DULUTH, GEORGIA (PRWEB) APRIL 14, 2022 – Today, Prime Care Technologies, a leading data warehouse, application provider, and IT services company in senior care, announced its partnership with Connected Living, the leading provider of enterprise content management, communication, and engagement technology for senior living communities. This relationship helps Connected Living meet increasing demand to deploy its resident engagement solutions while providing its current senior living clients with an easy-to-access helpdesk, powered by Prime Care Technologies.
Connected Living’s technology ecosystem includes a centralized content management system that allows for seamless broadcasting of community content directly to mobile apps, premium digital signage, calendars/newsletters, in-room TV, and a proprietary Alexa skill for voice technology. Prime Care Technologies will provide IT services to Connected Living’s senior living clients, including connectivity and helpdesk services.
Said Connected Living COO Gineane Haberlin, “In today's fast-paced world, support for technology products and services is essential to drive positive outcomes. Our combined service delivery with Prime Care Technologies allows us to continue to provide unique digital experiences that are backed up by unparalleled support.” She continued, “We are pleased to add Prime Care Technologies’ expertise and helpdesk support to the equation and have their help supporting the many senior living communities we serve.”
For nearly two decades, Prime Care Technologies has equipped senior care organizations, as well as businesses outside of this industry with end-to-end IT services. With more than 200 vendor partnerships, being able to bridge gaps between vendors and senior care continues to meet the demand for efficiency-driving technology.
Said Carl Mickiewicz, Prime Care Technologies CEO, “We are excited to support Connected Living in their mission to strengthen personal connections in senior communities.” He continued, “Prime Care Technologies is providing Connected Living with a reliable, scalable deployment and support model, allowing them to focus on developing great software and end-user content. We look forward to helping the communities they serve enhance technology and increase communication in meaningful ways.”
About Prime Care Technologies
For nearly two decades, innovative senior care operators have relied on Prime Care Technologies for the integrated data and technologies they need to make real-time, performance-impacting decisions, within facilities and across communities. An Atlanta-based company, more than 7,500 facilities leverage our technologies. The interoperability we drive across 70+ apps and 3,500+ payers within the senior care market makes Prime Care Technologies the industry-leading data warehouse. The same highly secure IT services we offer clients to support and integrate their most valuable healthcare data are available to all markets as part of our primeCLOUD managed IT services suite.
About Connected Living
Founded in 2007, Connected Living delivers a comprehensive product ecosystem designed specifically for the senior living and healthcare industries. Through a single centralized content management system (eCMS), the Connected Living platform allows communities to simplify staff workflow and enhance resident engagement. Connected Living’s innovative suite of technology solutions allows for swift communications to everyone in the senior living operation. Connected Living operates in more than 700 communities across the country.
2 min read
[PR] Prime Care Partners with Connected Living on Resident Engagement
By Prime Care Tech Marketing on Thu, Apr 14, 2022 @ 10:43 AM
Topics: partnership press release primeCLOUD resident engagement helpdesk services connectedliving
2 min read
[Recap] What We Heard at HealthTAC East 2022
By Prime Care Tech Marketing on Thu, Apr 07, 2022 @ 02:07 PM
Last week our team connected with leaders from aging services communities at HealthTAC East. The two-day idea exchange, which included thought-provoking speakers and provider-vendor meetings, produced discussion around these key themes:
- Innovation and technology
- Staff shortages and retention
- Resident wellness and engagement for growth, satisfaction, and occupancy
- Marketing strategies to attract more residents
If you missed it, catch up with us for recommended strategies and how our technologies can help.
Innovation and technology
As a leading data warehouse, application provider, and IT services company in senior care, we are here to support you in the efficiencies to be gained with technology. Relying on nearly two decades of experience and feedback from innovative senior care operators who rely on us, we have the solutions and partnerships to provide you with end-to-end technology.
Staff shortages and retention
When staff is short, you need instant access to your current staffing and census data to manage the financial impact, as well as how it might impact your Five Star rating. Our primeVIEW KPI analytics dashboard serves up the data you care about, simplified.
Resident wellness and engagement
According to the IN2L annual report, "86% of senior living leaders using engagement technology said that it was either “very” or “extremely” important, a 10% increase year over year. And 65% of respondents said that engagement technology delivers a clear return on investment."
We agree, which is why we are bridging gaps in bandwidth and helpdesk availability for communities that wisely invest in engagement solutions. Ask us about our primeCLOUD IT services suite. Why? Because IT just works!
Attracting more residents
Once again, our primeVIEW analytics app is the hero you need. With real-time visibility into comings/goings – as well as the 'whys,' you can think strategically about when and how best to fill vacancies. We also have CRM integration on our radar, with Enquire Solutions slated as our first partner to come on board.
The Short of It
We attend the industry's top events to track the trends and topics most important to operating an aging services organization. What we learn is incorporated into the continuous enhancements we make to the applications and technologies. We heard the demands loud and clear at HealthTAC East and we confirmed our solutions are on target to serve your needs.
Topics: primeVIEW primeCLOUD marketing healthtac resident engagement staff retention labor shortages technology
5 min read
[Security Tip] March Security Threats Summarized
By Prime Care Tech Security Team on Thu, Mar 31, 2022 @ 04:36 PM
Each week our security team tracks threats, vulnerabilities, and patches announced by leading IT experts and vendors to ensure we prioritize, address, and communicate them to our managed IT services clients.
Below you'll find our monthly recap of all events. If you're not a client, make sure your team knows about these security events, as well as future ones. Just click below to sign up.
