suppliers and partners as the traditional “four walls” perimeter no longer applies in dispersed, on-demand enterprise architecture. On-premises, hosted, and […]

Continue Reading
HIPAA Security Reminder of the Week

HIPAA Security Reminder of the Week

Social Networking Safety Social engineering is quickly becoming the most common way the “bad guys” are breaking into systems. Our systems are good at keeping the bad guys out. But it’s much harder to keep them out once you’ve let them in by visiting infected websites, clicking on links or attachments in emails, or responding […]

Continue Reading
Understanding the flipped classroom

Understanding the flipped classroom

For generations, teachers and students have followed a common pattern: lecture first in the classroom, do homework, and then review. Now, a growing number of teachers are “flipping” the classroom, bringing new educational opportunities for students and putting new demands on educational IT. In a flipped classroom, students are assigned material to study and exercises […]

Continue Reading