CT Business Solutions Collegeville - Local Blog


Phishing attacks, one of the biggest threats

Posted on: 11/24/2018 | by: Jim Carmody

One of the biggest threats to the electronic Protected Health Information (ePHI) in your practice’s IT systems is phishing attacks by e-mail. If you are not familiar, cyber criminals send an e-mail to someone in your practice and try to trick them into clicking on a link.   This link sends them somewhere on the Internet […]

Continue Reading

YouTube video, how to encrypt your Windows 10 Pro computer

Posted on: 10/10/2018 | by: Jim Carmody

Yesterday, I made a YouTube video showing how to encrypt your Windows 10 Pro computer using Windows BitLocker.  This video supplements my previous post of “Encrypt data at rest, laptop encryption.

Continue Reading

Breached! my medical information

Posted on: 08/23/2018 | by: Jim Carmody

Last month, I received a letter that a Business Associate’s medical information that they use was breached.  This possibly resulted in my medical information being leaked.  Remember, a Business Associate is not where a patient receives treatment but a third party vendor, someone the Covered Entity you went to trusts with your medical information. What […]

Continue Reading

YouTube video, security of computer hard drives

Posted on: 07/17/2018 | by: Jim Carmody

Recently, I made a YouTube video demonstrating why security of computer hard drives is important.  This video basically encapsulates my previous two posts of “Encrypt data at rest, laptop encryption” and “Computer disposal and reuse for your medical practice.

Continue Reading

FreshStart-get your slow laptop running better than new

Posted on: 06/19/2018 | by: Jim Carmody

Have a three to five year old slow laptop? Last month,  I blogged about proper computer disposal and reuse.  Specifically, for businesses with sensitive information like medical offices with patient data.  But what if you have a slow laptop that is three to five years old, limping along, most likely has malware, and you would like […]

Continue Reading

Computer disposal and reuse for your medical practice

Posted on: 05/14/2018 | by: Jim Carmody

old computers at your medical practice Does your medical practice have old computers lying around or in a storage area?  These computers could be there because your practice just upgraded or replaced computers.   You have kept the old ones around in case you needed important information off of them.  This reason of “could have important […]

Continue Reading

Encrypt data at rest, laptop encryption

Posted on: 04/17/2018 | by: Jim Carmody

Think laptop with password is secure? Recently, a small medical office posted a rudimentary breach notification informing the public that thieves had stolen a laptop from their office.    They emphasized a couple times not to worry because the Windows laptop needed a password to log into it.  That’s great but anybody with some computer skills […]

Continue Reading

Encrypt data at rest, smartphone encryption

Posted on: 03/19/2018 | by: Jim Carmody

Do you need to encrypt transmitted texts? If your medical office relies heavily on texting for day to day operations, encrypted texting may be worth looking into.  But a lot of small medical offices might not find it reasonable and appropriate if they only do occasional coordination though texting.   So you may just want to […]

Continue Reading

Secure Google account through Google Authenticator mobile app

Posted on: 02/19/2018 | by: Jim Carmody

Would you want your Google account compromised? Do you use Google for e-mail?  Have you started to use it for other services like Google Drive, Maps, You Tube, or synchronizing bookmarks in Chrome? I increasingly use Google for personal business.  Even sharing potential sensitive information with family through Google Drive.  You usually have one account […]

Continue Reading

Getting your brain around HIPAA and risk management

Posted on: 01/09/2018 | by: Jim Carmody

continual process We have been busy trying to improve our risk management process for our clients.  In other words, we are always trying to decrease the risk or probability that their patient data will be breached.  More generically, we have been trying to make sure our clients are more HIPAA complaint.  It is our philosophy […]

Continue Reading