Don’t Trust In Encryption Alone To Protect Your Mobile Medical Devices; Use The Alpha Bug Tag 2 To Boost Security

 

i-pad Theft-3                                                                                                                WC Blog 328
Bug Tag-3
Classic N10-3
Don’t Trust In Encryption Alone To Protect Your Mobile Medical Devices; Use The Alpha Bug Tag 2 To Boost Security 
     I don’t like to cry wolf and I don’t like to unnecessarily scare people. On the flip side of that, I do believe being too nonchalant about some things, like data security on computer devices can lead to harmful situations. Take for instance mobile medical devices, some web sites seem to suggest that encryption protects computing devices from hacking so there is not a lot to be concerned with in terms of protecting patient’s personal information.  I will grant you that encryption is a powerful tool, but I would not be confident in it as my only defense should an ipad theft take place in my hospital, clinic or practice. Medical facilities MUST protect all patient data even if it only seems to be harmless on the surface, like an address. There are thieves trying to gain access to patient information be it addresses, credit billing information, names, prescription drug data, etc. They use the information to obtain prescription medications, file fraudulent medical bills with insurers, obtain credit information and so on. Medical providers must do more to protect mobile devices than depend on encryption.  One effective method is to physically protect devices with the Alpha Bug Tag 2.
     The Bug Tag is an electronic article surveillance (EAS) anti-theft device that works using a radio frequency (rf) signal in concert with an EAS pedestal, such as the Checkpoint Classic N10 unit. It has rounded edges that give it a flush fit with a device such as a tablet computer or i-pad. The design of the tag makes it nearly impossible for a criminal to pry it off of whatever item it is attached to. The built in tamper alarm ensures that even if it were pried off, the tag will sound a 95 decibel squealing alarm alerting employees to an attempted i-pad theft or tablet theft. With Classic N10 pedestals set in place at entrances and exits to a building, any attempt to smuggle a protected item out the door will result in an alarm from the tower. Again, staffs are alerted and can respond to the event and recover the item before a thief gets away.
     Why would someone completely trust in encryption to protect their devices? For starters on their iOS security white paper, March 2017, Apple includes the statement on page 10, “iOS has additional encryption and data protection features to safeguard user data even in cases where other parts of the security infrastructure have been compromised…This provides benefits for both users and IT administrators protecting personal and corporate information at all times and providing methods for instant and complete remote wipe in the case of device theft or loss.” https://www.apple.com/business/docs/iOS_Security_Guide.pdf I am not an expert in encryption and I know that the people at Apple are great at what they do. I only point out that one is left with the impression that there is no need to worry should a device be stolen. I would like to suggest that IF a breach were to take place, fines from the Department of Health and Human Services (HHS) can be hefty. On top of the fines that could be levied, there is also the loss of public confidence in the facility where the breach has occurred and that can impact profitability.
     Do portable devices get stolen from facilities?  According to the hhs.gov website, in 2017 alone there have been four reported thefts or losses of “other portable electronic devices” and four “thefts of laptops” https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf This does not include all the breaches due to paper losses or thefts, network server hackings, unauthorized email disclosures and so on. In one case of theft, “A computer and storage device have been discovered to have been stolen from San Diego-based healthcare provider Sharp Healthcare. The devices were taken from a locked cabinet in an access-controlled patient treatment area of the Sharp Memorial Outpatient Pavilion in Kearney Mesa in San Diego, CA.” (emphasis mine). The article goes on to report that, “750 current and former patients are understood to have been impacted by the incident.” http://www.hipaajournal.com/sharp-healthcare-says-stolen-devices-contained-phi-of-patients-8718/ The story does not indicate the type of storage device or computer and it may or may not have been an i-pad theft but with the increased use of mobile devices in medicine the necessary precautions are the same.
     Using the Bug Tag 2 on mobile medical devices and having Classic N10 pedestals installed in doorways is an additional security step you can take to protect your business and clients. Don’t allow i-pad theft or tablet theft to take your reputation or result in astronomical fines. 
Get more information on the Bug Tag, contact us or call 1.770.426.0547today.

