Best Practice software is the clear leader in GP systems in Australia. Health IT looks after many surgeries running BP either traditionally on their premises or in our private cloud.Unfortunately legacy vendors have not made it easy to convert data from other systems and this is where we can help. Our…
Search Results for:
Email Security91% of cyber security attacks begin with emailBetter cyber security has resulted in less traditional hacking using exploits or insecure remote access, and an increase in cyber threats delivered through the channels still available to the bad guys – this is predominately email followed by SMS phone based scams.…
How secure is your password? Test your password strength against best practices and see if it’s been published on the dark web Enter a password to check: Passwords are not saved or transmitted anywhere, this assessment is done inside your web browser Enter a password to test Enter a password…
New Year, New Threats For more tips and how-to’s, visit our tech blog Every Financial Year, the Australian Cyber Security Centre posts their Cyber Threat report and everyone working in IT nervously bites their nails. For the past few years, the ACSC report has charted a consistent 13% increase in…
2022 – That’s a wrap from us at Health IT For more tips and how-to’s, visit our tech blog What a year it was! Not only did you have to endure your third year of Covid seriously impacting everything, but the introduction of Medicare Web Services and the continued roll…
What Does “Good” Look Like For a Healthcare Business? For more tips and how-to’s, visit our tech blog Phones Your phones are the primary method for your patients to contact you – as such, they must be reliable, flexible, and easy to use. They should also be able to be accessed…
7 Ways to keep your family safe online For more tips and how-to’s, visit our tech blog It’s never too early (or late) to learn about keeping your loved ones safe online. Good online habits such as critical thinking, responsible behaviour, and honest communication can help avoid tough situations. Anyone…
Version 1.0Last updated 13/10/2022 Health IT Responsible Disclosure Policy How we handle security vulnerabilities As an IT provider working in the Healthcare sector, we recognise how important it is to help protect patient security and privacy. We understand that security is integral to the delivery of patient care, and we…
Integrated ECG in BP and MD Risks Data Loss For more tips and how-to’s, visit our tech blog We strive for efficiency in everything we do. Time is valuable and time saved is worth its weight in gold. Those moments when you need to quickly get an Electrocardiogram (ECG) started…
Security Update September 2022 For more tips and how-to’s, visit our tech blog Optus Breach You may have seen in the news that Optus were the victims of a serious data breach over the last few days. This continues a trend of personal information being stolen and we expect to see…