Bulletin 4723 – Transition from gFOBT to FIT

Posted in: OHIP | 0

Fecal Immunochemical Test (FIT) Requisition

Changes are coming for Primary Care Physicians and General Practitioners in Ontario. The Ministry of Health and Long-Term Care plans on modifying the ColonCancerCheck (CCC) Program – Fecal Immunochemical Test (FIT) on June 24, 2019.

  • Bill Q150A with use of the New FIT Requisition as of June 24, 2019
  • Pre Fill Physician and Patient Information Directly on Requisition

Want to learn more? Call (416) 800-3770 now and get started!

Click here to read the bulletin from The Ministry of Health and Long-Term Care.

Virtualization can help to increase efficiency and cut costs

Posted in: Technology | 0

Virtualization can help to increase efficiency and cut costs, making it a viable option in your medical practice; in the ongoing effort to optimize the power of your hardware equipment. However, key factors are at play when the conversation of virtualization arises.
1.       The ability to modernize and innovate within an existing cost structure
2.       Simplifying software and hardware management
3.       Maximizing the investment.

So what is virtualization anyway?

Virtualization is the creation of a virtual environment for your operating system or even entire network server. The technology involved in virtualization started years ago, allowing network administrators to conserve excessive computing processing power. Now virtualization is the norm, in today’s highly technological world, spanning both small and large business alike; along with the entire infrastructure of Internet.

What are the top benefits?
  • Be environmentally friendly and save on energy costs
  • Reduce your physical footprint, especially when dealing with the cost for office space
  • Optimize your investment, utilizing much of the computing power available within modern hardware equipment
  • Improve your disaster recovery options
  • Ease your transition to EMR
  • Save money

By utilizing the option of virtualization you can work towards improving the efficiency of your office or medical practice; allowing you to focus on what matters.

OntarioMD’s Certification Release PC-2018-01

Posted in: OntarioMD, Press, Software | 0


YES Medical System, a leader in medical technology and Electronic Medical Record (EMR) solutions, today announced a new release of its YES EMR software. YES EMR is an EMR Offering certified by OntarioMD for use by Ontario clinicians. It was recertified on July 27, 2018 under OntarioMD’s  Certification Release PC-2018-01 in preparation for continued advancement in EMR maturity for clinicians. YES Medical System was the first vendor to achieve this updated EMR Certification. Our software, aligns with the objectives of OntarioMD, to add new features, improve performance, and offer even greater ease-of-use to both existing and new clients to support efficient and effective patient care. Designed from the ground up, our team of engineers, consultants and developers are moving forward with the vision of an integrated and seamless medical records network throughout Ontario.

“The functionality of our YES EMR continues to advance at a rapid pace, while incorporating new features requested by our fast-growing medical customer base. We will remain committed to offering solutions that make a difference and listen closely to our clients,” says Jason Chu, V.P. of YES Medical System.

YES Medical System has also achieved ISO 13485:2016 certification as proof of the quality of product it is delivering.  ISO 13485 is a quality systems certification specific to medical devices and EMR software;, it validates the quality of a Company’s practices.

To learn more, visit yescorp.ca or contact us directly at 416-800-3770 for additional information about our YES EMR software solutions.

About YES Medical System

YES Medical System is a leader in the file management industry; focused on providing solutions to a broad range of health care practices. A wealth of experience, in dealing with physician’s, medical clinics and hospitals, are the driving force behind the development of YES EMR.

Don’t lose your Identity

Posted in: Cyber Security | 0

Identity theft is something we cannot ignore in our data driven society. Whether it’s your credit card, email address, social media account, medical information, or a host of other channels, the threat of identity theft and data loss should be foremost in your daily activities. Here are some simple steps that can be taken to protect yourself both online and offline.

Shield yourself against malware and spyware

Electronic theft is one of the fastest growing areas. Having a computer, or computing device, without anti-virus, or anti-malware tools, opens yourself to a host of online dangers. There are free software solutions from Microsoft, for those with legitimate software, and a host of others (AVG, etc..) Most of these applications attempt to prevent users from phishing attacks, websites infested with malware, malicious software or virus infected files. You can also utilize browser extensions, such as WOT(used in popular browsers from Firefox and Google Chrome), a crowdsourced Internet website reputation rating tool which tries to warn computer users about unsafe websites. As for some practical advise, also use the latest web-browser and obtain regular updates. Internet Explorer 6, or any other badly out-dated web browser, just won’t help in today’s web world; no matter how much protection you have.

Be aware of some of the common terms and types of attacks listed below.

Computer Viruses
– A application, program or part of code that can be loaded onto your computer, without your knowledge, causing a substantial about of damage; along with frustration due to data loss. These types of malicious software can also replicate and infect other machines if not properly removed.
Hacker / Hacking
– Hackers have an ability to override password protection and bypass security; sometimes performing malicious activities and more.
– Spyware is software that covertly gathers information through the user’s Internet connection without his or her knowledge.
– Short for malicious software. Malware is generally designed to damage a computer system.
– As the classical story of “Troy” depicts, a Trojan virus is destructive code that can hide itself within an application or computer system; waiting to be unleashed for it’s intended purpose.
– The act of sending an e-mail to a user falsely claiming to be an established legitimate company, organization or individual in an attempt to trick the user into surrendering private and confidential information. Commonly used in fake commercial banking emails, and others, for the purposes identity theft.

Don’t ignore the social aspects of the web, ignorance is not bliss

Even social networking sites can pose a threat to a computer or computer network thanks to malware. On a business network, although I.T Manger use best practices to protect their systems against attack, a more basic aspect of “phishing” is by fraud and deception. Let’s be honest, there are a host of individuals wanting to be your friend. But how many of those individuals are actually legitimate? Criminals are always on the lurk. You don’t implicitly trust everyone you see, face-to-face, so why do we trust everyone online? This is not to make you paranoid, but we must take care of our identity and the fact that there are individuals, and crime based organizations, out in cyberspace attempting to scam and deceive you. Information is the new gold. Ensure that your own accounts don’t get hacked and don’t provide information to people you really don’t know. Use best practices when creating passwords and employing security measures. Most business networks force a strong password authentication, for login’s, however when dealing with social networks try to think of your identity over convenience. A password of “123” or “abc”, just isn’t good enough (see list of commonly used passwords).

Other measures to remember:

– Talk to your family members, friends, colleagues and ensure that they are cyber-smart.
– Ensure that individuals using your computer, tablet or mobile device are not creating a liability for you.
– Keep your systems up-to-date.
– Be in the know and knowledgeable on new threats to your security.

In Conclusion

Don’t become a victim! When it comes to the things you could do to protect yourself from identity theft, don’t ignore the small things. Keep vigilant and safe online. Always be aware that data is the new gold online. Following some best practices, in terms of your identity and security, can go a long way to helping to secure your future in the new world today.