Latest Articles
The latest news and information regarding electronic medical records, practice management software, HIPAA, and security from Nextech.
Patient Engagement | Healthcare Technology
By:
Nextech
April 7th, 2016
In a study conducted by REACH Health, nearly 400 healthcare executives, physicians, nurses and other professionals gave their feedback regarding the impact of telemedicine in their own practices. The REACH Health 2016 U.S. Telemedicine Industry Benchmark Survey found that 62 percent of practices currently utilizing telemedicine believed it was highly successful in improving patient convenience. An additional 36 percent regarded it as "moderately successful."
By:
Nextech
March 21st, 2016
Advancements in healthcare technology have fostered an environment more encouraging for greater patient engagement between patients and providers.
EHR | Coding | Regulatory & Compliance | Technology & Innovation
By:
Nextech
March 16th, 2016
Settled into ICD-10 yet? The infamous transition to the new coding system last October was met with a significant amount of controversy, but now almost six months out, it appears it wasn't as rocky as many believed, despite the 155,000 total ICD-10 codes.
By:
Nextech
March 10th, 2016
In an effort to provide relief for both eligible medical professionals and eligible hospitals and critical access hospitals, the Centers for Medicare & Medicaid Services (CMS) has once again extended the deadline to file for a hardship exception for Meaningful Use. The deadline now sits at July 1, 2016. This is the second time in the last month that CMS has opted to push back the hardship exception deadline. Originally, the deadline was March 15 for eligible professionals.
By:
Nextech
March 2nd, 2016
Before venturing out to attend the 2016 Nextech EDGE conference last week, I decided to write a bit of a teaser blog article on a topic I was covering at my session on cybersecurity—Social Engineering. (Side note: I would like to extend a most sincere thank you to everyone at EDGE who attended my sessions). In order to avoid publishing any spoilers, however, I chose not to go into too much detail and promised to elaborate further once I returned from the conference. Well… I have returned, so it is time for me to make good on that promise. Since we already explained what social engineering is in the previous article, I don’t think it’s necessary to rehash all the basics. Instead, let’s start by taking a look at some examples of social engineering tactics that are commonly employed by hackers and cybercriminals.
By:
Nextech
March 1st, 2016
When we set out to create EDGE - Nextech's National User Conference - we envisioned an environment where clients could unite as one Nextech community, educating, discovering, generating and exchanging with industry colleagues. EDGE 2016 accomplished just that - in record numbers, too.
By:
Nextech
February 22nd, 2016
On this blog, we’ve had a lot of discussion about the problem of human behavior when it comes to cybersecurity. For example, we have looked at the Sony Pictures breach, which was caused by spear-phishing emails. We looked at Edward Snowden’s hack of the NSA, which he accomplished by simply calling agents and requesting their login credentials (a combination of “pretexting” and phone phishing). We even examined the notorious agent.btz worm that spread through the entire DoD network when an agent used a USB drive he found in a parking lot. While all of the abovementioned data breaches were accomplished by different means, they all have one thing in common—all three of them employed some form of human-based tactic. The biggest reason that humans have potential to be a data security factor can be summed up in two words… Social Engineering.
By:
Nextech
February 15th, 2016
Last week, the Centers for Medicare and Medicaid Services (CMS) announced it will be implementing a two-week extension period for practices attesting to Meaningful Use. The deadline originally fell on Leap Day - February 29 - but the extension period will push back the final day to March 11. The extension applies to all eligible professionals, eligible hospitals and critical aspect hospitals participating in Meaningful Use program.