Skip to main content

Best Practices

161 articles

Industry best practices and implementation guides

WannaCry ransomware attack on desktop screen, notebook and smartphone, cyber attack internet security concept
Best Practices

Beware of These Email Subject Lines for Potential Ransomware Attack

Last year, we shared 10 steps to take when (not if) your organization is hit with a ransomware attack. Now that several months have passed, the number of malicious cyber attacks that have plagued IT professionals has grown exponentially. The stakes have never been higher. Public services, financial data, and protected health information are all in jeopardy when such widespread security compromises take place.

Ben HensonBen Henson
2 min read
hipaa hitech breaches in healthcare|
Best Practices

Breaches and the HIPAA/HITECH Omnibus Deadline

90 days. That’s all the time healthcare organizations have between now and the September 23 HIPAA Omnibus compliance date. Understandably, most healthcare compliance officers are focusing on the significant changes spelled out in the regulations: obtaining business associate agreements, updating notices of privacy practices, and training staff members on the changes to the law.

Krishna KurapatiKrishna Kurapati
2 min read
Image of a charred wheelchair in Paradise Gardens senior community during Camp Fire in Paradise, Calif.. on Thursday, November 8, 2018.
Best Practices

California Wildfires - What Can We Do Now?

The Golden State has been under siege from devastating wildfires, unlike any they have seen before. At the time of this article 140,000 acres have been consumed due to the Camp Fire just North of Sacramento which is considered only 40% contained. Camp Fire has grown to be the most destructive and deadliest wildfire in California’s history.

jolean-sheffieldjolean-sheffield
4 min read
patient texting post op|fever control|infection|medication
Best Practices

Can Patient Texting Improve Post-Op Recovery?

A focus of many hospitals, ambulatory surgical centers, and clinicians is improving surgical outcomes and post-op recovery for the patients they serve. And with good reason. Not only do these providers care about their patient outcomes and recovery experience, but the information is now publicly searchable on sites like Healthgrades.com.

jolean-sheffieldjolean-sheffield
5 min read
carechannels facilitate value based care|volume to valued based healthcare transition
Best Practices

CareChannels Facilitate Value-Based Care

Value-Based Healthcare is increasing financial risk for healthcare organizations. With the new bundled payment programs, your responsibility no longer ends at patient discharge. Hospitals, skilled nursing facilities, and home health organizations can no longer be loosely aligned to succeed.Hospitals frequently lose track of a patient’s recovery after discharge because they are loosely aligned with skilled nursing facilities and home health nurses. These healthcare organizations have no easy way to collaborate with doctors to report patient issues.

Ben HensonBen Henson
2 min read
decorative image - risks of a byod policy in healthcare
Best Practices

Carefully Considering the Risks of a BYOD Policy in Healthcare

Seemingly everyone in their organization wants to adopt a bring your device (BYOD) mobile policy. However, the benefits of empowering employees with greater access to data typically drown out the lingering data control concerns.If you find yourself considering a BYOD policy, first think about your risks. As any OCR/HHS or hospital CIO, who has suffered through a data breach, will tell you, security risk assessments are vital to a HIPAA compliance plan. So what are the unique risks of adopting a BYOD policy in the healthcare world?

Krishna KurapatiKrishna Kurapati
3 min read
cloud based healthcare vendors and hipaa compliance|hipaa conduit rule and cloud computing
Best Practices

Cloud Computing and Conduits

For years, cloud-based healthcare vendors had tried to avail their organizations to the conduit exception to HIPAA. Broadly speaking, the conduit rule exempts entities from complying with HIPAA if they only transmit and do not access PHI (usually on behalf of a Covered Entity). In the buildup to the Omnibus Rule, PHR vendors, data storage companies, and other cloud-based providers lobbied HHS to broaden the scope of the conduit exception.

Krishna KurapatiKrishna Kurapati
3 min read
CMS Hospice Relief - QliqSOFT Blog
Best Practices

CMS Hospice Relief

As portions of the United States start to resume “normal” operations, the Center for Medicare and Medicaid Services (CMS) has released another round of waivers targeted towards the Hospice industry. With fresh guidance on timelines - CMS is actively working to provide resources to relieve some stress for healthcare workers nationwide. In line with previous guidelines, these changes go into effect immediately without healthcare providers having to request waivers from CMS.

dante-hernandezdante-hernandez
4 min read
common questions on secure texting|secure messaging and texting features of mobile sms app
Best Practices

Common Questions on Secure Texting & Secure Messaging for Healthcare

One of the most important aspects of qliqCONNECT security is how we encrypt your messages. First, all network connections are encrypted with transport encryption called TLS. So all communication over the Internet is secure. Second and more importantly, qliqCONNECT encrypts the message content using Public-Private Key Encryption. With this approach, every user on qliqCONNECT has a unique encryption key and each message is encrypted for a single particular user.

john-skowlundjohn-skowlund
4 min read

Get Best Practices Updates

Stay informed with the latest articles and insights on best practices.

We respect your privacy. Unsubscribe at any time.