Blog

April 11th, 2014

User Conference Official Banner

Mark your calendars and plan to attend our 3rd Annual User Conference June 19-21st in Austin. It will be the biggest one yet, with a focus on the new features of Version 11, including Meaningful Use Stage 2, ICD-10, and Direct Messaging. Register now and take advantage of our Early Bird Discount. Find out more, including the complete agenda, list of speakers, conference fees, and the FUN after-hour activities we have scheduled!

Click here for the registration

Clyde W. Bennett

President

Clyde Bennett & Associates

Topic Article
April 8th, 2014

User Conference Official Banner(300)

 

We are pleased to announce our 3rd Annual CB&A User Group Meeting in Austin, Texas, June 19th – 21st. We have rounded up some great speakers with excellent content to help you with the Phases and Stages we know you are going through. We have also asked a select group of vendors to join us as well, and for you to be able to see their solutions in action.

We are pleased to announce that Scott Sanner, Vice President and General Manager, BPS Division of McKesson, will be addressing us on Friday morning to share with us the future of the BPS Division.

We are especially excited to be partnering again with McKesson and providing you with a special 2-hour presentation on Friday on Configuring Practice Partner for Meaningful Use Stage 2. On Friday, we will spend 2 hours with a member of the Meaningful Use Stage 2 Implementation Team going over the steps required to ready you and your Practice Partner software for a successful attestation later this year.

We welcome the following companies as Official Sponsors of Phases & Stages:

  • Data Strategies, Inc, the makers of MDsuite
  • CallPointe
  • Equisys, the makers of Zetafax
  • Ambir Technology
  • Instant Medical History

The agenda will include separate tracks for clinical services and practice management. We will provide meaningful content for your clinical as well as your billing and administrative teams, and we encourage you to bring members of your team with you to Austin.

The Conference Price is $499.00. BUT, if you are an existing CB&A client, please accept our $100 discount in recognition of our relationship. Please be on the lookout for exclusive communications regarding your discount code or reach out to Amanda Maggio (amaggio@cwbserv.com) for assistance!

And, if you register by April 30th, take advantage of our Early Bird Special and knock $50 off the price of attendance! If you are planning to bring your spouse or partner to our Thursday evening reception, you may purchase a Guest Pass for only $125.00, which will also entitle them to all meals, snacks & refreshments during the conference.

We look forward to seeing you in Austin! Join the fun! Stay Connected & Get Involved!

Clyde W. Bennett
President
Clyde Bennett & Associates

Topic Article
April 3rd, 2014

VoIP_March31_BThe landline phone provided by the telephone company used to be the only option companies had with regard to communications. With the advance of technology and the popularity of the increased use of the Internet, Voice over Internet Protocol, or VoIP, was introduced. It has since become increasingly popular, with the majority of larger and many small companies now using this communication method. To determine if you should adopt VoIP in your business, learning about its benefits can help you in making your decision.

More affordable communication costs

Using VoIP services like users communicate to other users either for free or at drastically lower call rates than regular providers, as long as they are connected to the Internet.

Other VoIP services let you use your existing phones that are connected to the Internet to enjoy unlimited calls for a lower price compared to the per minute charge of telephone companies. These service providers offer different packages to choose from, many of which might suit the size of your company, your business needs, and your budget.

More affordable hardware and software

If you are having second thoughts about using VoIP because you are concerned that the hardware and software used would cost you a fortune, fret not. The vast majority of VoIP systems require little to no installation and many can run using existing equipment.

When it comes to the hardware, companies that choose to use VoIP through a computer need a working sound card, which your computer probably already has, as well as a headset or microphone and speaker, whichever you prefer.

Other service providers may also require the use of VoIP phones. The price of these phones is also not that costly and in some cases these phones might be provided by the VoIP providers for a nominal monthly fee.

VoIP supports multiple calls at the same time

A regular phone line normally only lets you talk to one person at a time. VoIP allows multiple calls, including conference and group calls, which is an important advantage to many businesses. This makes it easier for employees, management, and business associates to collaborate with each other and to communicate with clients.

It’s also faster for clients to connect with customer support. As a result, their concerns can be handled and resolved faster, which in turn improves the customer experience and strengthens your business relationship with them.

