Butler County Health Department in Kansas, a Nightingale Notes agency for three years, was caught up in a county-wide ransomware attack. The county’s data was held for an undisclosed ransom amount. This brings up some questions about security: What does this mean for the health department’s patient records? Does this impact Nightingale Notes for Butler [...]
Health information technology is ever-changing, developing, and growing more sophisticated. While this technology empowers us to do our jobs better and more efficiently, it also brings its own set of challenges and concerns. Have you ever wondered what actually makes a password strong, and how to choose a password that is both strong and easy [...]
Join us for a free presentation that will cover trends in computing and EHRs, such as cloud computing and the internet of things, as well as IT security topics like phishing and strong password generation. This will be a 30-40 minute presentation from an IT expert, followed by a Q&A. Don’t miss this informative webinar!
The term electronic signature is a rapidly evolving term, used both as a generic term encompassing a variety of ways that an electronic record can be signed (attested) as well as a specific type of method. Depending on the software in use, E-signatures can be entered in many ways, such as: Clicking on an “I [...]
Submitting a billing claim, getting a list of vaccinations for a client, faxing orders to a physician and emailing a client about their next visit; what do all of these have in common? Well, you likely wouldn’t be able to do any of them without the power of the internet. With recent technological advances you’re [...]
This is the last in our series of blogs on electronic health record security. The first two covered physical security and digital security. The focus of this article is data confidentiality. Client data should only be viewed on a need to know basis. There are a number of things your software can do to allow you [...]
This is the second in a series of 3 blogs on EHR security. The first one covered physical security. Now we'll talk about digital security. This is the type of security that gets the most attention these days. While there will never be an application that is 100% safe against hackers, there are a number [...]
Ensuring that an EHR software application is secure is a crucial step before you start sending it any confidential information. There are a few different types of security and EHR security measures that you’ll want to be aware of with any software application. The categories we’ll be covering are Physical Digital Confidential This is not [...]