Operations | Monitoring | ITSM | DevOps | Cloud

August 2021

How to Structure an IT Help Desk

Managed service providers (MSPs) need an IT help desk to address and answer the technical questions of clients. In the modern MSP environment, the IT help desk is the primary source of contact between customers and knowledgeable, responsive support personnel. Successful help desks are customer oriented and encourage clients to report IT incidents when they occur.

What's New: Introducing Delay Notifications to Control Alert Fatigue

The OnPage team is pleased to announce a new feature to the enterprise web console: Delay Notifications. With this new addition, organizations have the option to queue messages for specific time periods, delivering messages at the end of the Delay Notification schedule. The latest feature is designed to alleviate alert fatigue and improve work-life balance for incident respondents.

How to Effectively Prepare for a HIPAA Compliance Audit

The Department of Health and Human Services’ Office for Civil Rights (OCR) conducts periodic audits to verify that covered entities (CEs) and their business associates (BAs) are complying with HIPAA regulations. This article will discuss the steps organizations can take to ensure they pass a HIPAA compliance audit by having the proper data privacy and security measures in place for protected health information (PHI) and electronically protected health information (ePHI).

Strategies to Strengthen Nurse Mental Health and Safety

No job is easy, but the job of a nurse is even more challenging, especially during a global health crisis. Nurses are at a higher risk of developing burnout due to the psychological trauma and cognitive overload that comes with the nursing profession. The situation is further exacerbated when nurses take on more responsibility during a pandemic or other large-scale incidents.

Are You Spending Enough on Cybersecurity?

Cybercriminals do not discriminate against the organization, people or industry they target. These actors look to exploit vulnerabilities in resources to intercept valuable data from small and medium-sized businesses (SMBs). Cyberattacks are inevitable, and organizations must have the right controls and information security systems to mitigate the impact of an attack.