Blog

5 ways systems can be breached

5 ways systems can be breached

When it comes to business security, many small to medium business owners and managers often struggle to ensure that their systems and computers are secure from the various attacks and malware out there. While there are a million and one things you can do to secure systems, one of the most useful approaches is to be aware of common security threats.

Laptop battery almost dead? Try this

Laptop battery almost dead? Try this

Have you ever taken your laptop to a presentation or meeting and forgotten your power bar? Many laptops have batteries that really won’t last all that long when you really need them to, and it can be a pain to run out of battery at an inopportune moment.

Backing up your data – 8 tips – Part 2

Backing up your data – 8 tips – Part 2

Most IT experts will agree that in order for a business to survive, they need some sort of recovery or continuity plan in place. Regardless of the type of plan, or systems integrated, all systems need to have a back up mechanism. In the last article, we took a look at four tips to help improve your data backups, and continue this article with the final four.

Bill could increase use of telemedicine

Bill could increase use of telemedicine

Physicians have little reason to engage in telemedicine because they typically aren’t reimbursed for services rendered virtually – but now two Mississippi senators are seeking to change that.

The Telehealth Enhancement Act, introduced by Senators Thad Cochran and Roger Wicker, alters Medicare payment policies to cover telemedicine, among other things.

Debunking three ICD-10 myths

Debunking three ICD-10 myths

As we move toward the October 2015 compliance deadline for ICD-10, the Journal of AHIMA has tackled three misconceptions about the new coding system.

ICD-9 isn’t so bad. In reality, ICD-9 is obsolete, and the longer it is in use, the more the quality of health-care data will decline, leading to faulty decisions based on inaccurate or imprecise data.

Final rule sets ICD-10 compliance deadline in stone

Final rule sets ICD-10 compliance deadline in stone

The Department of Health and Human Services has set the final deadline for health-care organizations to transition to ICD-10, and it’s just 14 months away—on October 1, 2015.

ICD-10 is designed to provide better patient care, disease management, and quality measurement—especially for patients under the care of multiple providers.

6 Misconceptions about outsourced IT!

6 Misconceptions about outsourced IT!

As business owners, one of the most challenging tasks is letting go of every part of your business functions. It’s difficult to step back from managing everything, especially when you have invested so much time, energy and resources on your business.

De-clutter your desktop

De-clutter your desktop

Have you ever seen a colleague’s desktop that is covered in icons, shortcuts, files, and folders? Or maybe it’s you that is disorganized. It’s not uncommon for desktops to get cluttered, especially if you have been using your computer for a number of years.

Yammer’s new login on Office 365

Yammer’s new login on Office 365

Cloud-based applications, like Microsoft’s Office 365, are increasingly gaining popularity in today’s fast-paced world. With various updates and increased integration with Microsoft apps, most businesses are quick to adapt to these changes for better work solutions.

Unified Communications or VoIP?

Unified Communications or VoIP?

Modern communication methods are quickly moving away from the traditional phone networks and favoring network based strategies that allow communication via the Internet. If you do some research into different solutions available you will generally hear about two major options: VoIP and Unified Communications.