CT Business Solutions Collegeville - Local Blog

610-409-9800



Encrypt data at rest, laptop encryption

Posted on: 04/17/2018 | by: Jim Carmody

Think laptop with password is secure? Recently, a small medical office posted a rudimentary breach notification informing the public that thieves had stolen a laptop from their office.    They emphasized a couple times not to worry because the Windows laptop needed a password to log into it.  That’s great but anybody with some computer skills […]

Continue Reading

Encrypt data at rest, smartphone encryption

Posted on: 03/19/2018 | by: Jim Carmody

Do you need to encrypt transmitted texts? If your medical office relies heavily on texting for day to day operations, encrypted texting may be worth looking into.  But a lot of small medical offices might not find it reasonable and appropriate if they only do occasional coordination though texting.   So you may just want to […]

Continue Reading

Secure Google account through Google Authenticator mobile app

Posted on: 02/19/2018 | by: Jim Carmody

Would you want your Google account compromised? Do you use Google for e-mail?  Have you started to use it for other services like Google Drive, Maps, You Tube, or synchronizing bookmarks in Chrome? I increasingly use Google for personal business.  Even sharing potential sensitive information with family through Google Drive.  You usually have one account […]

Continue Reading

Getting your brain around HIPAA and risk management

Posted on: 01/09/2018 | by: Jim Carmody

continual process We have been busy trying to improve our risk management process for our clients.  In other words, we are always trying to decrease the risk or probability that their patient data will be breached.  More generically, we have been trying to make sure our clients are more HIPAA complaint.  It is our philosophy […]

Continue Reading

Time to get new computers? Maybe not!

Posted on: 04/22/2016 | by: Jim Carmody

Like every small business, CT Business Solutions has been faced with the inevitable problem of aging computers.   Like all, we just want the things to keep working so we can work on “sexier” things like growing the business.   We don’t want to dump time, money, and energy into upgrading computers.   But inevitably, hardware ages and […]

Continue Reading

late New Year’s resolution, document!

Posted on: 01/26/2016 | by: Jim Carmody

If it is not too late, my New Year’s resolution is to document, document, and document.  We are the only creatures around that can externalize thought, ideas, and solutions to a non-living thing like paper or computer.   One nifty idea, as far as “writing things down”, is when you go to bed at night, thoughts […]

Continue Reading

Simplify review of EHR logs for HIPAA compliance

Posted on: 12/02/2015 | by: Jim Carmody

A clear, required item in the HIPAA Security Rule is 164.308(a)(1)(ii)(D), Information System Activity Review.  A medical organization and its subcontractors (otherwise known as Covered Entities and Business Associates) must regularly review the logs for systems that access electronic Protected Health Information (ePHI).  Where is most of a medical practice’s ePHI stored?  In their EHR […]

Continue Reading

Do as the government says not as it does

Posted on: 11/17/2015 | by: Jim Carmody

You can “Google it”, but in short, as evident by letter I received (click link below to open pdf scan), the Chinese probably now have all the plethora of  information I filled out about myself to get a government clearance (I have had a government contract job in the past and am now in the Army Reserves). […]

Continue Reading

Got budget?

Posted on: 09/29/2015 | by: Jim Carmody

Do you make a budget for your medical practice?  Specifically, do you realistically budget technology expenses for your practice? Like every business, you are mainly concerned about making your revenue higher than your expenses.   So budgeting for an expense like bookkeeping, marketing, or technology is not always first on your list.  Rarely, the reason you […]

Continue Reading

Protect and serve all your nodes!

Posted on: 09/04/2015 | by: Jim Carmody

We have kept busy here at CT Business Solutions Collegeville this year.   We have been adding clients to our “managed node empire” slowly but surely and have finally reached one hundred Windows and Apple systems that we are proactively managing and maintaining! What is important to note is that this does not include smart phones.   […]

Continue Reading