Setting the Stage for IT Operational Greatness – Act I, Here We Go!

The most prosperous companies today ensure that their IT environment promotes both productivity and sustainability, right from the very beginning. How can you create a setup that guarantees both? Stable people, process, products, and partners will lend strength to each branch of your business if you allow it to. Through this article, my goal is…

I Think I Need to Sit Down … I Didn’t Understand a Word of That

This article is about ITSM, yet another technical term. But do you understand what it is or even care? I will try to explain why you should know and care, in non-technical terms unlike like a mechanic that said… Once the timing belt went, the cams spun out of control and broke the rocker arms….

Spring Cleaning Is Coming Soon… Don’t Let Your Get Scrubbed

If you think most data breaches are due to malicious insiders, you’d be wrong. Forrester found that only 12% of security incidents are caused by disgruntled employees with mal-intent. Whereas, a whopping 27% of security breaches were caused by employees’ inadvertent misuse of data.2 This means that if your business does experience a security breach,…

Gamification For Better Health?

In one of the LinkedIn Groups, I’m a part of; the question was asked How do we motivate people to become active participants in improving their health? Here’s my response “One thing I have been doing for years to get X (X = End Users, Patients, Executives, etc.) to become more active (from a technology acceptance viewpoint)…

5 Key Elements In Using the ITIL Framework to Manage the Boom in Blockchain

Blockchain is likely here to stay. Read this article I authored that’s been picked up by Simplilearn.com, one of the world’s leading certification training providers. They partner with companies and individuals to address their unique needs, providing training and coaching that helps working professionals achieve their career goals.    

Think Ahead with Azure!

Businesses can’t ask where they want to be in 5 years without considering where they want their tech to be as well. The way I handle our IT solutions has a direct impact on how I manage business, growth, and disaster. How do I build solutions now that will work later? By developing solutions that…

Why Azure?

As an IT Service Management consultant, I work with customers to select the best services to support their IT and make it secure. It’s my job to know the difference between a trend and solutions worth adopting. In this cloud market, I recommend Microsoft Azure. They’re an efficient, secure, flexible, and cost-effective method for data…

4 critical elements for e-signatures

While we still do not have flying cars in 2017 yet (I think) and we’re not completely paperless, we do have e-signatures. Yep, you can use cute fonts to legally bind a document without every having to lift a pen. Over the course of my professional career, I’ve used and helped clients use may of…

Can Gamification Increase Revenue?

It’s 2017, and I’ve come to realize that we’re living in a Millennial-driven marketplace. Obvious, right? Well, some creative geniuses are coming up with a way to monetize that movement by using gamification to not only to keep up with that millennial movement but profit from it as well. What if there was a way…

Healthcare or Wealthcare

Today the Senate plans to release its healthcare bill or is it a “wealthcare” bill? Of course, this will more than likely be rejected by the Democrats and possibly welcomed, or at least voted for but the Republicans. GOP opponents, namely Democrats think this is just a tax cut for the wealthy, so that is…

Telemedicine Video: U.S. employers could save up to $6 billion per year by providing telemedicine technologies to their employees

Telemedicine. It Just Works. Telemedicine = Healthier Employees. Happier Families. Better Results!  

Are today’s mobility challenges finally solved?

Business doesn’t just happen in the back office anymore. We’re now living in a world where everyone works on the go and they’re using their devices more than ever. Mobile apps have transformed the way we do our jobs and how we interact with corporate data. The demand for mobile applications in the enterprise is…

90% of managers say traditional performance management, no good

According to PWC, 90% of managers say traditional performance management is not a good use of time and that only 13% of the workforce is engaged and no sign of big improvements. PW also reports less than 19% of employees are consuming e-learning content. What does this all mean? I don’t claim to have all…

Telemedicine could potentially deliver more than $6 billion a year in health care savings

This research represents great news for US companies, according to an analysis by global professional services company Towers Watson (NYSE, NASDAQ: TW). If you’re an HR Director, HR Manager, Benefits Manager, Office Manager, or the CEO of your company, Hosperity may be able to help. Hosperity is a telehealth solution that gets your employees healthier and happier. Your…

Flashbrand provides a real-time employee feedback solution

See how patent-pending GECaBi™ inventor is working with smart companies that are transforming data into actionable intelligence. Company Spotlight: Flashbrand is a real-time employee feedback solution for more effective performance management, employee surveys and pulse checks, executive coaching and more. Voted Best HR Startup Award by Manpower Group some of their big clients are L’Oreal and…

MobileFrame provides a true code-free mobile app development platform.

