Blog

March 30th, 2015

HealthCare_Mar30_AElectronic Medical Records (EMR) are growing fast in popularity among healthcare service providers. EMR eliminates paper-based medical information, therefore providing healthcare staff with faster accessibility and easier navigation through patients’ medical records. Although EMR has a user-friendly interface, it is a highly complex system to implement. And without proper planning and implementation, you may not achieve the results you had hoped for. So here are some things to keep in mind when your healthcare business is implementing EMR.

Make sure the way is clear

The most important step before you start implementing EMR is to ensure that your organization’s governance supports this project all the way. You don’t want to have to change direction halfway through the implementation, when things are just about to fall into place. Working closely with key stakeholders and department leaders will help you to avoid roadblocks. So make sure everyone agrees to this strategic change before proceeding.

Assign leaders

Good leadership from dedicated staff is crucial for EMR implementation success. So you need to form a team of representatives from each department. This group of employees must be committed to participating in an EMR implementation plan and managing meetings. It’s important for assigned leaders to have a thorough understanding of the whole EMR implementation process, so they can relay accurate information to their subordinates. These staff should always be present and visible for any inquiries related to the EMR integration.

Prepare for change

The implementation of EMR will most likely change the way your employees work. The transition can be intimidating and, if not addressed early, can lead to a lack of understanding and participation. That’s why EMR implementation leaders must prepare organization members for change. In addition to educating employees about the importance of EMR and how to use it, ongoing support must also be provided during the implementation phase. For instance, setting up helpdesks to answer questions can clear up confusion. Making an early announcement about the transition will also alert employees about the change.

Forecast costs

Implementing EMR can be costly for major healthcare providers. There will be additional costs along the way and, if you approach this with limited resources, you may not fully succeed with the implementation. It is important to accurately predict overall costs required for spreading the word, training employees, and providing support during implementation.

Involve everyone

Since EMR will be used across the whole organization, every employee should be informed about its implementation. They should also receive proper training to learn more about EMR, how to use it, and the benefits it will bring to health care operations. Feedback should be collected from employees before, during, and after the implementation process.

Implementing EMR can be a tricky and time-consuming task, but will definitely benefit your health care practice in the long run. If you want to adopt EMR in your organization, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 25th, 2015

Productivity_Mar25_AMeetings are meant to be hotbeds of production, where decisions get taken, people get updates and projects get moved forward. Yet all too often, they become a strain on your workforce’s productivity, hours out of the day when staff are taken away from their jobs to sit in inefficient sessions which are too long and lack pace and focus. But meeting productivity platform Do.com is trying to change that. The service just made two important announcements - here’s why you’ll want to add Do.com to your productivity suite.

Do.com aims to end what it terms ‘meeting hell’, and the platform is currently used by more than 5,000 organizations from top businesses like Dominos to sectors of the US government. When you add Do.com to your company’s productivity strategy, you benefit from a host of meeting-oriented features including management of agendas, notes and actions. The tool can also be used to share files for the purpose of discussion during meetings, and to display a timer to keep deliberations on track and avoid that ultimate hell of never-ending meetings.

The cloud-focused application has signaled it is on an upward trajectory, recently adding $2 million in funding. The additional capital will be used to further expand Do.com and its features, as well as the team behind it. Consequently, it appears that now is a great time to be getting onboard, with lots more to come from it. The most recent technical development to be announced is its new integration with Office 365. This will give Do.com further relevance and usability value to business owners around the world who are already taking advantage of the numerous benefits of the Microsoft cloud-based suite of productivity applications.

Do.com can already be used in conjunction with Evernote and Google Apps like Drive and Docs, but the move to integrate with Office 365 puts it in reach of an ever larger audience. Those not yet accustomed to high-tech meeting solutions may still be using pen and paper to manage their company get-togethers. But Do.com identifies its technology-based competitors as core cloud applications such as Dropbox, Trello, Evernote, Google Apps - everything from Docs to Calendar to Drive - and even good old email. Yet Do.com does something these individual apps don’t - while they all tackle one particular element of the organization and follow-up to a meeting, Do.com handles the whole lot with a single holistic, meeting-centered approach. With its latest moves, that’s what the platform hopes will be attractive to productivity-deprived business owners.

