Education, News Events, Social Media, Tip of the Week, Upcoming Events

National Health IT Week

National Health IT Week

September 26-30, 2016


Click for more activities, information, highlights and new health IT tools/resources

A Message from President Obama Commemorating National Health IT Week


“During National Health IT Week, we recommit ourselves to improving the health of our citizenry using the breakthrough technologies of our time and reaching for the next frontier of innovation…Because of our collective efforts, 97 percent of our Nation’s hospitals and three-quarters of doctors are using electronic records to care for their patients…These efforts help advance our Administration’s goal of fostering the seamless and secure flow of electronic health information when and where it is needed most. Though there is more to be done to realize a healthcare system that fits each of our needs, I am confident that if we continue working together, we can build a future of greater health and prosperity for coming generations.”

President Barack Obama, commemorating National Health IT Week

For the full message see:

Here are some of the events. View daily for updates

  • New resources: Health IT Playbook, EHR Contract Guide
  • Blockchain white papers posted
  •  Newest survey on hospitals using certified EHRs
  • Dr. Vindell Washington will be available on Tuesday, September 27 at 11:00 am ET using #AskVindell for Twitter Chat
  • Twitter Chat on Model Privacy Notice on Thursday, September 29th at 2:00 pm ET using #MPNchat
Education, News Events, Tip of the Week, Upcoming Events

Introduction to the Health IT Playbook



The Office of the National Coordinator (ONC) within the U.S. Department of Health and Human Services (HHS) developed this 1st edition of the Health IT Playbook (Release 1.0) to address many of the questions that providers ask during implementation and use of health IT. Created from compilation of multiple research, previously developed as well as newly created tools, this playbook provides content that addresses these questions and more:

  • How do I choose, implement, or upgrade an electronic health record (EHR) system?
  • How do I redesign workflows to improve and optimize practice efficiency and effectiveness?
  • How can I connect and share information with other providers and public health officials?
  • How can I activate and engage patients and their families?
  • How do I learn more about improving patient outcomes and prepare for new quality payment programs?
  • How do I protect the confidentiality, integrity, and availability of personal health information in my EHR system?

Will include Electronic Health Records, Certified Health IT, Health Information Exchange, Patient Engagement, Value-Based Care, Privacy and Security, Quality & Patient Safety, Care Settings, Population and Public Health, and Specialists.

For the complete playbook visit: The Office of the National Coordinator for Health Information Technology HEALTH IT PLAYBOOK:


Cyber Security, Education, News Events, Trends & Technology, Upcoming Events

MFTC 2015 HIMSS Michigan Chapter Event

Welcome to the 9th Annual Midwest Fall Technology Conference – MFTC

After a successful 2014 conference at Chicago filled with learning, fun, and networking, we are happy to announce the Detroit Michigan HIMSS Chapter 2015 Event. Last year’s conference had close to 700 hundred attendees who participated in unique opportunities, enjoy authentic Chicago nightlife at the House of Blues and premier events.

2015 Midwest Fall Technology Conference
2015 Midwest Fall Technology Conference

To be held in:

Detroit, Michigan at the Detroit Marriot at the Renaissance Center

October 25th through the 27th

This Healthcare Information Technology (HIT) event will feature nationally recognized and regional speakers to address some of the most relevant and compelling topics of our time: innovation and leadership, analytics, health information exchanges, clinical engagement / patient engagement / mobile health and industry trends.

In addition to healthcare industry leaders, students and practioners will benefit from an amazing lineup of speakers, including local and national leaders in health information technology.  You will have an opportunity to discuss issues with colleagues from across the Midwest, to network, enjoy authentic Michigan landmarks, museums, nature, parks, nightlife and for your students to learn from industry veterans:

The Education tracks for the 2015 MFTC include:

Track A:  Strategy and Leadership

Track B:  Emerging Technology & Cybersecurity

Track C:  Public Policy (State and Federal)

Track D:  Innovation and Emerging Trends

Track E:  Clinical Informatics, Business Analytics & Research

For more Information please visit:

For registration please visit:

Our organization, RISC Management and Consulting, LLC is involved from a purely volunteer standpoint to assist in reaching Clinicians, Medical, Nursing professionals, educators, and students regarding this unique, local, and exceptional opportunity to learn and share.

Contact us to see how easy DLP can beRISC Data Loss Prevention Solution

800.648.4358 or

Cyber Security, Data Breach, Tip of the Week, Upcoming Events

Cybersecurity and Identity Theft

According to, cybersecurity is a shared responsibility. “Cybersecurity refers to ways to prevent, detect, and respond to attacks or unauthorized access against a computer system and its information.” To address the problem, the Department of Homeland Security (DHS) is collaborating with public and private partners to promote cybersecurity awareness for all internet users. It is amazing when you hear about DHS collaborating with the Secret Service and the Electronic Crimes Task Forces (ECTFs). It seems surreal and more likely to occur in the movies, but it is happening right now to regular people in their daily lives. We as a society are interconnected and willing to take the risks with technology. We enjoy the accessibility of mobile devices, checking emails, texting, sending photographs, and much more. There are many people who believes that he or she are experts in technology or savvy users. They bend the rules, use their own personal device to do work at the airport, coffee shop, and hotels. This type of person is not always concerned with using unsecured WiFi. This same person might even click on links in any email and might provide their username or password without a second thought.