I don’t like to cry wolf and I don’t like to unnecessarily scare people. On the flip side of that, I do believe being too nonchalant about some things, like data security on computer devices can lead to harmful situations. Take for instance mobile medical devices, some web sites seem to suggest that encryption protects computing devices from hacking so there is not a lot to be concerned with in terms of protecting patient’s personal information.  I will grant you that encryption is a powerful tool, but I would not be confident in it as my only defense should an ipad theft take place in my hospital, clinic or practice. Medical facilities MUST protect all patient data even if it only seems to be harmless on the surface, like an address. There are thieves trying to gain access to patient information be it addresses, credit billing information, names, prescription drug data, etc. They use the information to obtain prescription medications, file fraudulent medical bills with insurers, obtain credit information and so on. Medical providers must do more to protect mobile devices than depend on encryption.  One effective method is to physically protect devices with the Alpha Bug Tag 2.

The Bug Tag is an electronic article surveillance (EAS) anti-theft device that works using a radio frequency (rf) signal in concert with an EAS pedestal, such as the Checkpoint Classic N10 unit. It has rounded edges that give it a flush fit with a device such as a tablet computer or i-pad. The design of the tag makes it nearly impossible for a criminal to pry it off of whatever item it is attached to. The built in tamper alarm ensures that even if it were pried off, the tag will sound a 95 decibel squealing alarm alerting employees to an attempted i-pad theft or tablet theft. With Classic N10 pedestals set in place at entrances and exits to a building, any attempt to smuggle a protected item out the door will result in an alarm from the tower. Again, staffs are alerted and can respond to the event and recover the item before a thief gets away.

Why would someone completely trust in encryption to protect their devices? For starters on their iOS security white paper, March 2017, Apple includes the statement on page 10, “iOS has additional encryption and data protection features to safeguard user data even in cases where other parts of the security infrastructure have been compromised…This provides benefits for both users and IT administrators protecting personal and corporate information at all times and providing methods for instant and complete remote wipe in the case of device theft or loss.” https://www.apple.com/business/docs/iOS_Security_Guide.pdf I am not an expert in encryption and I know that the people at Apple are great at what they do. I only point out that one is left with the impression that there is no need to worry should a device be stolen. I would like to suggest that IF a breach were to take place, fines from the Department of Health and Human Services (HHS) can be hefty. On top of the fines that could be levied, there is also the loss of public confidence in the facility where the breach has occurred and that can impact profitability.

Do portable devices get stolen from facilities? According to the hhs.gov website, in 2017 alone there have been four reported thefts or losses of “other portable electronic devices” and four “thefts of laptops” https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf This does not include all the breaches due to paper losses or thefts, network server hackings, unauthorized email disclosures and so on. In one case of theft, “A computer and storage device have been discovered to have been stolen from San Diego-based healthcare provider Sharp Healthcare. The devices were taken from a locked cabinet in an access-controlled patient treatment area of the Sharp Memorial Outpatient Pavilion in Kearney Mesa in San Diego, CA.” (emphasis mine). The article goes on to report that, “750 current and former patients are understood to have been impacted by the incident.” http://www.hipaajournal.com/sharp-healthcare-says-stolen-devices-contained-phi-of-patients-8718/ The story does not indicate the type of storage device or computer and it may or may not have been an i-pad theft but with the increased use of mobile devices in medicine the necessary precautions are the same.

Using the Bug Tag 2 on mobile medical devices and having Classic N10 pedestals installed in doorways is an additional security step you can take to protect your business and clients. Don’t allow i-pad theft or tablet theft to take your reputation or result in astronomical fines. 

 

Get more information on the Bug Tag, contact us or call 1.770.426.0547today.