Want to find out more about Do.com and other productivity and cloud-based technologies? Get in touch today.

Published with permission from TechAdvisory.org. Source.

Topic Productivity
March 24th, 2015

164 BizV_AYou’ve been using your break/fix contractor for years. For the most part, he’s been reliable and helped your business run a smooth IT operation. But you’ve been hearing more and more about Managed Services, and it’s peaked your interest. If you’re thinking about making the jump from break/fix to Managed Services, here are a few compelling ideas to consider.

The ultimate break/fix nightmare

Your business is running smoothly. Profits and staff productivity have been up, and you haven’t had a single IT expense in months. Times are good. You kick back in your leather chair and break out that Cuban cigar you’ve been saving for just such an occasion.

But then the BIG ONE hits. Your servers crash. No, not just one - all of them! Your business comes to a grinding halt. None of your staff can work. You call your go-to break/fix IT provider, but he’s overloaded with work and can’t make it out to your offices till next week. Next week?! In a panic, you call the first IT contractor you find on Google. Thankfully he’s available. But since you need this work done immediately, he charges an unbelievable fee for a last minute fix. You have no other choice, you hire the contractor. You’re left hoping he fixes everything properly and none of your crucial data is lost in the process.

This is the precarious nature of break/fix IT services. And while this is a worst case scenario, situations like this can and have happened. So let’s look at the reasons why it pays to to hire a Managed Services Provider (MSP) instead.

MSPs prevent problems. Break/fix profit from them.

Think about the relationship dynamics of Managed Services compared to break/fix. If you’re a business owner who currently use a break/fix contractor, when your IT goes down your contractor gains profit. Your problem equals his reward.

How motivated do you think he is to do an effective job of fixing your issue? If that problem pops up again later, it equals more reward for him. Now that’s not to say all break/fix contractors aren’t fixing your IT to the best of their abilities. But think about the basic mindframe of a break/fix contractor: problem=profit.

The MSP system works differently. You pay a set fee every month to your IT provider. So the reward for the MSP comes every month. If something goes wrong during that month, you don’t pay anymore. Yet it costs the MSP more money, and therefore affects their profit margin. Because of this, the MSP is rewarded for taking preventative measures to ensure your IT is working as effectively as possible, always.

That’s not to say problems won’t happen with an MSP. But when they do, they’ll end up costing the MSP provider, and they certainly don’t want that. So for an MSP, the basic mindframe is: healthy IT=profit.

MSPs extinguish budget surprises

Everyone likes surprises, except when it comes to losing money. And when you have a break/fix IT service provider, big surprises can and do happen - and not the good ones, either.

An MSP is working to prevent problems from happening in the first place. You pay a monthly flat fee, so you always know what you’re paying. You can plan and predict your budget accordingly.

With break/fix, it’s true that some months you won’t have any IT expenses from your contractor, which is great. But other months, you could have bills that are astronomical. So you never know just what you’ll be paying for your IT budget in any given month. And if you don’t have that money set aside, then what?

MSPs might just make you happier

Yes, as silly and simple as it sounds, with an MSP you’ll probably be happier. The main reason is you won’t have to deal with the frustration of unexpected IT problems eating away at your budget and the downtime that comes with it. Your IT will run more smoothly (which will create a foundation for your business to do the same) and your budget will be predictable.

Even better, you’re more likely to have a fruitful relationship with your MSP provider since you both have the same goal: effective smooth running IT for your business. What business owner doesn’t like the sound of that?

Want to learn more about Managed Services? Contact us today to learn more about this effective alternative.

Published with permission from TechAdvisory.org. Source.

March 23rd, 2015

BusinessContinuity_Mar23_AA business continuity plan (BCP) is often defined as a method of putting businesses back on their feet in the event of a disaster. With this in mind, companies are increasingly concentrating their efforts on developing a BCP so that, when unexpected disasters strike, they can minimize damage and continue to function as normally as possible. But with many abbreviations and terms that may sound unfamiliar to average employees, or even business owners or managers, understanding these common BCP terms is vital.