VoIP offers more features that traditional systems

Aside from supporting multiple calls simultaneously, there are also several more features that you can enjoy from using VoIP. These features may vary from one particular service to another, but the most common features include:
  • Fax
  • Voicemail
  • Caller ID
  • Call waiting
  • Call forwarding
  • Call blocking
  • 411 directory
  • Last number redial
There are also advanced features that some service providers offer, including call transfer, return call, speed dialing, SMS, and area code selection. Many of these features come included in VoIP subscriptions, which help keep costs of add-ons low.

These are just some of the reasons why you might choose to switch to VoIP for your business communication. If you have further questions about VoIP, don’t hesitate to give us a call. Our support team is always ready to help.

Published with permission from TechAdvisory.org. Source.

Topic VoIP General
April 2nd, 2014

gloStream_Apr02_AIn a surprising move, the House of Representatives approved a bill that includes a delay to mandatory ICD-10 implementation until October 2015. After the announcement we are sure that many medical practices breathed a long sigh of relief.

The problem: Without a fix to the Sustainable Growth Rate (SGR) formula, Medicare physicians face a 24% reimbursement cut beginning April 1. This is obviously something that does not sit well with many of the country’s medical practitioners – and rightly so. No one wants to see hard-earned profits sink because of a medical bill.

Joseph Pitts introduced a bill, H.R. 4302, that proposed to replace the reimbursement cut with a 0.5% payment update through the end of 2014 and a 0% percent payment update from January 1 through March 311, 2015.

The American Medical Association, which wants payment stability for its constituents, responded by urging House of Representatives members to vote down the proposed legislation. The code sets were caught in the crossfire.

Note: Before the ICD-10 delay takes place (and the SGR fix becomes permanent), the Senate must vote on the proposed legislation and President Obama must sign it into law. It would be a good idea to keep abreast of this issue because it will likely directly affect your practice.

If you are looking for help upgrading to ICD-10, or ensuring your practice meets established standards, contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

April 2nd, 2014

HealthcareIT_Apr02_AChief Information Officer (CIO) Denis Tanguay’s workload has quadrupled over the past few years, and he has been struggling to stay on top ensuring that systems are secure and available when his employees need it. How did he overcome these struggles? He found a solution in outsourcing.

As the CIO for Central Maine Healthcare explained in a Health Care IT News article, getting ready for Stage 2 meaningful use attestation and transitioning to ICD-10 put tremendous pressure on him and his 70-person IT staff.

A few years ago, Tanguay began working with an IT provider, which took work off his staff’s plate. Central Maine Healthcare uses IT providers in a number of ways, from service requests for new PCs, keyboards, and software installations to help with user calls. They’re essentially an “insurance policy,” says Tanguay. “They have already blazed those trails and made sure that whatever we’re going to be using has already been tested, what versions of firmware and software work well.”

Tanguay says the result of outsourcing some IT functionality has resulted in easier software upgrades, quicker response time, greater system stability, improved data security, and better disaster recovery procedures.

Moreover, outsourcing has allowed Tanguay to focus more on the things that are important. “My CEO has a line,” he says. “’We’re not in the IT business; we’re in the healthcare business.’”

When it comes to IT outsourcing, health-care providers have the option of doing a little or a lot,” says another recent article. They can turn over an entire IT function, or farm out small portions. If you are struggling with managing IT systems in your practice, or would like a little help ensuring compliance with the always changing regulations, contact us today to see how our managed services can help.

Published with permission from TechAdvisory.org. Source.

April 1st, 2014

Facebook_March31_BIn order to be successful on the Internet a company must always be evolving and adapting. This is evident with companies like Facebook which is in a near constant state of change. One of the most common changes the social media giant makes is to the algorithm that determines what content is shown on a user’s News Feed. While some of these changes may make it trickier for companies to get their content in front of users it doesn’t have to be that way.

There are many ways you can improve your News Feed performance and the best is to improve the reach of your content. Before we get into how you can do this, we should first describe what your Facebook reach is. Basically, your reach on Facebook is the number of unique users who see the content you post and your updates. When it comes to reach there are four actions you can take to influence it:

  1. Posting content on your own Page - This is commonly referred to as organic reach by Facebook.
  2. Facebook users interacting with your content - When users interact with the content on your Page e.g., commenting or sharing, this is shown in their News Feed, an act which Facebook calls viral reach.
  3. Sending users to view your content - This could be as simple as putting a link to your content on an email, or even on your website asking people to visit your Page. This is a form of organic reach.
  4. Paying to get content in front of people - This is using Facebook’s ad services and paying to target your content to specific audiences, thereby increasing the chance they see and interact with it. This is commonly referred to as paid reach.

