IT Strategy

Part Time Support, Full Time Technological Success

As a healthcare provider, you have a full array of activities to fill your days. Seeing patients Consulting with peers Interacting with employees Handling daily tasks Dealing with immediate problems Staying up to date with guidelines and regulations Have you ...

5 Most Common HIPAA Violations Healthcare Providers Face Regularly

As a medical provider, how often do you think about the impact of HIPAA on your standard policies and procedures? Are you handling protected health information according to guidelines? Or are you putting data and information in compromising situations daily? ...

Why Implantable Medical Devices Are Easily Hacked

It’s hard to imagine healthcare without technology. It exists in every aspect, from signing up patients on a website to tracking personal data using wearable technology. We use it to virtually connect with patients and experts, and help control medications ...

Patients Think You’re a High Security Risk If Your Practice’s Website Is Out Of Date

It’s hard to imagine being in business these days without a website. Web design trends change quickly, and if you’re not staying on top of critical changes, it may be costing you more than you think. While a great website ...

Getting The Balance Right Between Security, Governance, Healthcare, and Usability 

One laptop is stolen every 53 seconds. Seventy million smartphones are lost each year, with only 7 percent recovered. The statistics are scary, yet most of us hang to the “not us” belief as we go about our busy days. ...

Telehealth Increases Security Risks - Here’s How To Secure It

2020 was a year of rapid growth for telehealth. Desire for the technology happened so fast, many healthcare organizations jumped on board with various video conferencing and messaging apps without really thinking about the consequences. And that left vulnerabilities. According ...

Think You’re Secure? Why Apps Put You More At Risk and What You Can Do

It’s easy to do. You’re bored. You head over to the app store and browse. You find something that looks interesting, download it, and start using it. Rinse. Repeat. Until your phone is filled with a variety of applications you ...

Managing Privileges To Ensure Everyone Has Access To What They Need

Privilege. It’s defined as: a special right or advantage granted or available only to a particular individual or group. In an information technology context, privilege is the authority granted to an account or process within a system or network. Privilege ...

 Is Your Practice’s WiFi Fast Enough?

Have you ever logged in when you arrive at the office, clicked to get work done, and sat there waiting while everything loads? You wait, and wait some more. You open a new browser window. Maybe reboot to try and ...

Are You At Risk For Synthetic Identity Theft?

Imagine someone setting up a profile in your database with the intent to fraud the system. Think it couldn’t happen to you? Think again. Synthetic identities are created to look like real clients, but are fabricated by criminals looking for ...

Contact

Silver Linings TechnologySilver Linings Technology Logo $$$