Battle box - a tool box where necessary equipment and vital information are stored. These objects and pieces of information should be useful in a disaster. Typical items include a first aid kit, laptop, protective equipment, and communication devices.

Business impact analysis (BIA) - a process to evaluate the impact that a disaster may have on a business. The BIA shows what a business stands to lose if some parts of its functions are missing. It allows you to see the general picture of your business processes and determine which ones are the most important.

Call tree - a comprehensive list of employee contacts and their telephone numbers. Call trees are used to notify out-of-office employees about a disaster. Companies can use a software program to contact people on the call tree by sending automated emails and text messages. In order for a call tree to work, employees should provide alternative contact options and their information must be up to date.

Data mirroring - a duplication of data from its source to another physical storage solution or the cloud. Data mirroring ensures that crucial information is safe, and companies can use the copied data as backup during a disaster.

Exercise - a series of activities designed to test a company’s business continuity plan. When an exercise is carried out, there will be an evaluation to decide whether a BCP is meeting standards or not. An exercise can identify gaps in, and the drawbacks of, a BCP and is therefore used as a tool to revise and improve a business continuity plan.

Hot site - an alternate location equipped with computers, communication tools and infrastructures to help a business recover information systems affected by the disaster.

Plan maintenance - a process of maintaining a company’s business continuity plan so that it is in working order and up to date. Plan maintenance includes scheduled reviews and updates.

Recovery time objective (RTO) - a period of time in which companies must recover their systems and functions after a disaster. This is the target time for a business to ideally resume its delivery of products and services at an acceptable level. RTO may be specified in business time (e.g. one business day) or elapsed time (e.g. elapsed 24 hours).

Business continuity plans can be a hassle to design and implement without proper understanding of their requirements. If you want to learn how you can protect your business from disasters, give us a call today.

Published with permission from TechAdvisory.org. Source.

March 20th, 2015

iPad_Mar20_ASince the launch of the original iPad Mini, it has seemed like the direction of travel has been towards smaller, more portable devices. In many ways it mirrors the trend in mobile phone development prior to the arrival of smartphones on the scene - every device was smaller than the last. But, dress it up how you like, there’s no avoiding the fact that when you decrease the size of a device, some of its features end up being sacrificed too. Here’s why you might want to dust down that old, full-sized iPad and start rediscovering it in all its glory - or better still, grab a brand new iPad Air 2.

It’s big enough to share

Whether in meetings or on the go, the full sized iPad screen is better suited to showing documents, images and web sites to others. The iPad Mini may be more easily portable, but its screen size is comparable to that of the iPhone 6, and a phone just isn’t the best platform for displaying information to a group. The screen size on models like the iPad Air makes this much easier and more effective.

It takes great photos

For some time, the iPad camera seemed inferior to that of the iPhone. But the iPad Air 2 changes all that - the 9 Megapixel camera makes it perfect for photo needs in the office. We’re thinking instant capturing of whiteboard scribbles at the end of a brainstorming session, quickly and efficiently scanning documents, and maybe just the odd workplace selfie. It’s suddenly comparable to the camera power of the iPhone and superior to that of the iPad Mini. Combine that with the bigger screen, and the business productivity advantages of the full-sized iPad Air 2 are plain to see.

It’s a productivity machine

Again it comes partly down to the full-sized screen, but a more generously proportioned iPad - whether that’s the new iPad Air 2 or an older model - is simply better for getting the job done. While the iPad Mini boasts the same resolution as the iPad Air 2, the latter’s extra screen area gives you more space to work with. The Mini offers the same amount of limited room for maneuver as the latest iPhone model, which is fine when you’re on the move and want to complete a quick task on the fly, but less so when you need to get serious work done. The larger screen allows you to drag and drop information, move things around and switch between multiple applications at ease.

Getting the highest levels of productivity out of your technology is all about selecting the gear that works best for you. Want to learn how to best deploy iPads and other Apple devices in your business? Give us a call.