 

 

Examining The Ability Of The Bug Tag To Protect Mobile Devices Used For Autopsies

 

Bug Tag -4                                                                                                                            WC Blog 303
Classic N10 -4
Tablet Theft -3
i-pad theft -3
Examining The Ability Of The Bug Tag To Protect Mobile Devices Used For Autopsies
     The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.
     How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.
     The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.
     So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/
The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 
     In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 
     Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.
The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
     

The use of computer tablets and i-pads in healthcare has been growing rapidly. They have been used for entertaining children and alleviating their fear of being in an exam room. They are used by experts to meet with veterans who may be dealing with PTSD and don’t want to go into a hospital setting. They are being used to view x-rays and CT scans with patients. One use for i-pads and computer tablets I recently learned of is for conducting autopsies. As with any medical facility there still needs to be concern for the protection of patient information and privacy. Any patient information stored on a device is going to be potentially vulnerable to hacking and theft and could be used for fraudulent purposes. It is imperative that medical facilities take appropriate steps to prevent i-pad theft and tablet theft to protect patient privacy. The Alpha Bug Tag 2 and Classic N10 electronic article surveillance (EAS) tower are powerful tools to keep mobile medical devices safe from theft and potential patient information compromise.

How do the Bug Tag and Classic N10 tower work together to prevent theft? They operate as a radio frequency transmitter and receiver. The tag has a built in coil that is designed to send a signal out on a specific frequency. The tower is designed to pick up this radio frequency wave when the tag is carried into the receiver detection field. When a tag is detected alarms in the tower are activated and a loud, constant beeping noise sounds. LED lights in the antenna also flash and together they warn the employees of a facility that a tagged item is about to be carried out of the building. Staff then responds to the alarm and stop the person trying to walk out and prevent the tablet theft or i-pad theft from taking place. If a doctor or nurse has placed the device in a lab coat pocket and forgotten they have it as they are ready to leave, the alert reminds them to return it.

The next question you may be asking yourself is, “Couldn’t a thief simply remove the Bug Tag from the unit and then walk through the Classic N10 pedestal?” The tags can only be removed from a device with a special removal tool only available from Alpha Security. Any tampering or forced removal of a tag causes an internal alarm in the tag to be set off. The alert is loud enough to scare a thief and cause him/her to panic and leave the device.

So, how are mobile devices being used in autopsies? According to one website, they posted an article, “Sheffield Opens UK’s First Digital Autopsy Facility”, “Digital autopsy involves a scan of the body using a GE CT scanner, before iGene’s revolutionary, proprietary, software ‘INFOPSY®’ creates a 3D image of the body, enabling the pathologist to conduct a full, non-invasive digital post mortem using a large, touchscreen tablet computer.”   http://digitalautopsy.co.uk/sheffield-opens-uks-first-digital-autopsy-facility/

The article goes on to list some of the benefits of the digital autopsy as, almost immediate results, less stress on the family since it is non-invasive, faster investigation so the body can be released for final disposition more quickly, and accuracy of results since traditional methods may miss some things during the procedure. 

In addition to the digital autopsy, there are a number of coroner apps that are now available for mobile devices. Some of these apps are an ‘Autopsy Checklist’, ‘Autopsy Consent and Authorization Form’, and ‘Elder Care When Someone Dies Checklist’.  The list of apps goes on, but the point is the apps exist and if they are in a digital format, private patient information is being stored that should be protected from possible breach. 

 Mobile devices and innovative, new applications can improve many aspects of the medical field. As the use of these personal handheld computers are used more it is imperative that steps are taken to prevent i-pad theft, tablet theft and the loss of patient data. The bug tag and Classic N10 pedestal are the protections you need to maintain that security.

 

The Bug Tag is important and we can help you with it. Call 1.770.426.0547 and let’s talk.

     

 

 

Bugs In Hospitals Are Good When They Are Alpha Bug Tag 2’s Protecting Mobile Medical Devices

