Blog

Konica Minolta Blog

Konica Minolta's blog provides valuable insights from executives and key contributors focusing on IT and cloud services, information management, and enterprise content solutions for your industry and practice. Our unique mix of innovation and expertise provides our readers with technology solutions to help their business run more efficiently. Check back often for updates on timely industry news commentary or subscribe to our RSS feed.  

  • Insights
  • Recent Posts
  • Popular Posts
  • Popular Tags

  • Is HIPAA in Your Enterprise DNA?

    , Chief Executive, ecfirst

    Ali blogUnderstanding your DNA enables you to take proactive measures in defense of your health and well-being.  Similarly, an organization must carefully examine its enterprise to ensure that it is protected from the multitude of threats posed by cyber criminals, employee/staff incompetence and/or malicious intent.  In this article, we focus on two key challenges for organizations. First, what does HIPAA compliance mean? What must it address? And second, how can an entity address HIPAA compliance and the risk associated with cyber-attacks on a continual basis? We identify options for security frameworks to address this second question.

    HIPAA violations and fines are mounting like never before, as evidenced by the following examples:

    (more…)

    From the Experts

    , , , , , , ,

    Diagnosing the 2016 Healthcare Landscape

    , National Healthcare Market Manager, Solutions

    Healthcare Blog-Cisna

    Healthcare is one of the most dynamic and rapidly evolving industries in the United States. The adoption of technology is growing exponentially and the investment in healthcare IT is outpacing nearly every other vertical market. 2016 promises to continue this trend, with security, interoperability and reimbursement leading the way as key healthcare challenges. Cloud, mobile, data analytics and HIPAA compliance will significantly impact purchase decisions as healthcare providers attempt to improve population health, enhance the individual experience of care and reduce the per capita cost of care (otherwise known as the Triple Aim of Care).  (more…)

    Cloud, Content Management, From Our Experts, Solutions, Technology

    , , , ,

    Our Prescription for Security and HIPAA Compliance

    , National Healthcare Market Manager, Solutions

    HIPAA Blog Image

    Identity theft has become epidemic in the United States — and across the world for that matter. It seems as if we hear about major breaches of personal data on a weekly basis, and now healthcare data breaches are becoming more and more prevalent. Nearly 42 million people have had their protected health information (PHI) breached since 2009.

    Over the past couple of years, a number of organizations, including Anthem Blue Cross/Blue Shield, Community Health Systems (CHS) and Xerox Healthcare, have experienced massive PHI breaches. The Anthem breach affected nearly 80 million records. A breach at the Texas Health and Human Services Commission put the state out of HIPAA compliance. And finally, CHS had 4.5 million patient records stolen by cyber criminals.

    (more…)

    From Our Experts, Security, Solutions

    , , , , , , , , , ,

    Just over one year ago, I was handed a key to an office shell in Silicon Valley and asked to build the US Business Innovation Center. As I was standing in the empty room, I knew I was at the beginning of what would grow to be a driving force of new business lines and opportunities for Konica Minolta. I also knew that these business lines would not be an extension of our legacy products, but solutions born from the needs of our customers, both existing and new.

    (more…)

    Leadership, Strategy, Technology, Thought Leaders

    , , , , , , , , ,

    Protect Your Print – Secure Printing

    , Director, Business Development

    In August 2013, it was determined that Affinity Health Plan — a New York-based managed care plan — owed the U.S. Department of Health and Human Services Office for Civil Rights $1.2 million for violating HIPAA as part of a patient data breach case, reported Healthcare IT News.

    “An HHS Office for Civil Rights investigation indicated that Affinity impermissibly disclosed the protected health information of these affected individuals when it returned multiple photocopiers to leasing agents without erasing the data contained on the copier hard drives.”

    HIPAA regulations are not to be taken lightly.  It can cost businesses millions of dollars if the proper precautions are not taken when it comes to information sharing and organizational workflow.

    There are those working outside the healthcare industry that need to equally protect sensitive patient information.  Take, for instance, Summit Educational Resources, a private organization in New York that provides education and therapeutic services to those with developmental disabilities. (more…)

    From Our Experts, Security, Solutions

    , ,

    Hot Topics at HIMSS ‘14

    , National Healthcare Market Manager, Solutions

    At the HIMSS Annual Conference in Orlando I spoke with many customers – physicians, hospital administrators, ancillary care providers, and IT professionals.   Konica Minolta has always provided printing solutions to the healthcare industry, and while many HIMSS attendees know about us for reliable office and production print equipment, this was an opportunity for them to see our expanded EnvisionIT Healthcare portfolio.

    Since HIPAA went into effect, we have grown our healthcare offering to include industry specific software, IT services and professional services.  Today, we offer customers a complete solution of hardware, software and services that address the specific challenges in the healthcare industry such as security, document and records management, efficiency and regulatory compliance. (more…)

    From Our Experts, Security, Solutions, Technology

    , , , , , ,

    Top Solutions for Capturing Patient Information

    , National Healthcare Market Manager, Solutions

    Imagine a family practice office on a Monday morning with every seat in the waiting room full, and three people waiting at the check-in window.  Contrast that to an Emergency Room at a community hospital on a Friday night with 40-50 patients waiting to be admitted.  Each scenario is very different, but they have a few things in common – busy staff, anxious patients, and a challenging document workflow.  Add to that the necessity to correctly and quickly capture patient information and clinical notes in order to satisfy billing requirements and regulatory compliance while maintaining the privacy and security of the patient.

    These are typical situations in today’s healthcare environment and are complicated by the fact that electronic health records (EHR) are changing the way clinicians do business.  Perhaps the biggest challenge for a healthcare provider is how to capture all of the paper documents associated with a patient visit or encounter. (more…)

    From Our Experts, Security, Solutions

    , , , , , ,

    Making Security a Non-Issue

    , Product Marketing Manager

    Protecting sensitive electronic information is of greater concern than ever before.  For those in industries such as legal or healthcare, the need to protect information from unauthorized access is even more critical given the demands of both governmental and organizational security regulations.   And while most of us are aware of the need to protect our intranets, electronic file databases, email systems, etc., not all of us are aware of the need to also protect our peripheral devices from potential security risks.

    At the simplest level, many organizations have shared printers that allow employees to print from their desk and retrieve their printed materials from the device.  This often entails weeding through a pile of print outs and allowing others to view – or even take – sensitive information.  In addition, media continue to cast light on the subject of whether peripheral devices save printed/scanned/copied materials on a hard drive that can later be accessed.

    So how can you make certain your valuable data is safe from these threats? (more…)

    Customer Experience, From Our Experts, Security, Technology

    , , , , , , , ,