Published with permission from TechAdvisory.org. Source.

Topic iPad
March 19th, 2015

Virt 164_ATo migrate to the Cloud or virtualize your machines? That is the question. Both Virtualization and Cloud Computing have benefits. But figuring out which one is right for your organization is another story. If you’re having trouble deciding which technology is the best choice for the future of your business, this article will help you figure it out.

The difference between Cloud Computing and Virtualization

To understand which technology you need, you first need to understand the role of that technology in your business.

Virtualization is basically using virtual hardware or software stored off-site, instead of the actual physical asset being in your office. A common asset many organizations choose to virtualize is a server. So if you’re thinking about buying a new server, you may want to consider investing in a virtual one instead. The advantage of this is that you’ll free up office space and save money on the upfront expense of an in-house server as well as its maintenance costs.

Cloud Computing, on the other hand, is not about individual assets, but instead is an operational model. Your business will run through the Cloud, where employees can create documents, interact with each other and customers, and even store files and data. The main advantage of the Cloud is that it increases operational efficiency and boosts organizational productivity.

Arguments for virtualizing

If you’re considering either the Cloud or Virtualization and have done neither, it makes sense to think about Virtualization first. With both Virtualization and the Cloud, you’re essentially changing the architecture of your business - from physical to virtual. Virtualization, however, is a small change, while Cloud Computing is a more dramatic one. If you opt for going all in with the Cloud right away, it may be a bit mind jarring for some of your staff as they get used to the new technology. And this could slow down their productivity. Virtualizing a few technology assets, instead of your entire workflow system, is an easier way to get a grasp of working with virtual technology for the first time.

A more fundamental reason to choose Virtualization is that you’re just looking to create more office space. In this case Virtualization is a no-brainer.

Arguments for the Cloud

If your organization gets to the point of needing to add virtualized machines or servers quickly, the Cloud can automate this process. However, your IT department must be ready and willing to hand this process over to your end users.

Also, if your organization has been using virtualized machines for some time or is simply ready to overhaul its workflow and operational process altogether, then the Cloud is likely a better fit for your business.

Which is the best choice for your business?

What it comes down to is operational efficiency (Cloud Computing) or saving money and space on individual assets (Virtualization). What’s more important to you?

And do you have a progressive organization and staff that are ready to adapt to using virtual technologies? If not, then Virtualization may be the initial step you need to start changing your organization’s infrastructure to compete in the modern business world.

Want to learn more about Virtualization and Cloud Computing? Contact us today.

Published with permission from TechAdvisory.org. Source.

March 18th, 2015

Security_Mar18_AWe all know that it’s important to maintain high security vigilance across whole spectrum of your IT, from changing your email password regularly to locking your work computer when you are away from your desk. But there are few areas where it couldn’t be easier to score an own goal and make life easy for fraudsters than in the realm of financial services. From your online banking system to mobile payment platforms, these are accounts where it’s absolutely vital to be on your guard against possible intruders. Peer-to-peer payment provider Venmo just made it a little easier to do that.

The Venmo platform is known for its convenience and ease of use, and is commonly used to split the cost of drinks, dinner, taxis and the like. The app is now adding a raft of new security-focused features, in response to criticism of its record for ensuring the security of its customers and their financial transactions.

Back in February, a Venmo user discovered his account had been hacked and used to withdraw almost $3,000 from his credit card. The intruder had also thought to change the email address associated with the Venmo account and to disable notifications of payments, but Venmo did not tell the genuine user about the changes that had been made. Venmo was decried for letting basic lapses in security exist in its trendsetting platform.

Now the service is doing what it can to pick up the pieces and up the ante on the security front. The most obvious change is to incorporate automatic email notifications when changes are made to the basic personal details associated with a Venmo account - a feature which many believe should have been built in from the word go. But the app will also add multi-factor authentication, another name for the two-step verification that can be enabled within Google Apps and other services. This feature makes it more difficult for would-be intruders to gain access to your account, even if they manage to get hold of your password.

