Nextech Named 2024 Best in KLAS: Ambulatory Specialty EHR

Blog

Nextech Blog

The latest news and information regarding electronic medical records, practice management software, HIPAA, and security from Nextech.

Blog Feature

Ophthalmology | Plastic Surgery | Security | cybersecurity | ransomware | Dermatology | Online Reputation | Regulatory & Compliance | Orthopedics | Security & Data Management | HIPAA

By: Nextech
September 29th, 2022

Concerned about ransomware attacks? You should be. With over 66 percent of healthcare organizations reporting they experienced a ransomware attack in 2021, proactively protecting your patients’ data has never been a higher priority.

Blog Feature

Security | Regulatory & Compliance | Security & Data Management

By: Heather Miller
June 22nd, 2021

Performing a regular Security Risk Assessment (SRA) will help an organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards. A risk assessment also helps practices discover areas where protected health information (PHI) could be at risk. To learn more about the assessment process and how it can benefit your organization, we recommend visiting the Office for Civil Rights' official guidance.

P+ ICP MPV-3

Get the latest Nextech blogs delivered straight to your inbox:

Blog Feature

Security | Security & Data Management

By: Nextech
June 30th, 2015

Welcome to the second half of our brief blog series on the dangers of fake apps and rogue security software. In Part 1, we took a look at fake apps. Among those discussed was the infamous Virus Shield, a fake mobile antivirus app that did not actually do anything. However, those who downloaded the fake app may want to consider themselves lucky that it didn’t. Had it been a rogue security software loaded with a virus (or worse), as we will show in this second installment, their situations could have been far more troublesome. In fact, a 2010 study by Google found that 15% of all malware is downloaded due to rogue or fake antivirus software.

Blog Feature

Security | Security & Data Management

By: Nextech
May 12th, 2015

Security breaches are likely to be at the forefront of your concerns when it comes to managing your practice. Still, you may not be doing everything in your power to avoid them. Take a look at these helpful tips for managing your practice's security.

Blog Feature

Security | Regulatory & Compliance | Security & Data Management | Healthcare Technology

By: Nextech
March 13th, 2015

Now that you’ve had some time to weigh the pros and cons of adopting BYOD, it is time to start working up an adoption plan. For any workplace, this requires researching and investing in certain mobile security tools. It also means addressing a number of key infrastructure and staff issues. Those in the healthcare industry must consider issues such as maintaining devices and network security, just as any other workplace would. However, those in healthcare have additional components they must take into consideration when it comes to BYOD—HIPAA compliance and securing Protected Health Information (PHI). As already mentioned in Part 1, HIPAA violations and PHI breaches can be extremely costly.

Blog Feature

Security | Security & Data Management

By: Nextech
February 5th, 2015

The last two decades have seen an unprecedented rise in technology both at home and in the workplace. This transition has affected all aspects of our lives, both public and private, and physicians practices are no exception to this statement. While advances in technology have largely been positive for the world of medicine, it's impossible to ignore the fact that a host of new security concerns have come along with this rise in user-friendly systems. When determining which EMR software best suits the needs of your practice, it's important to consider the specific situations and security concerns that your clinic or office will undergo on a daily basis. With that in mind, take a look at some of the most common security concerns affecting doctors' offices today: