Nextech Named 2024 Best in KLAS: Ambulatory Specialty EHR

Nextech Blog

The latest news and information regarding electronic medical records, practice management software, HIPAA, and security from Nextech.

Blog Feature

Security & Data Management

By: Nextech
June 3rd, 2016

Not even the NFL is safe from the recent rise in stolen healthcare data. According to a report from Deadspin, a laptop belonging to an athletic trainer for the Washington Redskins was stolen out of the trainer's car after it was broken into. The laptop was located in a backpack, which was taken during the robbery.

Blog Feature

Security & Data Management | Healthcare Technology

By: Nextech
May 31st, 2016

Visit any healtchare IT blog today and it's likely you'll see a barrage of articles pertaining to cybersecurity - and for good reason. The healthcare industry has been especially vulnerable to cybersecurity attacks through tactics such as ransomware or data hacking, which is why the College of Healthcare Information Executives (CHIME) decided to do something about. In a press release on Tuesday,CHIME announced the creation of the Cybersecurity Center and Program Office.

P+ ICP MPV-3

Get the latest Nextech blogs delivered straight to your inbox:

Blog Feature

Regulatory & Compliance | Security & Data Management | Healthcare Technology

By: Nextech
May 26th, 2016

Every day, it seems something new is happening in the healthcare industry. Whether it's greater innovations in technology, breaking compliance news or even the growing threat of data hacking, there's a lot going on in healthcare. So you're able to catch up on all of the relevant news, lunchtime links will be a valuable resource for you to read about what's going on in the industry in one place, rather than searching all over the Internet.

Blog Feature

Regulatory & Compliance | Security & Data Management

By: Nextech
May 10th, 2016

"This matters. It's a matter of life and death." Those were the words of Vice President Joe Biden on Monday when he spoke at the Health Datapalooza in Washington, DC. The importance of healthcare IT and data sharing isn't lost on Biden. He experienced it firsthand as his son, Beau, was fighting cancer over a year ago. The Vice President described how difficult it was for the different hospitals his son received care at to share information.

Blog Feature

Security & Data Management

By: Nextech
April 15th, 2016

Data breaches are becoming an all too common occurrence in today's society. That could be quite an understatement for the healthcare industry, according to one report. An Internet Security Threat Report conducted by Symantec found that 39 percent of all data breaches in 2015 were within the healthcare industry.

Blog Feature

Security & Data Management

By: Nextech
April 11th, 2016

Ransomware is becoming more common and the healthcare industry has recently been a favorite target of hackers. With five ransomware attacks on healthcare organizations in the last month, healthcare organizations need to pay more attention to combatting ransomware.

Blog Feature

Security & Data Management

By: Nextech
April 8th, 2016

This has been a crazy month for ransomware attacks and, unfortunately, the vast majority of them have been focused on healthcare facilities and providers. In fact, no less than five healthcare organizations have been hit in just the last 30 days (and those are just the ones we know about because they were actually reported). On March 30, King’s Daughters Health in Madison, Ind. had to shut down their EMR after finding a user file infected with a well-known form of ransomware dubbed “Locky.” Then, on April 4, operations at MedStar Health were brought to a screeching halt by a ransomware attack that locked their EMR and demanded a payment of roughly $19,000 worth of Bitcoin to release the data. MedStar chose not to pay the ransom, instead taking the time to restore their system via backups. However, I would bet dollars to donuts that doing so ended up costing them far more than $19,000 when all was said and done.

Blog Feature

Security & Data Management

By: Nextech
March 2nd, 2016

Before venturing out to attend the 2016 Nextech EDGE conference last week, I decided to write a bit of a teaser blog article on a topic I was covering at my session on cybersecurity—Social Engineering. (Side note: I would like to extend a most sincere thank you to everyone at EDGE who attended my sessions). In order to avoid publishing any spoilers, however, I chose not to go into too much detail and promised to elaborate further once I returned from the conference. Well… I have returned, so it is time for me to make good on that promise. Since we already explained what social engineering is in the previous article, I don’t think it’s necessary to rehash all the basics. Instead, let’s start by taking a look at some examples of social engineering tactics that are commonly employed by hackers and cybercriminals.