2 min read

[Recap] The Buzz from Zimmet Healthcare's Annual Conference

By Prime Care Tech Marketing on Wed, Aug 31, 2022 @ 09:51 AM

The reimbursement focus from Zimmet Healthcare's annual conference shared the spotlight with a topic still fresh of mind for many skilled nursing operators – staffing shortages. However, session speaker Tara Gregorio, President of the Massachusetts Senior Care Association, advised staying away from staffing agencies – not only to reduce cost, but ensure a continuum of care for residents.

Attendees also discussed CMS's review of minimal staffing and how it might impact federal funding. This topic is better explained in the Infection Control Today article, CMS Proposed Minimum Staffing Requirements Could Cost $10B Annually.

As keenly noted in the Skilled Nursing News article, The Devil's in the Data: Why SNFs May Be Facing an Information Crisis, Marc Zimmet, President of Zimmet Healthcare Services Group, points out how randomly timed and siloed data results in inaccurate data. Said Zimmet, "The bottom line is everything you think you know about skilled nursing facility data is wrong, is inaccurate — and that’s the greatest danger facing skilled nursing."

Here's how we can help:

  • Our primeVIEW KPI dashboard solves this issue of disparate and dated information by integrating data from your multiple systems into a consolidated real-time view. 
  • Our primeCLAIMS revenue cycle management app is the only one built for and supported by post-acute billers. 

Take a step in the right direction and get in touch for a demo of primeVIEW!

Let's Talk

Topics: CMS compliance post-acute technology solutions staffing zimmetwood staffing shortage zimmet healthcare
2 min read

[Recap] Operational Innovation Takes Center Stage at HealthTAC Spring 2022

By Prime Care Tech Marketing on Tue, Aug 30, 2022 @ 01:34 PM

East Sales Director, Joe Brown, sat on the "Problem Solving Innovations, Enhancing the Senior Living Industry" panel at HealthTAC West 2022. Central Sales Director, Scott Kozimor, also attended, as senior living operators talked candidly about the industry's current state.

Here's some advice from senior living operators on the topic of operational innovation:

  • Continuously monitor your empirical data to support needed change.
  • Consider 'firing yourself' and hiring a tech leader or partner.
  • Innovate in a moving-forward, clearly defined way – no more 'throwing spaghetti on the wall to see what sticks.'
  • Champion and participate in whatever innovation you choose to assure success.

Also discussed was how to make new operational innovation successful:

  • Build upon a strong technology foundation (i.e., best fiber, network, etc.)
  • Make sure it fits within your culture; engage key players to weigh in (i.e., Can we bring it together? Can we sustain it?)
  • Train your teams and staff well; measure profitability. 
  • Don't get passed by in the market because you overthink it.

A key concern brought up as an obstacle to innovation success was staff burnout. But senior living leaders responded positively, suggesting ways to re-energize and realign staffing:

  • Don't be afraid to try new ideas.
  • Consider replacing agency roles with inside staff.
  • Monitor and stabilize staffing trends (days, hours, etc.) to keep staff coming back.
  • Deploy applicant tracking technology.
  • Preserve internal knowledgebase – allow staff to go part-time or project-based.
  • Engage and involve Millennial staff.

As always, our participation in this networking event gave us perspective on how we can help this industry innovate for success. Did you know we offered: 

  • primeCLOUD – secure hosting, plus a line into best-of-breed technologies at partner-negotiated pricing.
  • primeVIEW – dashboard app for easily tracking staffing trends, plus other key operational trends (e.g., census, admissions/discharges, billing/receiving, etc).

Get in touch if we can become a partner in your path to operational innovation.

Let's Talk

Topics: operations dashboard senior living operations technology partner healthtac innovation
4 min read

[Security Tip] July Security Threats Summarized

By Prime Care Tech Security Team on Thu, Aug 04, 2022 @ 12:23 PM

Each week our security team tracks threats, vulnerabilities, and patches announced by leading IT experts and vendors to ensure we prioritize, address, and communicate them to our managed IT services clients.

Below you'll find our monthly recap of all events. To check previous reports, see 2022 Security Threats.

If you're not a client, make sure your team knows about these security events, as well as future ones. Just click below to sign up. 

KEEP ME UPDATED

 

High Impact

Company/Source Product Type
Google Chrome Security updates

 

Medium Impact

Company/Source Product Type
Microsoft Multiple Security updates
(July  2022)

 

Low Impact

Company/Source Product Type
Apple Multiple Security updates

 

No Impact on Our Clients/FYI

Company/Source Product Type
Cisco Multiple Security updates
Citrix Hypervisor Security updates
Open SSL Multiple Security updates
Oracle Multiple Security updates

 

As part of our primeCLOUD services suite, we partner with leading IT vendors to offer security services like ransomware protection, phishing training, multi-factor authorization (MFA), data backup/recovery, and more.

