Workflow analysis and redesign is an essential part of EHR planning and implementation. One link to poor adoption and poor satisfaction with EHR may be related to poor planning. Any EHR implementation requires change. Change is stressful and causes resistance. Without effective planning, changes may actually hinder workflow and create ineffective and time-consuming workarounds. “One important lesson […]
Reducing EHR Risk
Reducing EHR risk must be integrated into transition planning, implementation and follow-up in order to avoid EHR failure, according to Dean F. Sittig, Ph.D., professor, School of Biomedical Informatics at the University of Texas Health Science Center at Houston. “The potential consequences of an EHR failure become of increasing concern as large-scale EHR systems are […]
Leveraging IT Like Top-Tier SMBs
The leading SMB owners tend to view technology as a strategic asset and not as a necessary evil. Symantec recently conducted a global “SMB IT Confidence ” study of business owners with 10 to 250 employees.[1] The most successful SMB owners overwhelmingly recognize the value of technology for reaching business goals. In an interesting twist, […]
Small Data Centers for SMBs
As SMBs realize the need for processing, analyzing and protecting data, they face the challenge of effectively managing and developing a small data center within the organization. Managing a data center in an SMB context often means juggling a range of challenges like budget constraints, cultural boundaries and perceptions, and spacial limitations. IT World recently […]
Beware of Zombie Phones
Zombie phones could be bleeding your bottom line. What is a zombie phone? A mobile device that you thought was turned off or turned over to the employee, but your company is still being billed. This is more common than you might think. After auditing the phone usage and phone billing for several companies, Pankaj Gupta, […]
Network Protection through Asset Inventory Control
Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]
Detecting a Computer Virus
At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]
Password Reminder
If you’re not using a password reminder, then it’s likely that you’re using the same memorable passwords for several websites; either that, or you have a stack of stickies hanging by your desk. In both cases, you may not be keeping your online information secure. Lack of password complexity as well as lack of multi-factor […]
Security: Are Software Companies to Blame?
A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]
The Challenge of Guarding Ideas
The challenge of keeping valuable secrets confidential is often held in tension with the challenge of being a robust company with opportunity to discover and grow. Some companies lock-down information so tightly it can inhibit workflow, cause unnecessary duplication, and even generate a culture of suspicion. Other businesses may err the other way and lose valuable information that can hurt […]