It is very important to be aware and educated and know when it is necessary to use a VPN for a secure remote access to email and file servers. The word encryption always creeps up. So here are some important terminology and videos to increase awareness.

What is Identity Theft graphic     Tips graphic     What is cybercrime graphic

What is Identity Theft?

There are three types:

  • Medical Identity Theft
  • Tax-Related Identity Theft
  • Child Identity Theft

Medical Identity Theft

According to the FTC a criminal may use your name and health insurance policy number or group plan number to gain access to prescription medications and file claims with your insurance provider. In worst case scenario, the thief might even see a physician and receive care under your name. Your own health information will be mixed up with the thief with negative repercussion. You might receive the wrong medication, diagnosis, etc.

Some other signs might be a bill received for medical services not received, a call from a debt collector on your credit report that you do not recognize, a notice from the health plan stating you reached your benefit limit, a denial of insurance because your medical records show a condition you don’t have. The most important step is to prevent this situation from occurring. Protect your information by not sharing medical or insurance information by phone or email unless you initiated the call and the phone number is known to you. Keep your information in a secured and safe place. If the information is no longer needed, shredding the documents is a must! It is important to read the privacy policy of your physician’s office or their website prior to providing sensitive information online. Ask why the information is needed, how it will be kept safe and will it be shared with others. Always view the URLs prior to trusting the site and make sure they have https where “s” means secure. There are others with extended verification certificates such as PayPal.

https extended verification certificate

There are yellow locks that would show up when the connection is encrypted with modern cryptography but the page includes other resources which are not secure. The information can be viewed by others in transit or can be modified by an attacker to change the look of the page, etc.

https Yellow lock

Occasionally, I would go to my personal email account and would receive a red https with a red line through it. This typically means there might be something wrong.  If this happens, don’t trust the link and close it. Start with a new tab and type the website you want.

https red lock

But if you already suspect identity theft, then correcting mistakes in your medical record is the first solution. For more information follow this link:

Tax Related Identity Theft

In this scenario, the criminal can use your Social Security Number (SSN) to obtain your tax refund or obtain a job. It is very important to contact the IRS if you received notice that you made money from an employer you don’t know or when you notice that there are more than one tax return filed with your SSN. The first step is to review your tax return. It is important to know that the IRS does not contact taxpayer through email, text or social media message that asks for sensitive information. If you receive this type of email, do not reply or click on any links. The thief is using an activity called phishing by posing as a legitimate company to steal your online account or financial information. The next step to take is to forward the email to

Here is a good example from Microsoft on online privacy/phishing.

Phishing email message look like

What is cybercrime? Cybercrime is the “illegal activities undertaken by criminals for financial gain” (Detica, 2011, p.1). If you think you have been a victim of cybercrime and your identity is stolen or you have responded to a scam, immediately change the passwords and PINs on all your accounts, and report the incident to your Credit Card Company, bank, or health insurer. You should also report the Identity theft to the U.S. Federal Trade Commission (FTC) at Scams or fraud should be reported to the FTC at

View this short video if you think you’ve been a victim of identity theft:

“One out of every two adults working online has experienced a problem with cybercrime in the last year” according to David Finn (2015), Associate General Counsel & Executive Director, for Microsoft Cybercrime Center.

In the report written by Detica Limited, four areas of focus was mentioned:

  1. Costs in anticipation of cybercrime and the need for security measures (antivirus solutions, costs of insurance and IT)
  2. Costs as a consequence from monetary losses, and gaps in business continuity
  3. Costs in response to cybercrime such as fines and compensation to the identity theft victims
  4. Indirect costs such as organization’s loss of reputation or loss of revenue from reputational damages

The most important part of the report was the estimated annual cost from cybercrime to be £27bn per annum in the UK or about 43 billion U.S. dollars.

Here’s a short video with many tips on safe practices:

Child Identity Theft

Children’s SSN’s can be used by thieves to apply for government benefits, open a bank account, credit card account, apply for a loan, obtain utility service, or rent an apartment. It is very important to ask your child’s school why a sensitive information is required and how is it being stored, used, or thrown out. It is important as parents that you protect your child’s information and decrease the possibility of identity theft.

For more information please view this short video from the FTC:

Come visit with RISC and Virtual Auditor at HIMSS15 in Chicago. Hope to see you there!


RISC and VA in HIMSS15


Detica Limited. (2011). The cost of cybercrime: A Detica Report in partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Retrieved from

Finn, D. (2015, January 28). Enterprise Perspectives: Microsoft Cybercrime Center. Retrieved from

Health (2015, January 12). Privacy and security. Retrieved from

Homeland Security.(2015, January 7). Cybersecurity. Retrieved from

Microsoft. (2014). Safety and Security Center. Retrieved from