See how patent-pending GECaBi™ inventor is working with smart companies that are transforming data into actionable intelligence. Company Spotlight: MobileFrame provides a true code-free mobile app development platform. Organizations can quickly and easily design, integrate, deploy and manage sophisticated mobile apps for all mobile clients: iOS, Android, Windows, and HTML5 without writing a single line…

Why I believe IoT may never improve the quality of your service or product

In a 2016 Bain survey, 47% of participants said they were looking to use IoT (Internet of Things) to improve the quality of their service or product, leading to price premium and lower support costs. Simple right? I mean, with IoT, predictive analytics, and big data, it’s a snap… don’t count on it. Let’s take…

Transforming Healthcare IT

Cloud momentum The demand for hybrid cloud solutions is clear. Today’s organizations are looking for more agility, easier management, and access to more capacity to enable them to handle increased growing data and infrastructure demands without increasing costs. Forty-one percent of health executives say the volume of data their organization manages has increased by more…

Better care through secure, anywhere access

The average profit from a stolen medical record is $20,000 — 10 times more than regular identity theft.* Security breaches cost healthcare organizations $37 billion in 2015 — an average of $398 per stolen record.** Medical practices are looking for better ways to secure patient health information (PHI) and allow workers to provide excellent care with features…

Health Analytics for everyone in 4 easy steps

Fueled by widespread EMR adoption and the rise of consumer health technologies, the digital data universe in health is growing at 48% a year. And, yet, few organizations are equipped to generate actionable insights from all of this data. This is because most organizations lack the ability to draw vast and rapidly growing bodies of data together so that they can uncover the hidden connections affecting their patient populations. Given that the rate of health data production is due to increase, how can health organizations make intelligent use of it to improve their quality and effectiveness of services?

Safeguard your business

Why getting affordable enterprise-grade protection, built-in and integrated across your business will be crucial to business survival. In 2017 and beyond, businesses of all sizes need modern protection for evolving threats, with solutions that help protect critical business data and minimize the disruptions caused by unexpected events. With the Cloud, enterprise-grade protection is built into…

Healthcare Innovation+Insight in the Cloud

Cloud momentum The demand for hybrid cloud solutions is clear. Today’s organizations are looking for more agility, easier management, and access to more capacity to enable them to handle increased growing data and infrastructure demands without increasing costs. Forty-one percent of health executives say the volume of data their organization manages has grown by more…

Optimizing Clinical+Operational Effectiveness

Fueled by widespread EMR adoption and the rise of consumer health technologies, the digital data universe in health is growing at 48% a year. And, yet, few organizations are equipped to generate actionable insights from all of this data. This is because most organizations lack the ability to draw vast and rapidly growing bodies of…

Transforming Mobility In Healthcare

While electronic medical record (EMR) adoption has soared in recent years, physician satisfaction and productivity seem to be on the decline. In a recent survey, physicians cited that EMR implementation is causing them to spend more time navigating technology and less time focusing on patients.1 What this trend suggests is that clinicians are yearning for…

Breaking News—Manuel W. Lloyd @ CPAC 17

Manuel W. Lloyd, Founder, and CEO of Manuel W. Lloyd Consulting® asked to speak at 2017 CPAC Symposium: Thursday, March 09, 2017 8:00 AM—Friday, March 10, 2017 1:00 PM (Eastern Time) CPAC is the Contingency Planning Association of The Carolinas. CPAC was formed in 1987 for the purpose to promote awareness of contingency planning and disaster…

Office 365 Skype for Business In Healthcare

In this Lunch-n-Learn, Manuel will share how you can improve HIPAA compliant communication and performance between clinicians, executives, and administrative teams anywhere, anytime, and on any device. Enable patient-centered collaboration Remote delivery of patient education Post-treatment counseling Virtual group sessions #ManuelWLloydLunchnAndLearn RSVP now!

I need your help…

Hey, This is Manuel (yeah, it’s me asking for your help): I have a small favor to request that in the end will benefit you. But first, let me explain what’s led up to this. Over the last year, we’ve seen a dramatic increase in the number of clients who are inquiring about how to…

Office 365 Skype for Business In Healthcare

In this Lunch-n-Learn, Manuel will share how you can improve HIPAA compliant communication and performance between clinicians, executives, and administrative teams anywhere, anytime, and on any device. Better reach and care for patients. Facilitate examination, diagnosis, treatment, and monitoring of patients in remote locations. Improve clinical communications between patients and caregivers. Leverage scarce resources #ManuelWLloydLunchnAndLearn RSVP…

Office 365 Skype for Business In Healthcare

In this Lunch-n-Learn, Manuel will share how you can improve HIPAA compliant communication and performance between clinicians, executives, and administrative teams anywhere, anytime, and on any device. Keep current with advancements in medicine Meet CME requirements. Provide access to education for rural/remote clinicians Improve internal core competency training for employees. #ManuelWLloydLunchnAndLearn RSVP now!  

