EHR and the Value of Workflow Analysis

Workflow analysis and redesign is an essential part of EHR planning and implementation. One link to poor adoption and poor satisfaction with EHR may be related to poor planning. Any EHR implementation requires change. Change is stressful and causes resistance. Without effective planning, changes may actually hinder workflow and create ineffective and time-consuming workarounds. “One important lesson […]

Reducing EHR Risk

Reducing EHR risk must be integrated into transition planning, implementation and follow-up in order to avoid EHR failure, according to Dean F. Sittig, Ph.D., professor, School of Biomedical Informatics at the University of Texas Health Science Center at Houston. “The potential consequences of an EHR failure become of increasing concern as large-scale EHR systems are […]

Small Data Centers for SMBs

As SMBs realize the need for processing, analyzing and protecting data, they face the challenge of effectively managing and developing a small data center within the organization. Managing a data center in an SMB context often means juggling a range of challenges like budget constraints, cultural boundaries and perceptions, and spacial limitations. IT World recently […]

Beware of Zombie Phones

Zombie phones could be bleeding your bottom line. What is a zombie phone? A mobile device that you thought was turned off or turned over to the employee, but your company is still being billed. This is more common than you might think. After auditing the phone usage and phone billing for several companies, Pankaj Gupta, […]

Network Protection through Asset Inventory Control

Understanding and managing device access to your network is an essential safety control for the ongoing security of your network. According to the Center for Strategic & International Studies (CSIS), asset inventory control tops the list of 20 critical security control that can help agencies and business block the most frequent attacks. [1] Established in 2008, […]

Detecting a Computer Virus

At least 16 million U.S. households have suffered a computer virus in the last two years. In spite of the proliferation of antivirus software, families and businesses alike suffer from viruses, worms, phishing, password stealing attacks and more. It is estimated that computer viruses, spyware and phishing have cost U.S. households $4.55 billion dollars.[1] While […]

Security: Are Software Companies to Blame?

A former hacker spoke out in New York Times recently setting his sites on large software companies. “The unspoken truth is that for the most part, large software companies are not motivated to make software secure,” writes Marc Maiffret. He claims that many software companies prioritize developing more features and functions instead of focusing improving […]

The Challenge of Guarding Ideas

The challenge of keeping valuable secrets confidential is often held in tension with the challenge of being a robust company with opportunity to discover and grow. Some companies lock-down information so tightly it can inhibit workflow, cause unnecessary duplication, and even generate a culture of suspicion. Other businesses may err the other way and lose valuable information that can hurt […]