By combining these four actions together, you can get a picture of your overall reach. By increasing the reach of each post through the above actions you stand a higher chance of getting your content in front of other people. The more people who see your updates the higher the chance of interaction with your company on Facebook or through other mediums, including avenues of sales.

The question is: How can a company do this? Here are seven of the most effective ways to improve your News Feed and its performance.

1. Develop a strategy

The key to posts being shared is that they need to be useful and interesting to your audience. Take a look at your Page’s Insights (Open your Page’s Admin panel and click on Insights) to see what content has been popular with your followers. From there develop a content strategy that covers what content to produce, when it should be produced, and when it should be shared.

Take a look at the most popular posts and see when they were interacted with most. This will give you a good idea of when your followers are most active and likely to interact with your content – thus increasing reach and overall effectiveness of your posts.

2. Know your audience

This will take time and research, but you should be able to paint a pretty solid picture as to who your audience is. If you can define a few personalities or even target individuals, you can better come up with content your audience will be more willing to interact with, or be more receptive to should you promote it.

3. Let people interact with your Page

Some companies have allowed users to post content on their News Feed or even tag companies, having the post show up on the company’s News Feed, only for the content to be trolling or negative. This can potentially harm your company brand and reputation.

While there is a chance of this happening, the benefits of allowing your fans and followers to mention you in their posts far outweighs the potential negative outcomes of a few. This is because when a user mentions or tags you in a post on their News Feed, their friends are more likely to see it too. In other words, this can be a massive contributor to your overall viral reach.

4. Be active after you post your content

Don’t just post content onto your Page and leave it. If people are interacting with it by commenting then you should make an effort to reply to the comments. This shows that you are interested and responsive, and willing to communicate and create a dialogue.

Mentioning the poster using @username when you comment will highlight the name and post your comment on their News Feed, thereby increasing the number of people who view your original content and encouraging the commenter to return to your Page.

5. Don’t be afraid to repost

If you have had successful posts in the past, don’t be afraid to reintroduce them. You could try updating the content a bit if need be and reposting it. This will increase the chance of other users seeing content they may have missed and interacting with it. Just be sure to comment somewhere that this content is a repost. You could comment that it was popular in the past and you think it is still relevant to today.

Be sure not to recycle too often however, as this can be viewed as lazy and turn users off. Aim for one to two posts every couple of months.

6. Integrate successful posts with other aspects of your online presence

While there is a good chance that your posts will be seen on Facebook, try boosting this by sharing your most popular content on other mediums. For example, paste the link into your email signature asking people to check it out, or add a list of your most popular posts to newsletters. This will encourage more people to visit the content and even interact with it.

In order to tell what is working, use the information on your Page’s Insight panel.

7. Don’t be afraid to be innovative

If you hit on a strategy that works, that’s great! But, you should not be afraid to try new ideas. If, for example, you see that captions on photo posts are becoming popular with your audience give one a try to see how it works. The key here is to be resourceful and always on the lookout for new ideas.

Looking to get more out of Facebook? Contact us today to see how we can help.

Published with permission from TechAdvisory.org. Source.

March 27th, 2014

BI_March24_BSeveral companies nowadays rely on Business Intelligence or BI tools to analyze information generated by their business. These tools are either installed on computers or cloud-based and accessible on the Web. These applications allow users to ensure that everyone is on the same path with regards to achieving their business goals. The question is, how are different departments using them?

There are various BI tools available nowadays that support small to large companies. You can find Business Intelligence tools that fit your company’s size, needs and budget. These applications can be used in different areas of the business:

Marketing Department

A marketing department is responsible for promoting a company’s products, services and brand to increase public awareness. With successful marketing, a business can attract potential clients that can be possibly turned into creating sales revenue. The company can use BI to determine which campaigns are successful or not, as the case may be. Through this, investments can be focused on those campaigns that work whilst avoiding those that have previously failed.

Sales Department

Sales managers and supervisors can also use BI to analyze successful deals, as well as those that they have lost, to see what strategies have worked. The system can also help determine which sales teams hit or exceed set goals in order to analyze what they are doing right. Moreover, this helps determine which products or services are most saleable so these can be pushed further to attain more goals.

Finance Department

BI software makes analyzing, reporting, and managing financial data more convenient. Those who are involved in the process can easily access the information they need through the system. Analysis is easier as the data is organized and accurate. Money in and money out can also be tracked with greater efficiency.