Office 365 Skype for Business In Healthcare

Connecting people everywhere to achieve more, together. In this Lunch-n-Learn, Manuel will share how you can improve HIPAA compliant communication and performance between clinicians, executives, and administrative teams anywhere, anytime, and on any device. RSVP now!

Get more value and options

According to a recent Techaisle study, businesses like yours face two key challenges: budget constraints and excessive data growth. How can you stay agile and balance growth with IT costs? With enterprise-grade cloud storage, you can keep up with data and business expansion easily and affordably while making the most of your existing budget and…

Breaking News—Please Retweet

Manuel W. Lloyd, Certified ITIL® ITSM Expert to provide expert webinars on IT Service Management In Cloud Computing. Simplilearn.com, the world’s largest professional certifications company. Simplilearn.com is an Onalytica Top 20 influential brand with a library of 400+ courses, and they have helped 500,000+ professionals advance their careers, delivering $5 billion in pay raises. Manuel will…

5 Often Overlooked Security Measures Medical Practices Must Have In Place When Using Mobile Devices

Listen in as Manuel discusses 5 things that could hurt or help your medical practice when it comes to mobile computing.

3 Considerations when contracting with Managed IT Services Providers For Small to Medium Sized Medical Practices

When the time is right for your medical practice to bring on a Managed IT Services provider there are several things to consider before signing a contract. Practices both large and small have certain needs that are better managed by professionals. Contracting with a managed service provider allows practice managers and senior management to focus…

9 Benefits of Social Media Marketing for Acquiring New Patients—And Keeping Existing Ones

Social media marketing provides a way for your medical practice to increase “word of mouth” advertising about your quality patient care. Listen in for more…    

Shadow IT How Your Patient’s Data Is Silently Being Leaked Online

Here’s a growing trend creeping into organizations of all industries and sizes: Shadow IT. Shadow IT are unauthorized cloud applications employees are using and downloading to perform work-related activities with company data. This can be file-sharing services like Dropbox or surveys such as Zoomerang. The list goes on and on. In this ITSM Brief, Manuel…

Why “Break-Fix” Works Entirely In The Consultant’s Favor, Not Yours

A question I often get from small medical practices is “Why do I need to be on a ITSM plan? Can’t I just pay you to come out and fix things when they’re broken?” While that’s a legitimate question if we were talking about your washing machine or car, that’s certainly not the right approach…

Stay Secure My Friend…  More Hackers Targeting small to medium medical practices

Many small to medium medical practices don’t realize it, but the path to some grand cybercrime score of a lifetime may go right through their backdoor. Small to medium medical practices commonly work with much larger healthcare systems. Unfortunately, they may be unaware that this makes them a prime target for hackers. Worse yet, this…

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question—how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small medical practice website? What’s to stop someone from sending patients of…

4 Key Components of a Robust Security Plan Every Small to Medium Medical Practice Must Know

Most medical practices are now technology dependent. This means security concerns aren’t just worrisome to large healthcare systems anymore, but also the neighborhood urgent care, the one Doc practice, and the local non-profit health center. Regardless of size or type, all healthcare organization has valuable ePHI that should not be breached under any circumstances. Today’s…

5 Ways small to medium medical practices Can Save Money on Security

Small-to-medium sized medical practices and large enterprise health systems may seem worlds apart, but they face many of the same cybersecurity threats. In fact, in recent years, cybercriminals have increasingly targeted small to medium medical practices. This is because it’s widely known that small to medium medical practices have a smaller budget, and less in-house…

Service Patients Not Technology: Achieving HIPAA Compliance/High-Level Data Security In The Cloud

Prioritizing Security & Privacy in the Healthcare Sector Physician offices, hospitals, and health insurers take practical steps each day to protect private patient health information (PHI) and comply with HIPAA regulations. Anyone interacting with patients and regularly accessing or discussing confidential medical records must adhere to certain requirements to uphold privacy and security. For example,…

Why Healthcare Organizations Are Looking At Microsoft Closer To Ensure HIPAA Compliance