Alpha Bug Tag 2-5                                                                                                                      wc blog 289
I-pad theft-3
Tablet theft-3
Classic N10-3
Bugs In Hospitals Are Good When They Are Alpha Bug Tag 2’s Protecting Mobile Medical Devices 
       Having been a Boy Scout while growing up, I spent a lot of time outdoors so I don’t get too bothered by bugs. Of course, that means bugs should be outdoors not in our homes, hotels, restaurants and certainly not in hospitals. When I saw stories about bugs in hospitals it kind of bugged me (pun intended). One example was a story about a hospital in Pikeville, Kentucky that had a bedbug problem in June of 2016. The hospital closed down the infected areas and cleaned up the problem without further incident. http://www.wkyt.com/content/news/Pikeville-Medical-Center-working-to-eradicate-bed-bugs-382947921.html . There is one kind of bug that DOES have a place in a hospital and bedbugs are not it. You read that right, I am promoting one bug that hospitals SHOULD pursue bringing into the building. The Alpha Bug Tag 2 can be a welcome addition to hospitals that need to protect against tablet theft and i-pad theft if they use mobile medical devices to improve healthcare.
     The Alpha Bug Tag 2 is an electronic article surveillance (EAS) anti-theft device that prevents theft through deterrence and EAS antenna activation. The tag is comprised of a reusable module containing the radio frequency components, alarm and LED flashing light and a disposable adhesive sled. The adhesive sled allows the module to be attached directly to mobile medical devices without damaging an i-pad, tablet or even a laptop. The Alpha Bug Tag 2 is built to prevent tampering and unauthorized tag removal with an internal tamper alarm that sounds if a thief tries to take it off while attempting an i-pad theft or laptop theft. A built in LED light flashes as a deterrent to warn criminals the tag is present and active. If a protected mobile device is carried close to EAS antennas, such as a Checkpoint Classic N10 antenna, the antenna picks up the radio frequency signal emitting from the tag. The antenna then alarms and sounds a loud warning and flashes LED lights built into it. Medical staff can respond to the antenna alarm and prevent a device from being stolen from the facility. 3-alarm versions of the tag have an additional feature that causes the tag itself to alarm if it is carried past the EAS antennas, alerting personnel who it is that is trying to get away.
     I want to quickly follow up on my mention of the Checkpoint Classic N10 antenna. EAS antennas are necessary for the tags to fully function. While a tag itself may be a deterrent and will alarm if tampered with the EAS function is what prevents the actual tablet theft or i-pad theft. The Alpha Bug Tag 2 works hand in hand with the EAS antenna located at building entrances and other areas where the mobile device does not need to be carried; for example a public restroom. The Checkpoint Classic N10 antenna is a perfect antenna for medical facilities because of the small footprint they take up so they don’t interfere with gurneys, wheelchairs, crutches, walkers etc. that may need extra doorway space.
     What is the concern over the protection of mobile devices used in a medical facility? Aren’t these devices password protected to prevent access to stored information? While the medical tablet or i-pad may have protections, there is no guarantee the items are safe from hacking.  Thieves could obtain patient medical records including billing information, prescription information, medical history, addresses etc. Such breaches of patient information have resulted in large fines for medical providers by the Department of Health and Human Services.  Fines for improper handling of personal health information have been as high as 2.25 million dollars (CVS Pharmacy 2009, source; Healthcare IT News, “6 Biggest HIPPA Breach Fines”, Erin McCann, May 23, 2014. http://www.healthcareitnews.com/slideshow/6-biggest-hipaa-breach-fines?page=4 ). The use of anti-theft devices can keep medical mobile devices from being stolen and leaving a facility.
     In a nutshell, yes, while pests such as bedbugs can be a concern, most medical facilities do a great job of staying bug free. That said, the one bug that should be brought in is the Alpha Bug Tag 2 to protect mobile medical devices. Protect patient information as well as property and stay fine free.
Alpha Bug Tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
     

Having been a Boy Scout while growing up, I spent a lot of time outdoors so I don’t get too bothered by bugs. Of course, that means bugs should be outdoors not in our homes, hotels, restaurants and certainly not in hospitals. When I saw stories about bugs in hospitals it kind of bugged me (pun intended). One example was a story about a hospital in Pikeville, Kentucky that had a bedbug problem in June of 2016. The hospital closed down the infected areas and cleaned up the problem without further incident. http://www.wkyt.com/content/news/Pikeville-Medical-Center-working-to-eradicate-bed-bugs-382947921.html. There is one kind of bug that DOES have a place in a hospital and bedbugs are not it. You read that right, I am promoting one bug that hospitals SHOULD pursue bringing into the building. The Alpha Bug Tag 2 can be a welcome addition to hospitals that need to protect against tablet theft and i-pad theft if they use mobile medical devices to improve healthcare.
     

