Reducing EHR Risk

Reducing EHR risk must be integrated into transition planning, implementation and follow-up in order to avoid EHR failure, according to Dean F. Sittig, Ph.D., professor, School of Biomedical Informatics at the University of Texas Health Science Center at Houston. “The potential consequences of an EHR failure become of increasing concern as large-scale EHR systems are […]

Small Data Centers for SMBs

As SMBs realize the need for processing, analyzing and protecting data, they face the challenge of effectively managing and developing a small data center within the organization. Managing a data center in an SMB context often means juggling a range of challenges like budget constraints, cultural boundaries and perceptions, and spacial limitations. IT World recently […]

Challenges of EHR Adoption

Satisfaction with EHR implementations has dropped over the past two years, and new implementations are slowing according to recent study by American EHR.[1] One big problem highlighted by this study is reduced productivity due to the lacking usability. Think about ease of use for a moment. Every day over one billion people visit Facebook through […]

Network Protection through Asset Inventory Control

Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]

Smart Steps to Improve Network Performance

Solving IT challenges in “rapid growth” organizations requires more than just cash flow. Integracon helps organizations address challenges with cost-effective strategic solutions that improve network performance without breaking the bank. One of our clients, a rapidly expanding church, asked us to help them solve some of the performance problems in their network. Integracon developed and […]

Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]

BYOD and Containerization

Some organizations are turning to containerization as way of managing personal wireless devices that interact with company networks. When the University Hospitals Health System in Shaker Heights, Ohio introduced BYOD, they needed a robust MDM solution. Ryan Terry, division CIO and chief security officer, saw problems with many traditional MDM options because he felt that […]