Moreover, these tools often come with features that allow users to create scenarios and determine the possible results from there. This is extremely helpful in deciding on the best action to take as the tool gives you a view of the probable outcome. The success rate is higher if forecasting using a BI tool.

Inventory

Business Intelligence also plays a vital role in inventory tracking of products, items or supplies. For instance, companies in the retail industry can track the movement of products or items from the suppliers to the warehouse and on to their delivery to clients. Any problems encountered in the process can be quickly identified so they can be fixed in time.

Items in demand can also be pinpointed, as well as low stock and overstocks. Items that are low in stock can be ordered immediately, especially if they are in demand, to ensure that the needs of clients are met. This also lets you avoid overstocking, which can be a waste of money when investment is better used for fast moving items.

These are just some of the ways businesses can use BI in their operations. If you have further questions about the topic, do not hesitate to give us a call. We’ll be more than happy to assist you.

Published with permission from TechAdvisory.org. Source.

March 26th, 2014

Office_Mar24_BMicrosoft Outlook can be convenient to use to read and send emails on different accounts. Outlook is popular largely because it offers the convenience of not having to sign into different email clients to check your messages. Aside from your default mail folders like inbox, drafts, sent and junk, it also comes with search folders that give you easy access to important messages. Creating personalized folders is also supported.

Outlook is one of the most popular email platforms allowing you to read emails from almost any account. The inbox is where the majority of your interaction with Outlook is, but the problem is that many users receive so many emails that it can be overwhelmed quickly. This makes it more difficult to find important emails, or separate the spam/less important emails.

One way to deal with this is by creating a customized search folder for important emails. This makes searching for vital messages easier as they are saved in a separate folder.

Default and predefined search folders in Outlook

There are three default search folders in Outlook and you can see them under “search folders” in the mail navigation pane on the left side of the window. These default search folders are categorized mail, large mail and unread mail. Categorized mail contains messages that are categorized by color.

The large mail folder is a search folder that includes messages that are over 100 KB in size. Unread mail, as the term suggests, contains emails that have not yet been read.

Predefined search folders are also available. These are existing search folders that you can add to the search menu, below the other folders. Some of these require that you enter specific criteria, while others do not. For instance, “mail flagged for follow up” does not require any criteria, while “mail with specific words” asks you to enter certain words that the message must contain to be included in the folder.

Adding predefined search folders can be done by following the steps below:

  1. Click File.
  2. Select New and choose Search Folder. The New Search Folder window will appear.
  3. Click on any of the predefined search folders.
  4. Select the option you want if asked for a specific criterion.
  5. Click OK.

Create a new search folder in Outlook

It’s also possible to create your very own search folder. You get to set not only the criteria, but its name as well. This makes it convenient to easily access important messages as you don’t have to browse through the inbox or various folders in your mailbox.

Here’s how to create a new search folder in Outlook:

  1. Right click on Search Folders in the mail navigation pane and click New Search Folder. You may also press ctrl+shift+p on your keyboard to make the window appear.
  2. Click Create a Custom Search Field followed by Choose.
  3. Enter the name of the new folder in the name field.
  4. Click Criteria and set your preferences to further personalize the folder and click OK.
  5. Click Browse and select folders to add in your customized search folder, then click OK.
  6. Select OK on the new search folder window and the new folder you created will be added under your search folders.
Messages in search folders will still remain in the original folders where they are saved. Even if you view the messages and delete the search folder, the messages will still be accessible in their default folder. However, if you select and delete a message in a search folder, it will be completely removed, even from its original folder.

If you have any concerns or feedback with regards Outlook search folders, feel free to get in touch and we’ll help you in every way that we can.

Published with permission from TechAdvisory.org. Source.

March 20th, 2014

Security_Mar17_BThe security of your computer, network and whole system is likely something that has caused moments of stress and even worry. In order to ensure that a business is secure, companies often adopt a security strategy. While these strategies are great, there is one common element that many businesses forget to carry out – the audit.

Auditing and the security security strategy

Auditing your company’s security is important, the only problem business owners run across is where and what they should be auditing. The easiest way to do this is to first look at the common elements of developing security strategies.

These elements are: assess, assign, audit. When you develop a plan, or work with an IT partner to develop one, you follow the three steps above, and it may be obvious at the end. In truth however, you should be auditing at each stage of the plan. That means you first need to know what goes on in each stage.

During the assessment phase you or your IT partner will need to look at the existing security you have in place. This includes on every computer and server and also focuses on who has access to what, and what programs are being used. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.