First of all, I do not resell any hardware or software. I could; but my value as a Virtual CIO stands on choosing the vendor who’s product/services align with my clients’ organization objectives. With that being said, I have been really impressed with @Microsoft. Their new MS Office 2016, Office 365, Azure, and other products…

Medical Manager’s HIPAA Security Guide to Business Continuity & Disaster Recovery for Medical Practices Part 4 of 4

8 Cold Hard Truths for Medical Practices Not Worried About Disaster Recovery and Business Continuity The foundation of any successful business continuity solution is the ability to retrieve data from any point in time from anywhere. When the topic of data recovery and business continuity comes up, you get the feeling that many decision makers…

Medical Manager’s HIPAA Security Guide to Business Continuity & Disaster Recovery for Medical Practices Part 3 of 4

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon? Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business…

Medical Manager’s HIPAA Security Guide to Business Continuity & Disaster Recovery for Medical Practices Part 2 of 4

What You Can Learn From U.S. Regulator’s Business Continuity & Disaster Recovery Recommendations U.S regulators have recommended that all futures and securities firms review and update their current data backup, disaster recovery, and business continuity solutions. Prompted by closures in the equities and options market in the aftermath of Hurricane Sandy, Regulators including the SEC,…

Medical Manager’s HIPAA Security Guide to Business Continuity & Disaster Recovery for Medical Practices Part 1 of 4

Breaking News:  Downtime Kills Small Businesses Downtime is bad news for any medical practice whether big or small. While the hourly cost of downtime for a small-to-medium sized medical practices won’t be nearly as large as that astronomical of a New York-Presbyterian Hospital figure, downtime is often more detrimental to smaller medical practice. Smaller practices…

Cloud Computing — How Will It Affect You?

We are always on the watch for the ‘next best thing’ when it comes to technology and the Internet. Certainly, no one can doubt that Cloud Computing and the next generation of the Internet has had a dramatic effect on how people interact and connect with each other – both from an individual standpoint and…

What You Don’t Know About Telemedicine Could Get You Fined

Back in 1992, I had ambitions of creating technology that would allow Physicians to diagnose patients over the Internet. People laughed at me. Well, I don’t know if I was smart enough back then to do it or even now, but the fact of the matter is that the technology is now here, and its…

Bridging The Gap Between Healthcare & HIPAA Compliant Cloud Technology

In the healthcare sector, the storing and sharing of sensitive digitized patient data has become a significant undertaking and is a heavy burden on resources. Preparation for a complete conversion from paper medical records to electronic health records (EHR) by 2015 has independent practitioners and small healthcare entities making significant investments in equipment, hardware, software,…

Top Healthcare Data Breaches Fines To Date

1. Advocate Health System (Downers Grove, Ill.): $5.55 million The latest HIPAA settlement is also the biggest. In the first week of August, Advocate Health System agreed to settle HIPAA violation claims related to three data breaches that occurred in 2013. In total, the three incidents compromised the protected health information of 4 million individuals. Read…

Healthcare IT Breach Report: North Carolina

I will make this more comprehensive in the future but for now, these numbers a very shocking BREACH TYPE BREACH MONITOR RECOMMENDED Hacking/IT Incident Improper Disposal Loss Theft Unauthorized Access/Disclosure Monitor everything with an IP address See §164.310(d)(1) Consider Mobile Device Management (MDM) GPS, MDM, Physical Security §164.(310)(a)(1), §164.312(a)(1), §164.308(a)(3), §164.308(a)(4)    

3 Steps To Ensure Healthcare Data Availability In The Cloud

In 2013, major companies like Google, Amazon, and Microsoft experienced outages. Not only were these big name outages disruptive to users, but they also made headlines and proved to be costly to each brand. Google’s hiccup footed an estimated bill of $500,000 while Amazon’s 30-40 minute blackout contributed to roughly $3 million in losses. 2013…

1 Reason Why Healthcare Is Changing Faster Than Ever Before

For years it seemed that security concerns would always keep healthcare data out of the cloud. But the cloud is now wooing hospitals, clinics, and doctors looking for a means to improve efficiency, streamline costs, enhance security, and remain HIPAA compliant as they transition from paper to electronic health records. If you’re a decision-maker in…

Manuel W. Lloyd Selected As Expert Speaker for HCCA

Webinar: Aligning Operational Efficiency In Healthcare IT with HIPAA Compliance October 10, 2016 | 12:00 pm CT (90 min.) | earn 1.2 CCB CEUs* 12:00 pm Central / 1:00 pm Eastern / 11:00 am Mountain / 10:00 am Pacific / 9:00 am Alaska / 7:00 am Hawaii-Aleutian QUESTIONS: liz.hergert@corporatecompliance.org Speaker: Manuel W. Lloyd, CEO, Manuel W….

