Blog

Scalability Of The Modern Cloud Infrastructure Helps Reduce Operating Cost

As we stated in our previous blog, this week we are covering off the scalability of cloud platforms and the advantages this offers. When designing solutions for clients we are required to take into consideration the possible growth of the business over the next three to five years and size the solution accordingly. This translates to the solution being designed and built for the estimated... more...

Do you need a server for your PMS system?

There is great excitement within the medical community as many practices prepare to make one of the most significant changes to their I.T. infrastructure in recent years: moving to new cloud-based practice management systems. Naturally, along with this excitement, there are a few questions that... more...

Prevent Data Breach with Security Awareness Training for Staff

Prevent Data Breach with Security Awareness Training for Staff

IT security staff are responsible for ensuring the business is protected when it comes to data breaches, cyber-attacks and unprotected company information. Often when a data breach occurs, companies instantly think it’s due to a security network system failing. However, the increase of... more...

5 Ways To Build Customer Trust in 2020

5 Ways To Build Customer Trust in 2020

Trust is key when it comes to customers converting and purchasing your products or services from you. They need to trust what you say is reflected in your actions and know they will be supported or receive the product promised. The challenge is, trust cannot be established right away and... more...

Where Should I Backup and Store My Business Data?

Apart from people, your most important business asset is information, or “data”. There has been widely circulated statistics issued by the U.S. Federal Emergency Management Agency that in the event of a disaster 40% of businesses never reopen and a further 25% fail after a year.... more...

What Is a Medical Privacy Breach?

What is a privacy breach and what do I need to do when a breach has been identified? A breach is a loss of, unauthorised access to, or disclosure of, personal information.   For example, the reception area is an open space setting, that tend to be the hub of activity in... more...

5 Ways To Prevent Data Breach In Your Organisation

Data breach has grown exponentially across a number of organisations. However, small businesses still fail to make it a priority, even though data breach can cost the business an extensive amount of money, and tarnish the reputation of the company. What can cause data breach? Many business... more...

How To Manage Your Customer Complaints (Part 2)

In Part 1 of our discussion on Customer complaints, we discussed topics such as where different sources of complaints originate from. Here on Part 2, we will discuss how to respond to a complaint. How do you respond to a complaint? and who responds to a... more...

How To Manage Your Customer Complaints (Part 1)

What is a complaint? By definition: A statement that something is unsatisfactory or unacceptable. Complaints are an opportunity to improve services and relationships between patients and their care team... more...

Why do small businesses need Proactive Monitoring in 2019? 

A reactive IT service, where a business calls their IT company if there is a problem, has some disadvantages: (1) The problem may already have been active for a while before you noticed the problem. This may make it more costly to correct (2) If a... more...

Medical Privacy In New Zealand (2019)

Privacy Training Q. Where can I get training on privacy for Medical Receptionists? A. Training options include online training as well as onsite training for groups. Online... more...

12 Principles of the Privacy Act in New Zealand (2019)

PRIVACY ACT (1993) Q.  What is the Privacy Act and what does it do?  A. The Privacy Act provides rules for the collection, use and disclosure of personal... more...

Workplace Privacy Policy While Hiring Medical Staff

Continuous advancements in technology together with the reach of social media mean you need to take a proactive approach in thinking how... more...

Best Practices To Follow While Storing Medical Records

Gone are the days where your doctor would sit opposite you and have your paper file out ready to make handwritten notes. Remember the rotoscans that took up valuable floor and storage... more...

Privacy Training for Medical Receptionists in NZ

Your Medical Receptionists are your key frontline personnel. Ongoing and regular discussions around patient privacy, as well as reception privacy with your... more...

Flexibility Of A Cloud Hosted Medical Practice

As we stated in our previous blog, this week we are covering off anywhere, anytime, any device advantages that public cloud provide your business. This week we’ll explore the... more...

Should I Host My Practice Management System (PMS) In The Cloud?

Continuing from the previous blog, we want to expand on what true cloud infrastructure provides above and beyond running internal systems. This is the second blog in a five-part series about the... more...

4 reasons why HP Elitebooks offer extraordinary resistance to hackers

Security is a top-line issue for any IT manager. For businesses in sectors such as government, health, law and finance, system breaches are an existential threat that can not only destroy... more...

How the Millennial Effect is changing workplaces for the better

Millennials may be the most misunderstood generation. Initially written off as undisciplined and hard-to-manage, they have emerged as independent, ethically minded workers and consumers as they... more...

The Real Benefits Of Taking Your PMS To the Cloud

At the heart of each medical institution is its Practice Management System (PMS). It connects users with financial transactions, appointments, and clinical data – the lifeblood of every... more...

What is Cloud computing and what are the benefits for your business?
When should your business migrate to a Managed Print Service (MPS) provider?
What are macros and how are they being used to hack into your system
New Microsoft Teams features will help you communicate better at work
Vodafone Email Termination
Think IT uniform shirt rollout
No more Adobe licenses
Xtra & Yahoo spam problems resurface
Adobe Boxed Product to be discontinued
Autodesk upgrade changes
Adobe release cycles, upgrade and maintenance
Windows 8 Reimagine event
Cloudy with a chance of rain....or silence
Why should I consider Software Assurance on Windows – Part Deux
No fly for LIon batteries
Yet another Copyright battle
Why should you put Software Assurance on top of Windows 8 Pro?
Vista Business and Office 2007 retire
So how safe is that data in the Cloud?
Shameless 1
more...
Graeme Rawlings
“Customer service is not a department, it’s everyone’s job”

Graeme Rawlings
Think I.T. Team

News

SCAM ALERT: COVID-19 Maps Used to Deploy Malware and Scrape Credentials

Scam linked to COVID-19 infographic map used to invade your computer and steal your data. Recently Cybersecurity company Reason labs released a threat analysis report, detailing a new attack that takes advantage of internet users’ increased appetite for information about the novel coronavirus, COVID-19, that has now been categorised as a pandemic worldwide. This...  more...