High Impact
Nothing new in the high category was reported in March. To check previous reports, see 2022 Security Threats.
Medium Impact
| Company/Source | Product | Type |
| Microsoft | Multiple | Security updates (March 2022) |
| VMware | Multiple (ESXi) | Security updates |
Low Impact
| Company/Source | Product | Type |
| Apple | Multiple | Security updates |
| Chrome | Security updates | |
| Mozilla | Multiple | Security updates |
| Mozilla | Firefox, Firefox ESR | Security updates |
| OpenSSL | Multiple | Security updates |
No Impact to Our Clients/FYI
| Company/Source | Product | Type |
| Cisco | Multiple | Security updates |
| CRI-O | Multiple | Security updates for Kubernetes |
| FBI | Multiple | Compromise indicators for RagnarLocker ransomware |
| Linux | Multiple | Dirty Pipe privilege escalation vulnerability |
| Mozilla | VPN | Security update |
| NSA | Network infrastructure | Security guidance |
| SAP | Multiple | Security updates (March 2022) |
| VMware | Multiple | Security updates |
As part of our primeCLOUD services suite, we partner with leading IT vendors to offer security services like ransomware protection, phishing training, multi-factor authorization (MFA), data backup/recovery, and more.
If you're not confident your organization is on top of security threats, vulnerabilities, and patches, it may be time to conduct a cyber security audit.
Or better, get in touch and let us walk you through critical items for your security checklist.
Topics: primeCLOUD cyber security security vulnerabilities cyber criminals security patches security threats
4 min read
[Security Tip] February Security Threats Summarized
By Prime Care Tech Security Team on Fri, Mar 04, 2022 @ 09:16 AM
Each week our security team tracks threats, vulnerabilities, and patches announced by leading IT experts and vendors to ensure we prioritize, address, and communicate them to our managed IT services clients.
Below you'll find our monthly recap of all events. If you're not a client, make sure your team knows about these security events, as well as future ones. Just click below to sign up.
High Impact
Nothing new in the high category was reported in February. If you missed last month's report, see the January Security Threats Summary.
Medium Impact
| Company/Source | Product | Type |
| Microsoft | Multiple | CVE-2022-21882 Win 32k Privilege Escalation Vulnerability |
| VMware | Multiple | Security update 3091 |
| VMware | Multiple | Security update 3104 |
Low Impact
| Company/Source | Product | Type |
| Zabbix | Multiple | Front-end authentication bypass and improper access control vulnerabilities |
No Impact to Our Clients/FYI
| Company/Source | Product | Type |
| CISA | Multiple | Industrial control system advisories (Release 18) |
| CISA | Multiple | 15 known exploited vulnerabilities added to the catalog |
| Drupal | Multiple | Security updates |
| FBI/USSS | U.S. Critical Infrastructure | Security advisory -BlackByte Ransomware |
| Mitsubishi | Mitsubishi Electric Factory Automation Engineering Products | Update F |
As part of our primeCLOUD services suite, we partner with leading IT vendors to offer security services like ransomware protection, phishing training, multi-factor authorization (MFA), data backup/recovery, and more.
If you're not confident your organization is on top of security threats, vulnerabilities, and patches, it may be time to conduct a cyber security audit.
Or better, get in touch and let us walk you through critical items for your security checklist.
Topics: primeCLOUD cyber security security vulnerabilities cyber criminals security patches security threats
2 min read
[Security Tip] Maintain a Strong Security Posture with MFA
By Prime Care Tech Security Team on Tue, Feb 08, 2022 @ 09:52 AM
Introduction
Maintaining a strong security posture means being vigilant and aware of threats and vulnerabilities across the vast Information Technology spectrum. An important security layer to consider is called multi-factor authentication (MFA), also known as two-factor authentication (2FA).
More insurance carriers now require the implementation of MFA before issuing a cyber insurance policy. Depending on the carrier, they may require MFA for just Microsoft 365 Cloud Mail or Exchange OWA mail, or they may extend it to everyone’s login – as well as their devices.
So, what is MFA?
MFA protects us from hackers by ensuring that digital users are who they say they are. When MFA is enabled, a user must provide two or more pieces of evidence (or factors) to verify their identity and gain access to an app or digital resource.
There are three main types of MFA authentication methods:
- Things only you know (knowledge), such as a password or PIN;
- Things only you have (possession), such as a badge, fob, or smartphone; or
- Things only you are (inherence), such as a biometric like fingerprints, retina scan, or voice recognition.
Why is MFA important?
MFA makes stealing your information much harder for the average criminal. The less enticing or harder to access your data it is, the more likely threat actors will choose someone else to target.
As the name implies, MFA blends at least two separate factors to verify it's actually you requesting access to your data. So even if a hacker has your user ID and password, MFA will require the entry of one more piece of information before granting access. It is a simple but powerful method to add a layer of extra protection so only authorized users access your data.
How do I obtain MFA?
Various vendors offer MFA. A very common and effective MFA is to use an app loaded on your mobile phone or a key fob. Both receive a random number generated at regular intervals, usually 60 seconds, from the MFA vendor’s random number generator.
When entering your user ID and password to access an application or other digital resource, the last step is to enter the number displayed on the MFA app or key fob. Once you enter the correct number, the authentication process is complete and you have access.
Wrapping Up
One could look at MFA as peace of mind since it makes hacking into user accounts much more arduous. We partner with best-of-kind MFA vendors if you need our help to get started.