The Alpha Bug Tag 2 is an electronic article surveillance (EAS) anti-theft device that prevents theft through deterrence and EAS antenna activation. The tag is comprised of a reusable module containing the radio frequency components, alarm and LED flashing light and a disposable adhesive sled. The adhesive sled allows the module to be attached directly to mobile medical devices without damaging an i-pad, tablet or even a laptop. The Alpha Bug Tag 2 is built to prevent tampering and unauthorized tag removal with an internal tamper alarm that sounds if a thief tries to take it off while attempting an i-pad theft or laptop theft. A built in LED light flashes as a deterrent to warn criminals the tag is present and active. If a protected mobile device is carried close to EAS antennas, such as a Checkpoint Classic N10 antenna, the antenna picks up the radio frequency signal emitting from the tag. The antenna then alarms and sounds a loud warning and flashes LED lights built into it. Medical staff can respond to the antenna alarm and prevent a device from being stolen from the facility. 3-alarm versions of the tag have an additional feature that causes the tag itself to alarm if it is carried past the EAS antennas, alerting personnel who it is that is trying to get away.
     

I want to quickly follow up on my mention of the Checkpoint Classic N10 antenna. EAS antennas are necessary for the tags to fully function. While a tag itself may be a deterrent and will alarm if tampered with the EAS function is what prevents the actual tablet theft or i-pad theft. The Alpha Bug Tag 2 works hand in hand with the EAS antenna located at building entrances and other areas where the mobile device does not need to be carried; for example a public restroom. The Checkpoint Classic N10 antenna is a perfect antenna for medical facilities because of the small footprint they take up so they don’t interfere with gurneys, wheelchairs, crutches, walkers etc. that may need extra doorway space.
     

What is the concern over the protection of mobile devices used in a medical facility? Aren’t these devices password protected to prevent access to stored information? While the medical tablet or i-pad may have protections, there is no guarantee the items are safe from hacking. Thieves could obtain patient medical records including billing information, prescription information, medical history, addresses etc. Such breaches of patient information have resulted in large fines for medical providers by the Department of Health and Human Services.  Fines for improper handling of personal health information have been as high as 2.25 million dollars (CVS Pharmacy 2009, source; Healthcare IT News, “6 Biggest HIPPA Breach Fines”, Erin McCann, May 23, 2014. http://www.healthcareitnews.com/slideshow/6-biggest-hipaa-breach-fines?page=4 ). The use of anti-theft devices can keep medical mobile devices from being stolen and leaving a facility.
     

In a nutshell, yes, while pests such as bedbugs can be a concern, most medical facilities do a great job of staying bug free. That said, the one bug that should be brought in is the Alpha Bug Tag 2 to protect mobile medical devices. Protect patient information as well as property and stay fine free.

 

Alpha Bug Tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.

     

 

Home Medical Supply Stores Can Improve Service With i-pads And Tablets; Alpha Bug Tag 2 Provides Theft Protection For The Devices And Client Information