5 Major Benefits of Migrating Confidential Patient Data to the Cloud

Today’s patient desires anytime/anywhere access to health-related information and physicians often need access to digitized health data such as MRI scans, ultrasound images, or mammograms away from the office. Patient information must also be accessed for clinical decision-making such as potential prescription drug interactions or the American Recovery and Reinvestment Act of 2009 (ARRA) funded…

7 Ways Cloud Patient Data Breaches Are Less Common Than Onsite Breaches

Don’t fear the cloud: Onsite patient data breaches are far more common, costly, and destructive. Graphic By HIMSS Analytics How HIPAA Breaches Occur Most Often The U.S. Department of Health’s Office of Civil Rights (OCR) found that there have been 21 million HIPAA security breaches since 2009. These breaches have resulted in an average of…

7 Ways to Avoid Being One of the 21 Million HIPAA Breaches Since 2009

As the cloud is establishing a foothold in the industry as the data management system of choice for many healthcare service providers, cloud security continues to evolve for the better. However, you must still choose a cloud service provider wisely and ensure that patient data is secure at all levels of workflow. To avoid being on the…

Stolen devices responsible for 66% of HIPAA violations

The U.S. Department of Health’s Office of Civil Rights (OCR) found that there have been 21 million HIPAA security breaches since 2009. These breaches have resulted in an average of 2,769 records being lost or stolen per breach. Among them: 48% were stolen medical files 48% were stolen billing and insurance records 24% were stolen…

“And The 2015 HIPAA Wall Of Shame Awards Go To…”

Breach Fatigue? Yep, believe it or not, people are tired of hearing about HIPAA violation fines. I even had a group retaliate against my company (which is also a crime) for telling them I had to report the breaches found or I could be subject (as their BA) to the penalties. Ain’t gonna happen, jack! At any rate, healthcare…

Technology: A Driver for More Effective Healthcare?

The rules have changed on the path to modernize healthcare organizations. A recent McKinsey report predicts that the healthcare industry is readying for a significant wave of IT adoption, and suggests that now is the time for healthcare organizations to invest in technology-based solutions and strategies.[1] By doing so, healthcare organizations will be positioned to operate…

How Not to Fall Victim to Phishing Schemes

69% of Healthcare CXOs Fear Phishing Attacks according to a HiMMS 2015 Cybersecurity Survey…and it seems they should since research has revealed that over half of all users open fraudulent emails. As noted in the graphic, a survey by HiMMS on cybersecurity for healthcare organizations, 72% said that phishing schemes basically freak them out enough…

10 EHR Systems Put To The Test & Their Results

Do you work in the healthcare field? If so, please comment on your experience with these 10 EMR/EPM systems. Graphic courtesy of Healthcare IT News @HITNewsTweet #AskManuel. Please ReTweet and Share On LinkedIn. What say you?

3 Steps To Ensure Healthcare Data Availability In The Cloud

In 2013, major companies like Google, Amazon, and Microsoft experienced outages. Not only were these big name outages disruptive to users, but they also made headlines and proved to be costly to each brand. Google’s hiccup footed an estimated bill of $500,000 while Amazon’s 30-40 minute blackout contributed to roughly $3 million in losses. 2013…

HIPAA! HITECH! HELP!— Mobile Device Management (MDM) in Healthcare

The number of mobile devices in healthcare facilities is increasing rapidly, as is the diversity of mobile platforms, operating systems (OSes) and communication methods to be supported by these organizations. In remarks made at George Washington University Hospital in Washington D.C., FCC Chairman Julius Genachowski said that healthcare is being “transformed” by broadband, and called…

Expert Webinar: How ITIL’s IT Service Continuity Model Can Help You Defeat a Ransomware Attack

About the Webinar: August 25, 2016 10AM CST / 9AM EST The ITIL model of Business Continuity & Disaster Recovery is popular because it works. With data backup, disaster recovery, and emergency operations strategies that can stop Ransomware in its tracks or help you recover in hours, it’s a favorite among ITIL professionals. Agenda of…

10 Hidden IT Risks That Threaten Your Healthcare Organization

According to a Forrester Consulting report, 89% of healthcare organizations have some percentage of their staff working off-site at least one day a week, and more than 10% have experienced at least one security breach in any given year. Given the ethical demands of patient confidentiality and the legal requirements imposed by numerous regulatory bodies,…

7 Questions To Ask Your Healthcare Cloud Provider To Avoid Headaches

Healthcare professionals want to service their patients, not their technology. The Cloud can help solve that problem, and very quickly and securely…” Prioritizing Security & Privacy In The Healthcare Sector Physician offices, hospitals, and health insurers take practical steps each day to protect private patient health information (PHI) and comply with HIPAA regulations. Anyone interacting…

Consumerization Of ePHI?