Multi-factor authentication works by requiring not only your password for login, but also a second piece of information such as a one-time code - often generated on-the-spot and sent by SMS to the user’s cell phone - or the answer to a pre-set security question. Insisting on two phases to the sign-in process allows another opportunity to stop potential fraudsters in their tracks. The changes being implemented by Venmo also reflect the growing awareness on the part of technology companies for the need to get serious about security and protect the integrity of their systems and their users’ data.

You can put multi-factor authentication to use in your IT systems to keep your business protected. Get in touch with us and we’ll show you how.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 16th, 2015

SocialMedia_Mar16_AWhen taking your business online, it’s crucial you make use of different tools to help boost your online presence. Hashtags are an example of such tools; they are the key to social media buzz and have been added to various social media platforms. Isn’t it time you got a comprehensive view of how different social media sites make use of hashtags, as well as how you can get the most out of them for your business?

Twitter

Twitter hashtags don’t support special characters like +, !, $, %, -, ^, &, * but do support letters, numbers and underscores. There are no hashtag limits as long as you keep your message within the usual 140 characters.

The best way to use hashtags in Twitter is through hosting and participating in Twitter chats. You don’t need to be in an event to network with people through the official hashtag; event organizers usually market the official hashtag very well. In other words, you’ll get additional exposure if you use it.

Useful Twitter hashtag tools include:

Hashtagify which tracks trending hashtags and shows related hashtags for any base terms you provide. TwChat lets you discover, participate in and host Twitter chats. This is best used for monitoring and archiving any hashtag streams.

Instagram

Just like Twitter, Instagram hashtags don’t support special characters like +, !, $, %, -, ^, &, *, but do support letters, numbers and underscores. You can add up to 30 hashtags to a single photo or tag your photo after publishing it by listing the hashtags in the comments.

After you tag your post with a hashtag, you’ll be able to tap on the hashtag to see a page that shows all photos and videos people have uploaded with the same hashtag. Instagram hashtags can dramatically increase your following, especially if you use hot and trending hashtags which are easily found here.

The best use of hashtags on Instagram is to participate in hashtag games like #tbt (Throwback Thursday) and #MondayBlues. Both can increase your following and interactions since people click on these specific hashtags to see photos of other participants. Additionally, location-based hashtags also work very well on Instagram, whether abbreviated or in full, for example #LA and #LosAngeles.

Facebook

Facebook hashtags are similar to other social platforms; they support the standard set of characters including numbers, letters and underscore but don’t support special characters.

However, searching by hashtag on Facebook is a little unlike the rest, in that when you search for a hashtag you often end up on a Facebook page instead of a hashtag search result page. But there’s an easier way to generate hashtag search results - simply add the hashtag text after facebook.com/hashtag/, for example facebook.com/hashtag/cats.

You can also bring up hashtag search results by clicking on any hashtag in your Facebook stream. Do keep in mind that Facebook’s ranking algorithm is complex and seems to classify hashtags according to how closely you are related to the person posting the update, as well as how often the two of you interact.

The growing use of hashtags has changed how we use different social media platforms for the better. Still, it’s important to understand how these different platforms make use of hashtags in order to optimize them to your business’s advantage. Looking to learn more about how social media can help your business? Contact us today!

Published with permission from TechAdvisory.org. Source.

Topic Social Media
March 16th, 2015

HealthcareIT_Mar16_AMedical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks. One of the contributing factors to data breach is digitization. While there are several benefits of converting medical data from paper records into electronic files, there is no denying that it increases the risk of data theft. And since stolen healthcare information can be used to commit identity theft and financial crimes, securing healthcare data has become more important than ever.

According to healthcare security experts, healthcare data breaches are on the rise due to the high prices the data can command on the black market.

From financial information to medical information

In the past few years, cybercriminals’ focus has been on stealing financial data, including credit card numbers and personal information. But things are taking a turn, the result of financial institutions fortifying their database and raising client awareness of the problem. This is making it more difficult for hackers to steal financial data, let alone use them. Banks do their bit to protect their customers, too, by quickly identifying and canceling compromised credit cards.