Bug Tag 2- 4                                                                                                                                  WC blog 296
i-pad Theft-3
Classic N10 -4
Home Medical Supply Stores Can Improve Service With i-pads And Tablets; Alpha Bug Tag 2 Provides Theft Protection For The Devices And Client Information
     While I have no experience working in home medical supplier retail, I do have recent experiences in which I had to make some purchases from one home medical supply company. Not only did I have to provide personal information on the patient I was caring for and her medical information, I had to provide some of my own information. I noticed that the information was stored in a desktop computer along with old fashioned papers I had to fill out. One employee took care of paperwork, another employee seemed to be in charge of the inventory and inventory control process. I had three thoughts come to my mind while I waded through these transactions. First, why am I standing at a desk speaking to an office worker who is sitting at a computer workstation? Second, why am I filling out paper forms which could be lost, misplaced or even stolen? Third, inventory control would be so much easier for the inventory manager who appeared to be looking around trying to locate products? The entire process could have been more efficient if the business used i-pads or computer tablets to store client information, electronic forms and track inventory management. If they were to use tablets or i-pads, since these businesses are responsible for patient health information, it is important that client information is protected on mobile medical devices. The use of the Alpha Bug Tag 2 and Classic N10 electronic article surveillance antennas would be able to protect against tablet or i-pad theft.
     What can the Alpha Bug Tag 2 do that would allow it to protect mobile medical devices? The tag has an adhesive back that allows it to be attached directly to the device. They have tapered sides to make tampering difficult for a would-be thief. For additional protection, the tag has a tamper alarm that activates if an attempt is made to pull it off. The anti-theft devices also have coils built in that send out radio frequency signals that can be picked up by electronic article surveillance antennas, like the Checkpoint Classic N10. If a signal is detected the antennas activate a loud warning alert and LED lights in the antenna flash. This alerts staff that someone is carrying a protected item out the door and employees can recover the property, preventing an i-pad theft. Patient and client information is thus protected from potential compromise by someone who would try to sell that information on the black market.
     Home medical equipment sales are a growing segment of the healthcare market. According to a report on PR Newswire, “Global Home Medical Equipment Market Outlook: 2016-2022”, Oct. 18, 2016, “Increase in ageing population, growing incidence of chronic diseases, and rising healthcare expenditure are some of the key factors driving the growth of global home medical equipment market.” http://www.prnewswire.com/news-releases/global-home-medical-equipment-market-outlook-2016-2022-300347225.html  
With the growth of these businesses, it is important to stay up to date with cutting edge technology to streamline processes and make tasks more efficient. The more companies that are out there, the more there will be fights for those medical supply dollars.
      Finding ways to be faster and smarter requires innovation and bringing new technology into your business. The key is to bring in new technology without compromising patient data which can lead to significant fines from the Department of Health and Human Services. The Alpha Bug Tag 2 is your answer to the problem. The Classic N10 provides the other half of the solution when it is placed at building entrances and exits. This antenna has a small footprint, taking up little room in a doorway unlike most of the traditional EAS antennas. Despite this slimmer design, they pack a powerful punch with a detection field on par with larger models and an audible alarm that can’t be missed, by the criminal OR the staff.
     I’m no expert in home medical supply sales, but I do know retail and theft prevention and I know how technology can improve efficiency and profitability. Upgrade to computer tablets and i-pads to enjoy the benefit of portable information at your fingertips. Use the Alpha Bug Tag 2 and Classic N10 antenna to prevent i-pad theft and the risk of client/patient information compromise.
Need information on Alpha Bug Tag 2? Give us a call at 1.770.426.0547 now. 

While I have no experience working in home medical supplier retail, I do have recent experiences in which I had to make some purchases from one home medical supply company. Not only did I have to provide personal information on the patient I was caring for and her medical information, I had to provide some of my own information. I noticed that the information was stored in a desktop computer along with old fashioned papers I had to fill out. One employee took care of paperwork, another employee seemed to be in charge of the inventory and inventory control process. I had three thoughts come to my mind while I waded through these transactions. First, why am I standing at a desk speaking to an office worker who is sitting at a computer workstation? Second, why am I filling out paper forms which could be lost, misplaced or even stolen? Third, inventory control would be so much easier for the inventory manager who appeared to be looking around trying to locate products? The entire process could have been more efficient if the business used i-pads or computer tablets to store client information, electronic forms and track inventory management. If they were to use tablets or i-pads, since these businesses are responsible for patient health information, it is important that client information is protected on mobile medical devices. The use of the Alpha Bug Tag 2 and Classic N10 electronic article surveillance antennas would be able to protect against tablet or i-pad theft.
     

 

What can the Alpha Bug Tag 2 do that would allow it to protect mobile medical devices? The tag has an adhesive back that allows it to be attached directly to the device. They have tapered sides to make tampering difficult for a would-be thief. For additional protection, the tag has a tamper alarm that activates if an attempt is made to pull it off. The anti-theft devices also have coils built in that send out radio frequency signals that can be picked up by electronic article surveillance antennas, like the Checkpoint Classic N10. If a signal is detected the antennas activate a loud warning alert and LED lights in the antenna flash. This alerts staff that someone is carrying a protected item out the door and employees can recover the property, preventing an i-pad theft. Patient and client information is thus protected from potential compromise by someone who would try to sell that information on the black market.
     

