Tustin, Irvine, Santa Ana | Reliable IT

Blog

Billions of Computer Devices Won’t Get Intel’s Spectre Fix

17 Product Groups Named-Their Production Halted and Update Support Ended After Irrefutable Evidence Uncovered Flaw in Intel Chips. The information about the Spectre attacks came to light back in January 2018. Intel and other technology firms and vendors were made aware of research findings by Paul Kocher from Spectreattack.com and Jann Horn from Google Project Zero. Paul’s ...

Read More

The Urgent Need for the Smart Use of Smartphones in Healthcare

10 Steps Healthcare Facilities Should Take to Ensure the Security of ePHI When Employees Use Smartphones It’s estimated that 74 percent of hospital workers use tablets or other mobile devices to collect and share information about patients.1 And although smartphones and other mobile devices can provide many benefits in the healthcare setting, using them also presents a number ...

Read More

IT Helps Dementia Patients

Dementia and Alzheimer’s are scary for both patients and caregivers. Right now, there is no cure. Scientists are trying to find ways of prolonging patient’s lives and delaying the onset of the disease. IT Technicians are finding ways to make lives better and caring for patients easier. Some remarkable work is doing things for these ...

Read More

9 Great Microsoft Outlook Timesavers

Are you using Outlook to its fullest potential? If not, you’re missing out on a valuable tool that will make your work so much easier. Not only will it incorporate everything you need to do with emails, like make appointments and set “Quick Steps,” it can save you a lot of time. We have 9 ...

Read More

Easy Ways to Make Outlook 2016 Work Better for You

The new Outlook 2016 has incorporated some cool features, designed to be helpful and make your work day a little smoother. It can look a bit different depending on what version of Outlook you’re using and how your admin sets it up. What’s New in Outlook 2016? When you open Outlook, you’ll see six areas. Across the ...

Read More

What? Artificial Intelligence is Snooping Around In Our Private Electronic Health Records?

This may sound like science fiction, but it’s not. The leading electronic health record vendors are, or will soon be, using Artificial Intelligence (AI) to read our EHRs. They revealed this at the 2018 HIMSS18 conference. EHR vendors Allscripts, athenahealth, Cerner, eClinicalWorks, and Epic all plan to add AI into the next versions of their EHR platforms – some as early ...

Read More

1 Breach A Day Is 1 Breach Too Many! Take Note – HIPAA Fines Have Increased

The healthcare sector fell victim to more than 330 data breaches in 2017 – nearly one per day. Will you be next? Large-scale ransomware attacks like WannaCry (which hit 112 countries) struck the industry with a scary new reality: Hackers will find a way in and – regardless of safeguards taken — hospitals will get hit. And ...

Read More

Statistics Don’t Lie – Healthcare Hacking Is the Leading Cause of Data Breaches

Are you certain that your healthcare workers understand the risks to your PHI and other confidential information? A clinic in Baltimore thought theirs did, but they were proven wrong when they discovered their patient records were up for sale on the Dark Web.   In 2016, a Baltimore substance abuse treatment facility was hacked. Their patient ...

Read More

Is Your Hospital Stuck In The Dark Ages?

Bring your healthcare practice into the future with cloud computing technology. As the demand for better healthcare rises in the U.S., more healthcare organizations are utilizing cloud computing. There’s been an increase in demand for healthcare services due to aging populations and the growing prevalence of chronic diseases. Healthcare providers are experiencing cost pressures from the ...

Read More

My IT is Compliant, So I Guess That Means It’s Secure, Right?

Short answer? No. Despite what you may have been led to believe, there’s a big difference between compliance and security. IT compliance and security are not the same. IT Security refers to the best practices and IT solutions used to protect your technology assets, information, and data. It’s the process of implementing specific measures and systems ...

Read More