Stronger data protection measures have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes an individual’s date of birth, medical and physical records and social security number - information that can’t be easily reset, and that is significantly more valuable than credit card data.

Securing healthcare data

Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practice measures to secure healthcare data.
  • Protect the network and Wi-Fi - As hackers use a variety of tools to break into IT systems and obtain medical records, healthcare organizations need to invest in secure firewalls and antivirus software to deploy on their healthcare devices. Network segregation is also a wise move so that, in the event that a breach does occur, the attacker can’t instantly access all of your organization’s information at once.
  • Educate employees - Staff members need to receive lessons about information security, including setting passwords, spam filters, protection against phishing, and other kinds of data breach methods.
  • Data encryption - Encrypting data is one of the safest ways to secure it. Healthcare institutions can encode patients information in such a way that only authorized users can access it. Multi encryption is also an effective way to keep out intruders.
  • Physical security - Most healthcare institutions still retain their patients’ records on paper, stored in cabinets. Ensure that all loopholes are covered by installing surveillance cameras and other physical security controls, such as electronic door locks.
It is of crucial importance for healthcare providers to secure sensitive information, in order to gain and retain the trust of your patients. If you want to know how your organization can better protect your patients information, give us a call.
Published with permission from TechAdvisory.org. Source.

March 12th, 2015

Office_Mar12_AIt’s been a long time coming, but Microsoft has finally unveiled its latest version of the Office for Mac suite of productivity applications. The first refresh that the package has seen since 2011 takes it closer to delivering the experience enjoyed by users of its Windows sibling, and it brings Office 365 and the power of cloud computing to the masses. Best of all, the whole thing is free of charge for a limited period - here are some of the features to look out for in Office for Mac 2016.

Cloud power

Office for Mac 2016 takes the power of the cloud and puts it to full use, bringing the advantages of its cloud-oriented Office 365 applications to its flagship package. As a result, you can now access your Office documents whenever and wherever, and no matter which device you are using. Aside from Office 365, the new software is also integrated with OneDrive, OneDrive for Business, and SharePoint.

It’s now possible to jointly author Word and PowerPoint documents with colleagues, and to make challenges simultaneously. Much like Google Docs, you can run a chat conversation alongside the document, in order to discuss the changes you are each making. Word and PowerPoint automatically flag up updates to the document that you might not have spotted already. These features are already available to Windows-based users of Office.

Sharing documents also becomes simpler, with a dedicated sharing button in the applications’ top right corner that allows you to invite colleagues to collaborate on the document you’re working on. It’s possible to share a document either as an attachment or as a link, and of course to control access rights for each person to whom you give access. You can open others’ Office documents right from your email account and get straight to editing.

Ribbon refresh

Until now, there have been differences in the options available on the ‘ribbon’ of icons that appear beneath the File, Edit and other menus at the top of the screen. You might see one thing on your Mac but another on your PC, and another still on your tablet. With Office for Mac 2016, Microsoft has taken the opportunity to fix those inconsistencies, so you’ll now find the options you need in the same places across all the platforms you use. A new task pane is also intended to help simplify graphics editing.

Email grouping

The updates to Outlook, and OneNote too, were actually released in 2014 and so are technically not new with this release. But one such useful update that is carried through to Office for Mac 2016 is the organization of Outlook emails by conversation, as is the case with Gmail. Emails can be sorted using a variety of other criteria, too.

Presentation aids

Office for Mac 2016 makes life a little easier for those presenting using PowerPoint slides. While your audience is shown the final product on your big screen, you can benefit from having ‘presenter view’ open on your monitor. This dedicated view gives you access to all of your presentation’s slides, any associated notes and also a timer to help you keep pace.

The entire suite of Office for Mac 2016 applications - including Word, Excel, PowerPoint, OneNote and Outlook - is available for free upgrade during Microsoft’s preview period, which runs until later this year. Once that comes to an end, you’ll need an Office 365 subscription or perpetual licence in order to keep making the most of the package’s features.

To find out more about boosting your company’s productivity with Microsoft Office applications, give us a call today.

Published with permission from TechAdvisory.org. Source.