The assignment phase looks at actually carrying out the changes you identified in the assessment phase. This could include adding improved security measures, deleting unused programs or even updating systems for improved security. The main goal in this phase is to ensure that your systems and networks are secure.

Auditing happens after the changes have been made and aims to ensure that your systems are actually secure and have been implemented properly. Throughout the process you will actually need to continually audit and adjust your strategy.

What exactly should be audited?

When conducting an audit, there are three factors you should focus on:

  1. The state of your security - Changing or introducing a security plan usually begins with an audit of sorts. In order to do this however, you need to know about how your security has changed in between audits. Tracking this state and how it changed in between audits allows you to more efficiently audit how your system is working now and to also implement changes easier. If you don’t know how the state of your security has changed in between audits, you could risk implementing ineffective security measures or leaving older solutions open to risk.
  2. The changes made - Auditing the state of your security is important, but you should also be auditing the changes made to your systems. For example, if a new program is installed, or a new firewall is implemented, you will need to audit how well it is working before you can deem your security plan to be fully implemented. Basically, you are looking for any changes made to your system that could influence security while you are implementing a new system. If by auditing at this point, you find that security has been compromised, you will need to go back to the first step and assess why before moving forward.
  3. Who has access to what - There is a good chance that every system you have will not need to be accessed by every employee. It would be a good idea that once a security solution is in place, that you audit who has access to what systems and how often they use them. This stage of the process needs to be proactive and constantly carried out. if you find that access changes or system access needs change, it would be a good idea to adapt your the security strategy; starting with the first stage.

If you are looking for help developing a security strategy for your business, contact us today to see how our managed solutions can help.

Published with permission from TechAdvisory.org. Source.

Topic Security
March 19th, 2014

BCP_Marc17_BDRPs (Disaster Recovery Plan) although seemingly expensive or hard to implement, are a must have for your business. Since businesses spend thousands of dollars optimizing and upgrading their systems, doesn’t it make total sense to protect your investment? With a good DRP in place, you should be able to mitigate risks in case of a disaster.

While there are several facets to a DRP that are going to determine whether it will be effective or not, making sure that you’ve considered these 5 tips is definitely a good start.

1.) Commitment from management

Because the managers are the ones who will coordinate the development of the plan and be the central figures who implement the recovery plan, it’s crucial that they are committed to it and are willing to back it up.

They will also be responsible for setting an allocated budget and manpower to creating the actual plan. That said, it’s very important that they know the concept behind it and how huge of an impact a DRP can have on a business.

2.) A representative on each department should be available when creating a DRP

It’s unthinkable to believe that your DRP is well optimized when you haven’t had a representative from each department coordinate with you while creating the recovery program.

Considering how they themselves are the front line of your organization with the best knowledge about how their department works, it’s a huge plus that you should take advantage of when creating a DRP.

With the representatives on your team, you’ll be able to see things from their perspective and gain first-hand knowledge from those who do the actual work.

3.) Remember to prioritize

In an ideal world, you should be able to restore everything at the same time after a disaster strikes. But since most businesses usually have a limited amount of resources, you will usually have to recover systems one at a time.

Because of this, you need to have a hierarchy or a sense of priority when determining which systems should be recovered first. That way, the most important systems are immediately brought back up while the less important ones are then queued in order of their importance.

4.) Determining your recovery strategies

This is one of the main focal points of a DRP since this phase tackles the actual strategies or steps that you’ll implement to recover your systems.

When determining your actual strategies, it's important that you brainstorm and think about all the options that you have to recovering your systems. Don’t simply stick with the cheapest possible strategy or even the most expensive ones.

You have to remember though that the simplest strategy to implement is probably the best one. That is, as long as the simplest strategy covers the critical aspects of your system recovery.

That said, avoid over complicating your strategies as you might face unnecessary challenges when it comes to the implementation of the recovery strategy.

5.) Do a dry run at least once a year

Your DRP shouldn’t end with the concept alone. No matter how foolproof you think your strategy is, if you haven’t tested it you most likely have missed something important.

It's during the dry run phase that the need for extra steps (or the removal of one) are made even more evident. You can then start polishing your strategies according to how your dry run plays out. It would also be a good year to practice your plan each year and update it accordingly.

These tips will help you ensure that your DRP will remain effective should a disaster occur. If you’re having a hard time figuring out how to go about the process of creating a DRP, then give us a call now and we’ll help you with the process.

Published with permission from TechAdvisory.org. Source.