Blog
How to Prevent and Protect your Healthcare Organization from Email Phishing Attacks
Healthcare cybersecurity expert, True North ITG Co-Founder and CEO Matt Murren unpacks a common...
How to Prevent a Ransomware Attack via Remote Desktop Protocol
Healthcare cybersecurity expert, True North ITG Co-Founder and CEO Matt Murren unpacks a common...
What Medical Practice Managers and Health IT Professionals Can Do to Alleviate Physician Burnout and Increase Physician Wellness
In part one of our physician burnout series, we spoke with President Dr. Quinn Pauly and Executive...
eClinicalWorks Education and Training: Best Practices for Implementation, Adoption, & Beyond
Whether your practice is a longtime user of eClinicalWorks (eCW) or preparing to make the...
EHR Implementation Best Practices: Keys to a Successful Launch
The smoothest EHR implementations minimize disruptions to workflow and maximize efficiency and...
Stark Law Changes: A Q&A with Healthcare Lawyer Ayesha Mehdi, JD, MHSA
As of January 19, 2021, long-awaited changes to the Physician Self-Referral Law (Also known as the...
HIPAA Changes in the Pipeline: A Q&A with Healthcare Lawyer Ayesha Mehdi, JD, MHSA
Long-awaited proposed modifications to the HIPAA privacy rule intend to support and empower...
Ransomware Attackers Take Aim at Healthcare Industry: What Physician Practices and Clinics can Do to Protect Themselves
The FBI and U.S. Department of Health and Human Services recently announced that they have...
How to Keep Your Information Safe from Phishing
Learn how to identify phishing attempts and keep your business safe. In 2015, hackers stole almost...