Blog

Could one tiny leak wipe out your entire company?

Things were going great at Michael Daugherty’s up-and-coming $4 million medical testing company. He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists.

Read more

How to keep staff from unintentionally causing a security breach

With so many access points from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly […]

Read more

The #1 threat to your security is…

YOU! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online. In most cases, this is done without malicious intent – but if you as a manager or owner aren’t monitoring what web […]

Read more

A WARNING if you handle, process or store client credit cards

If you handle, process, or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment. If you violate them, you will incur serious fines and fees.

Read more

HIPAA Help Center

We have had a great response to our new software offering, HIPAA Help Center! HIPAA Help Center provides practices with an affordable, easy to manage system that was designed with the sole purpose of handling compliance to meet ever increasing standards.

Read more

Six Misconceptions about Outsourced IT

A common problem many small business owners have is letting go. Many feel that because it is their business, they simply must be in charge of everything. This can put a lot of undue stress on a person, especially if they are not experts in areas like IT. When it comes to information technology, one […]

Read more

Never use PERSONAL devices to connect to COMPANY data

You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly monitored by your IT company.

Read more

Medical Practices Brace for 2016 Desk Audits

“For doctors in a small to medium-sized practice, patient care takes first priority, and these challenges are making it harder for practices to thrive,” explains Kevin Wade, President and CEO of IntelliSystems, a local IT company that provides risk assessments for practices to help them work toward HIPAA compliance and prepare for potential audits.

Read more

Use STRONG passwords!

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

Read more

Working from home? DON’T! Until you read this…

If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is encrypted and password protected from your company’s IT provider (or IntelliSystems!), you could accidentally introduce a virus or invite an unwanted visitor into the […]

Read more