Yes! Recently I spoke at an event with “golden agers” about how healthcare records, specifically electronically Protected Health Information, will be in the palm of the hands of the patients. Many in the crowd expressed concern of having to keep up with one more thing. Others welcomed the idea. Well, now it’s on the horizon…

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

Sort of Ironic that the word “Target” is in my title. That was not to spite the retailer with whom I love to shop. However, I trust they learned a great lesson about security. Now, here is another lesson for SMBs that think they are too small for hackers to worry about. Think Again… 71%…

BREAKING: ID Card Verification Needed for Your BCBSNC Medicare Customers

***NOTICE FROM BCBSNC*** “Newkirk Products, Inc., a vendor that issues member ID cards for Blue Cross and Blue Shield of North Carolina was the victim of a sophisticated cyber security incident that was discovered on July 6, 2016. This incident affected at least six Newkirk clients, including BCBSNC. ID card images of about 277,000 of…

Infographic: The 3 Required Implementations For Backing Up ePHI

[infographic id=”x1470302400205″]   Another Required Implementation is §164.308(a)(8) Evaluation which states: “Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and subsequently, in response to environmental or operations changes affecting the security of electronic protected health information, that establishes the extent to which an entity’s security policies and procedures meet the requirements of…

CMS.Gov Twitter Account Look Alike?

Breaking: I was just doing a Twitter Search for the CMS.gov and typed CMS.gov that the search brought back all these Tweets using @CMS_gov. It appears that it is being used, possibly hijacked, or more than likely, people just not paying attention to the @CMS_gov handle. If you know these folks, better let ’em know. Are there…

Hackers Go From CREAM to DREAM

Data rules everything around me, D.R.E.A.M, data, data, data, y’all

Breaking: Manuel W. Lloyd Gives Expert Advice On Defeating Ransomware

Join Our CEO, Manuel W. Lloyd As He Provides An Expert Webinar: “How ITIL’s IT Service Continuity Model Can Help You Defeat a Ransomware Attack” About the Webinar | Thursday, August 25, 2016 @ 10:00AM CDT The ITIL model of Business Continuity & Disaster Recovery is popular because it works. With data backup, disaster recovery,…

Know Your Patient Rights

OHSU Pays $2.7 Million In HIPAA Fines

Feds settle data breach case with Oregon Health & Science University for $2.7 million This does not have to be your hospital, medical practice, or community health center. If your IT Department is not versed in what to look for to prevent HIPAA violations, send one or more to training. One great resources for the…

$250,000 For Cyber Threat Information

ONC FUNDING FOR CYBER THREAT INFORMATION SHARING IN THE HEALTH CARE AND PUBLIC HEALTH (HPH) SECTOR

Microsoft’s Shift To Technology Agnosticism

Most healthcare organizations deal with interoperability issues on a daily basis… EHRs, EPM, PACS, Reporting, Quality, et al, all fighting against each other because application integration is about market share more than soltuions. All Operating Officers and Practice Administrators want is the data. They don’t care how or by what means. Healthcare Providers, Execs and Managers…

BREAKING NEWS: $1 Million In Free Ransomware Coverage?

Security firm SentinelOne is confident it can defend any #ransomware threat with their “Cyber Threat Guarantee” and starting today can be purchased like and “extended warranty” to their service offering.

Manuel W. Lloyd to Speak At FIME Show August 4th 2016

Now in its 26th year, FIME is the most-attended medical trade exhibition in the Western Hemisphere, serving the entirety of the North, Central and South American regions. Hosting over 38 countries worldwide at the exhibition, FIME’s primary focus is across four medical industry sectors: technology, products and supplies, services and equipment.

What’s More Operationally Efficient — Hire Internal IT Staff or Outsource to an External IT Service Provider?