 

Home medical equipment sales are a growing segment of the healthcare market. According to a report on PR Newswire, “Global Home Medical Equipment Market Outlook: 2016-2022”, Oct. 18, 2016, “Increase in ageing population, growing incidence of chronic diseases, and rising healthcare expenditure are some of the key factors driving the growth of global home medical equipment market.” http://www.prnewswire.com/news-releases/global-home-medical-equipment-market-outlook-2016-2022-300347225.html  With the growth of these businesses, it is important to stay up to date with cutting edge technology to streamline processes and make tasks more efficient. The more companies that are out there, the more there will be fights for those medical supply dollars.
     

 

Finding ways to be faster and smarter requires innovation and bringing new technology into your business. The key is to bring in new technology without compromising patient data which can lead to significant fines from the Department of Health and Human Services. The Alpha Bug Tag 2 is your answer to the problem. The Classic N10 provides the other half of the solution when it is placed at building entrances and exits. This antenna has a small footprint, taking up little room in a doorway unlike most of the traditional EAS antennas. Despite this slimmer design, they pack a powerful punch with a detection field on par with larger models and an audible alarm that can’t be missed, by the criminal OR the staff.
     

 

I’m no expert in home medical supply sales, but I do know retail and theft prevention and I know how technology can improve efficiency and profitability. Upgrade to computer tablets and i-pads to enjoy the benefit of portable information at your fingertips. Use the Alpha Bug Tag 2 and Classic N10 antenna to prevent i-pad theft and the risk of client/patient information compromise.

 

 

Need information on Alpha Bug Tag 2? Give us a call at 1.770.426.0547 now. 

 

Alpha Thunder Tags On Mobile Medical Devices – Intensive Care For i-pads and Tablets

Alpha Thunder Tag-4                                                                                                                           WC Blog 249
Classic N10-5
Tablet theft-3
I-pad theft-3
Alpha Thunder Tags On Mobile Medical Devices – Intensive Care For i-pads and Tablets
     Recently my family and I had the unfortunate experience of needing to spend a lot of time at a local hospital.  It was the cause for being at the hospital that was unfortunate, the doctors, nurses and other staff were exceptional and provided great care.  A significant amount of my time was spent in the Intensive Care Unit (ICU) of this hospital and yes, even during this time I could not help but take note of what was going on around me, aside from my reason for being there.  I saw doctors on their rounds with medical students using medical tablets to discuss patients, their medical histories, treatments, etc.  Although I could not hear everything, nor was I attempting to, I was able to ascertain bits and pieces of conversations even when they were separated from me by several feet.  It was obvious there was a significant amount of data and patient information available on those tablets or devices they were using.  At one point I was leaving the ICU, which was a very controlled environment requiring a visitor to be buzzed in, and I walked by a counter where a mobile device was unattended and no one in the immediate area.  I have a habit of switching gears pretty quickly when it comes to theft and security related issues.  Despite what I was going through I could not help but think, “What would happen if someone picked up this device and walked out of here?”  It would have been so much more secure if there was an Alpha Thunder Tag attached to it and Classic N10 antennas at both ends of this ICU unit.  
     An Alpha Thunder Tag is a device that can prevent tablet theft, i-pad theft or the theft of any mobile device.  The tag is attached to a mobile device with an adhesive (so eventually it could be removed if needed).  When a device is carried too close to a Classic N10 antenna the tag activates an alarm in the antenna that warns employees a potential theft is taking place.  Employees responding to the alarm can retrieve the item from the person, whether it was an intentional theft attempt or a doctor or nurse forgetting the item was in a pocket and setting off the alarm.  IF someone is attempting a tablet theft, i-pad theft or the theft of any tagged item, the Alpha Thunder Tag has a built in alarm that sounds letting people know the person walking out the door has a stolen item.  The antenna may stop sounding, but the Tag keeps alarming.
     So I’ve told you about the tag but by now you must be curious about the Checkpoint Classic N10 antenna I’ve mentioned several times.  This Checkpoint electronic article surveillance (EAS) antenna is designed to fit into small doorways where traditional EAS antennas won’t fit.  Because it is so small, it is perfect for an area like I was visiting in the hospital.  The ICU had entryways only from two ends.  In order to enter you had to press a buzzer and a nurse would ask why you were there and then push a button to allow access.  The hallways were always busy with gurneys and patients being wheeled around in wheelchairs.  A traditional antenna would probably have interfered with the traffic in this area.  The Classic N10 would fit snuggly by the doorposts and allow access to the ICU or any part of the hospital.  The standard antennas would cause any number of headaches as patients would be bumped into the antennas while trying to get them through the doorways.
     The possibility of a medical i-pad theft or tablet theft have to be taken seriously.  With the information that is being accessed on them, as I was able to determine by watching and listening, there is a huge amount of personal information accessible with these devices.  An Alpha Thunder tag on a device and placing Classic N10 antennas at doorways can protect these devices and prevent a possible compromise of patient information.
Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.
     