If you're not confident your organization is on top of security threats, vulnerabilities, and patches, it may be time to conduct a cyber security audit.

Conduct Self-Audit Now

Or better, get in touch and let us walk you through critical items for your security checklist.

Topics: primeCLOUD cyber security security vulnerabilities cyber criminals security patches security threats
5 min read

[Security Tip] June Security Threats Summarized

By Prime Care Tech Security Team on Tue, Jul 05, 2022 @ 04:20 PM

Each week our security team tracks threats, vulnerabilities, and patches announced by leading IT experts and vendors to ensure we prioritize, address, and communicate them to our managed IT services clients.

Below you'll find our monthly recap of all events. To check previous reports, see 2022 Security Threats.

If you're not a client, make sure your team knows about these security events, as well as future ones. Just click below to sign up. 

KEEP ME UPDATED

 

High Impact

Company/Source Product Type
Microsoft Multiple Workaround guidance for MSDT Follina vulnerability

 

Medium Impact

Company/Source Product Type
CISA Multiple Recommended mitigations for Karakurt Data Extortion Group
Citrix Application Delivery Management Security update
Google Chrome Security updates
(June 10 and 22)
Microsoft Multiple Security updates
(June  2022)

 

Low Impact

Company/Source Product Type
Mozilla Firefox, Firefox ESR, Thunderbird Security updates

 

No Impact on Our Clients/FYI

Company/Source Product Type
Adobe Multiple Security updates
Atlassian Confluence Server and Data Center Security updates (CVE-2022-26134)
CISA Multiple Security updates
Cisco Multiple Security updates
Drupal Multiple Security updates
SAP Multiple Security updates

 

As part of our primeCLOUD services suite, we partner with leading IT vendors to offer security services like ransomware protection, phishing training, multi-factor authorization (MFA), data backup/recovery, and more.

If you're not confident your organization is on top of security threats, vulnerabilities, and patches, it may be time to conduct a cyber security audit.

Conduct Self-Audit Now

Or better, get in touch and let us walk you through critical items for your security checklist.

Topics: primeCLOUD cyber security security vulnerabilities cyber criminals security patches security threats
2 min read

[Security Tip] Anti-Virus Is Simply Not Enough

By Prime Care Tech Office of Security and Compliance on Mon, Jun 20, 2022 @ 11:29 AM

It’s safe to say traditional antivirus software simply isn’t enough to protect against cyber-attacks anymore. The current threat landscape and cyber insurance carriers demand a proactive approach to security. It’s time to update your antivirus solutions – and immediately.

One updated defense solution is endpoint detection and response (EDR).  EDR complements and enhances current anti-virus and firewall security protocols to help thwart attacks and optimize threat hunting operations. It is not a replacement for these security platforms but another essential tool in the security stack. But what exactly is EDR?

How Does EDR Protect Your Organization

As threat actors are getting more sophisticated, you need to as well. Traditional anti-virus and anti-malware software are no longer considered sufficient to thwart cyberattacks; it’s too easily bypassed. One of the next-generation tools in protecting devices is EDR, which goes well beyond standard anti-virus/anti-malware.

EDR is an integrated endpoint (i.e., desktops/laptops) security protocol that combines endpoint data collection and continuous real-time monitoring with rules-based automated response and behavioral analysis capabilities. In other words, this is a security system that proactively detects and investigates suspicious activity on hosts (i.e., servers) and endpoints.

The primary objectives of EDR security systems are as follows:

  • Automatically identify and respond to known threats, remove or contain them, and alert the security team
  • Continuously analyze data to identify threat patterns or suspicious behavior quickly
  • Monitor and collect activity data from various endpoints and look out for potential threats

Wrapping Up

We’re all acutely aware of the risks from various cyber threat actors around the world. It is our job and yours to do everything in our collective power to keep our networks and data safe. One small misstep by you or an employee (i.e., clicking on a link or opening an attachment in a phishing email), can lead to catastrophic results.

This is why many of you carry cyber insurance, and rightly so. The cyber insurance carriers are there to help “put you back together” in the event of a ransomware attack. As the success of ransomware attacks and cyber insurance carrier payouts increase, the cyber insurance carriers react by requiring you to implement more stringent information technology defenses, such as EDR. Consequently, deploying EDR has become table stakes in addressing cyber threats.

Prime Care's partnership with McAfee can help. 

Conduct Self-Audit Now

Topics: cyber security malware cyber attack antivirus Endpoint Detection and Response edr

Featured

Posts by Tag

See all