Should you hire or Outsource to an External IT Service Provider? Most healthcare organizations handle all aspects of their operations, including acting as the Information Technology department. This will work for as long as you remain a medical practice with a few employees. When you grow and start hiring more staff, will it make more…

Developing a Trusted Social Media Reputation

How Healthcare Providers Can Avoid Reputation Damage In Social Media Establishing credibility and gaining an admired reputation on Social Media is NOT an impossible dream. In fact, I’ve got tons of tips to help you gain exactly that … a good reputation with their patients, employees, and vendors! A weak reputation can certainly improve with the proper steps and…

If You Build It, They Will Come…

If You Build a Hotel in the Middle of the Desert, Don’t Expect Any Guests It’s a common myth that things will fall into place after something is built, either online or offline. As we all know very well, there are many things that should not be put into the hands of chance. Patient Portals are…

Defending Healthcare Against Ransomware

Breaking News: Manuel W. Lloyd Consulting® has partnered up with Infrascale, recently dubbed a Visionary by Gartner for it’s DRaaS (Disaster Recovery as a Service) and Online Backup services, to prevent Ransomware attacks from affecting maximum operational excellence for Healthcare organizations such as hospitals, private medical practices, and community health centers. After nearly 30 years in Healthcare…

Ransomware Will Reach $1B in 2016: 6 Ways To Defend ePHI

@CNNMoney is reporting on an incident that happened in Horry County, South Carolina where the demand from Ransomware from was paid. Healthcare organizations are quickly becoming the #1 target of Ransomware because the ability to access medical data is essential to serving patients. And serving patients is essential for billing and practice survival. But you don’t…

Breaking News: Could Live Streaming Violate HIPAA Compliance?

In the most resent news of police shootings and police being killed, social media beat traditional news outlets to the punch with live streaming tools on their mobile devices, Tweets, Facebook posts, etc. This made me reflect on a lot of things and since I am a healthcare technologist helping medical practices with HIPAA Compliance,…

What Is Secure Sign On (SSO)?

Cloud-Based Secure Sign On: Each user needs only one password for all applications and tools regardless of device Multi-factor Authentication: Ensures the highest level of security Mobile Device Management: Manage, provision or remove any device, anywhere, anytime Active Directory Support: Make Office 365 support easy & secure Highly Flexible Policy Management: Customizable policy for single users or groups of users…

4 Tips For Creating A Business Continuity Plan For Your Medical Practice

Is your medical practice prepared for any disaster? Medical Practices may not have as many are still as vulnerable to a disaster as a large corporation. If your medical practice office(s) were to be destroyed by a tornado, you could lose valuable data if you don’t plan ahead. Many medical practices don’t want to take…

4 Steps to creating a basic Businesses Disaster Recovery Plan

Loss of data is a common problem for businesses. Fortunately, it’s a problem that can easily be avoided with the correct preparation. While devastating amounts of data can be lost during catastrophes like hurricanes, terrorist attacks, fires and floods – it doesn’t take such large events to cause a business to lose important data. It…

Hackers get new tools… Managed IT Services Providers to the Rescue?

Two companies have released software that mines information about individuals on the Web. Core Security Technologies dropped its Exomind application, while Paterva released its Maltego program. Can Managed IT Services Providers Respond? Both applications have one thing in common. They can be used to collect information on individuals from snippets of data dropped all across…

Cloud Computing — How Will It Affect You?

We are always on the watch for the ‘next best thing’ when it comes to technology and the Internet. Certainly no one can doubt that Cloud Computing and the next generation of the Internet has had a dramatic effect on how people interact and connect with each other — both from an individual standpoint and a…

4 Ways To Protect Your Investment In EMC Product(s) Amidst The Dell Acquisition, Seriously!

If you’ve been following my posts, you know that I love EMC Enterprise Storage Products; XtremIO, Data Domain, Isilon, etc. However, when I got the news like everyone else about the acquisition by Dell, I felt uneasy. Not because Dell is a bad company. Not because Dell has bad products and certainly not because of…

3 Reasons Why The CIO Position Must D.I.E.

When looking to fill today’s CIO (Chief Information Officer) position, one usually that looks for a high-level techie that has some business savvy. In most cases, this role has for decades stressed the technical savvy.   In today’s disruptive technology business cycle, so much tech hits the CIO that there’s no brain-bandwidth to get it…

Cloud Computing Security: Is the Cloud Ready for your Confidential Data?