Recently my family and I had the unfortunate experience of needing to spend a lot of time at a local hospital. It was the cause for being at the hospital that was unfortunate, the doctors, nurses and other staff were exceptional and provided great care. A significant amount of my time was spent in the Intensive Care Unit (ICU) of this hospital and yes, even during this time I could not help but take note of what was going on around me, aside from my reason for being there. I saw doctors on their rounds with medical students using medical tablets to discuss patients, their medical histories, treatments, etc. Although I could not hear everything, nor was I attempting to, I was able to ascertain bits and pieces of conversations even when they were separated from me by several feet. It was obvious there was a significant amount of data and patient information available on those tablets or devices they were using. At one point I was leaving the ICU, which was a very controlled environment requiring a visitor to be buzzed in, and I walked by a counter where a mobile device was unattended and no one in the immediate area. I have a habit of switching gears pretty quickly when it comes to theft and security related issues. Despite what I was going through I could not help but think, “What would happen if someone picked up this device and walked out of here?” It would have been so much more secure if there was an Alpha Thunder Tag attached to it and Classic N10 antennas at both ends of this ICU unit.  
     

 

An Alpha Thunder Tag is a device that can prevent tablet theft, i-pad theft or the theft of any mobile device. The tag is attached to a mobile device with an adhesive (so eventually it could be removed if needed). When a device is carried too close to a Classic N10 antenna the tag activates an alarm in the antenna that warns employees a potential theft is taking place. Employees responding to the alarm can retrieve the item from the person, whether it was an intentional theft attempt or a doctor or nurse forgetting the item was in a pocket and setting off the alarm. IF someone is attempting a tablet theft, i-pad theft or the theft of any tagged item, the Alpha Thunder Tag has a built in alarm that sounds letting people know the person walking out the door has a stolen item. The antenna may stop sounding, but the Tag keeps alarming.

 

 

So I’ve told you about the tag but by now you must be curious about the Checkpoint Classic N10 antenna I’ve mentioned several times. This Checkpoint electronic article surveillance (EAS) antenna is designed to fit into small doorways where traditional EAS antennas won’t fit. Because it is so small, it is perfect for an area like I was visiting in the hospital. The ICU had entryways only from two ends. In order to enter you had to press a buzzer and a nurse would ask why you were there and then push a button to allow access. The hallways were always busy with gurneys and patients being wheeled around in wheelchairs. A traditional antenna would probably have interfered with the traffic in this area. The Classic N10 would fit snuggly by the doorposts and allow access to the ICU or any part of the hospital. The standard antennas would cause any number of headaches as patients would be bumped into the antennas while trying to get them through the doorways.

     

The possibility of a medical i-pad theft or tablet theft have to be taken seriously. With the information that is being accessed on them, as I was able to determine by watching and listening, there is a huge amount of personal information accessible with these devices. An Alpha Thunder tag on a device and placing Classic N10 antennas at doorways can protect these devices and prevent a possible compromise of patient information.

 

Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.