Critical Steps for Selecting an Electronic Health Record, and Things to Consider for Your New System

Even given the news that the majority of practices and hospitals have made the change to EHR, this continues to be a tumultuous time in the land of electronic health records. In fact, several entities have proclaimed 2013 the year of the great EHR switch.

With that, and because I am not brand loyal, I think it’s a great idea to keep an open mind and acquire as much information as possible in the event a change is needed or you’re one of the few practices to not make the transition to electronic records.

There are no shortage of quality sources with excellent tips and information available, but I think there’s always room for more. I recently came across a white paper from Tech Target that intrigued me. The topic: 10 Critical Steps for Selecting an EHR.

Continue Reading

Mobile Security in its Infancy, Connectivity and Device Evolution Trends Means Organizations Must Plan their Mobile Security Strategy

In a great new white paper, “Essential Enterprise Mobile Security Controls,” sponsored by Blackberry and posted by Tech Target, mobile device security is the feature show. As it continues to be the main event for mobile technology, mobile devices will continue to be used to carry high-value personal and company information, as expected.

When personal devices are disconnected from company networks, security risks were relatively low, according to the report, but as the technology permeates and its use becomes even more closely connected to the work environment, the risks to security increase significantly.

Apparently things have been pretty slow until now, but that’s not likely to last. The turning point is here and hackers are on the move, including on iPhones, as well as the Android market place. Given these continual threats, and the importance of the data healthcare organizations protect, the need for improved mobile security controls an imperative for any organization looking to leverage mobility for competitive advantage.

According to the report, “A key challenge for improving mobile security is to understand what tools are available and how they can be leveraged.”

The following is a list of must-have mobile device security controls to protect workers and organizations, again according to Blackberry:

According to the report, and this is a nice summation of the report (and I quote): “Mobile security is still in its infancy, but the trends around connectivity, device evolution and worker mobility means organizations must start planning their mobile security strategy now, and that process begins with assessing what mobile security controls are needed and developing a plan to put those controls into action.”