Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Tools to Manage Cyber Risk in a Growing Organization

Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine is given to an employee, it is up to the employee whether to follow the security best practices set forth by your company. Your technological asset has now become a security risk.

FYI: Email Alerting Isn't Enough

Email alerting is an inefficient way to receive and address critical alerts. Email inboxes tend to get flooded with “clutter,” as irrelevant messages bury urgent incident notifications. Incident management procedures require incident management systems, ensuring that urgent issues are immediately addressed. Yet, some services are reluctant to say goodbye to email alerting and its inefficiencies. This is the case with Google Voice, which recently solidified its commitment to email alerting.

NHS on Its Final Leg of Pager Replacement

If you’ve been following the U.K. healthcare landscape, you would know that the country has been considering replacing pagers for the longest time. This may soon materialize, partly accelerated by the challenges that doctors are facing during the COVID-19 pandemic. The pager replacement initiative not only signifies a pivotal shift from the aging infrastructure, but it also indicates how pagers have failed to thrive in today’s unprecedented times.

Personal Information Security and OnPage's Commitment to User Privacy

When making purchasing decisions, organizations must consider a vendor’s product pricing, promised benefits and level of customer service. Thorough vendor evaluation tends to result in successful investments, allowing organizations to reap the benefits of their newly acquired products without buyer’s remorse. Unfortunately, some buyers dismiss the importance of personal information security and how the vendor promises to protect user data.

HIPAA-Compliant Text Messaging: Best Practices and Policies

HIPAA compliant text messaging enables healthcare providers to securely communicate with patients and other healthcare providers. To ensure HIPAA compliance, you need to use HIPAA standards to create secure electronic data transmissions (in this case, text messages). The goal is to secure transmissions that contain protected health information (PHI).

Create On-Call Schedule Exceptions in Just a Few Clicks

OnPage’s incident alert management platform continues to evolve, providing powerful features and capabilities to clients. The OnPage product team proactively monitors requests for future advancements and launches them to enhance clients’ business processes. Continuous innovation allows OnPage to align with growing business needs, while adapting to the ever-changing trends of the digital operations world.

Building Your HIPAA Compliance Checklist

Achieving HIPAA compliance is a key objective of today’s healthcare facilities and treatment centers. It ensures that patient information and electronic health records (EHRs) remain protected. Though important, some healthcare facilities fail to achieve HIPAA compliance. The inability to achieve compliance results in the loss of sensitive patient information, and requires facilities to pay hefty fines as a result of the intercepted data.

What Is an Alerting System? Features, Principles and Best Practices

Alerting systems centralize all IT alerts into one intuitive platform. IT alerting systems integrate with your tooling stack, and provide alert controls that help teams increase efficiency and reduce false positives. The main functions of an IT alerting system include activating incident response, automating alerts, providing intuitive reports, and enabling quick communication between roles. To enable these functions, alerting systems should be designed with quality in mind, rather than quantity.

Unraveling Real-Time Health System to Address COVID-19 Challenges

The overarching vision of a real-time health system (RTHS) is to help healthcare delivery organizations (HDOs) move past the complexities of the digital era and align their resources to deliver value to patients, reaping the benefits of a more streamlined and efficient orchestration in the process.

How to Add Incident Alert Management to Your DevOps Pipeline

DevOps pipelines enable teams to implement continuous software development processes, often by using automation and collaboration tooling. The overall goal is to quickly release software products, updates, and fixes. To ensure a DevOps pipeline works well, teams add management and monitoring tooling to the pipeline. This includes incident alert management, which supports the team’s efforts in monitoring the security of various software and environment components.