What is Cloud Computing? You can’t look anywhere these days without reading about “cloud computing.” The term seems to be popping up everywhere. So, what exactly is cloud computing? A simplistic definition is computing on the Internet. It allows users the ability to access everything on the Internet, from software to their stored data, without…

4 Reasons To Use Identity as a Service (IDaaS)

The unstoppable trend towards Bring Your Own Device (BYOD), Software as a Service (SaaS) applications and “shadow IT” is driving an explosion of password sharing and reuse. The inevitable result is greater exposure to attacks, lower productivity and higher support cost. These forces require that companies and IT providers finds smarter ways to control access…

8 ways to keep your Small Business Secure

If you own and operate a small business, lowering costs is an important part of keeping your company in the black. Cutting costs on your IT budget could inadvertently compromise your company’s security. Even though small businesses may not have all of the resources that large corporations do, they are still just as vulnerable to…

Is the iPad useful as a mobile computing device for businesses?

Some businesses have jumped on the iPad wagon and are finding creative ways to use the iPad as a mobile computing device. For example, the Global Mundo Tapas restaurant in Sydney, Australia uses the iPad as an interactive menu. There’s a budget airline, Jetstar Airways, using the iPad for in-flight entertainment, rented for $10 a…

Password strength is key in Business and Personal Information Security

In today’s technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, email provider, online banking, accounting or payroll applications. To underestimate the importance of strong passwords…

Proactive, Managed IT Services save small and medium healthcare organizations thousands of dollars yearly

Every dollar a medical practice spends needs to have an immediate and quantifiable return. This is especially true for critical services such as IT support. If you are one of the millions of healthcare organizations that depend upon your technology to keep your medical practice running, proactive Managed IT Services will save you money, improve…

Maintaining HIPAA compliance with Online Data Storage

Keeping patient records secure and private is the concern of every hospital and health care provider, but they are often overwhelmed with years and years of patient information and the lack of adequate storage space. Destroying these health records in order to make room for more storage is often not an option. Patients want access…

Remaining Innovative Is A Key To Medical Practice Growth

Whether you are launching a new medical practice, or several years into operating your existing healthcare organization, you need to continue to maintain an innovative mindset that will allow you to creatively fuel growth. This means exercising your creative thinking skills in order to develop and explore new ideas, opening the doors to new and…

Should Healthcare Entities hire or Outsource to an External IT Service Provider?

Most small healthcare entities handle all aspects of their businesses, including acting as the Information Technology department. This will work for as long as you remain a small entity without many employees. When you grow and start hiring more staff, will it make more sense to use your patient care time on handling IT issues or outsource to…

The high cost of recovery from a PHI Security Breach

Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. Medical practices are not immune to this. These budget cuts can often result in reduced security and sub par IT services…

The importance of Communication, Messaging and Collaboration in the Healthcare Workplace

With so much technology and messaging and collaboration solutions at our fingertips, it is difficult to believe that there are any communication problems in any business today. In the course of a busy workday, the importance of good communication can be something that can be easily forgotten. If you are noticing that it is difficult…

What to look for when choosing Healthcare Online Data Storage Services

The days of keeping confidential information such as ePHI locked in a metal filing cabinet are gone. Most healthcare organizations have most everything, from personnel files to patient information and financial information, stored on their personal computers or computer network. What happens when your healthcare organization runs out of storage space? Or, worse yet, what if your computer…

Is 2016 The Year Of Identity-as-a-Service (IDaaS)?

The unstoppable trend towards Bring Your Own Device (BYOD), Software as a Service (SaaS) applications and “shadow IT” is driving an explosion of password sharing and reuse. The inevitable result is greater exposure to attacks, lower productivity and higher support cost. These forces require that companies and IT providers finds smarter ways to control access…

When is your healthcare entity ready for Managed IT Services?

If you are a healthcare entity and considering whether or not Managed IT Services will benefit your practice, the answer is almost always — yes. There is little doubt that most healthcare organizations can benefit from Managed IT Services, yet that in itself does not always justify the cost of bringing on a third-party provider. Accepting that…

Why your company needs an Internet Use Policy

With computers and Internet access such an integral part of every business, and the Internet filled with everything from gambling to X-Rated websites, it is critical that every business has an Internet Use Policy in place. This policy can help prevent your employees from accidentally or intentionally causing harm to your company or your company’s…

4 Benefits of Outsourcing for Technology Services

Most business entrepreneurs have great talent and the means to run a very successful business. The snag they most often run into is the belief that they can do it all. This mindset can be detrimental to the overall success of their business. Trying to do it all can lead to hindered growth, lower profit…

3 Considerations when contracting with a Managed IT Services Provider

When the time is right for your business to bring on a Managed IT Services provider there are several things to consider before signing a contract. Businesses both large and small have certain needs that are better managed by professionals. Contracting with a managed service provider allows owners and upper level management to focus their…

Supported Technologies