Archive for category: Articles

Oct 1 Safe Harbor Deadline

Categories: Articles

Are you a business owner who needs to reduce their current year taxable income and save for retirement? Now is the ideal time to evaluate retirement plan options for 2018 and beyond.

The deadline to establish a safe harbor 401(k) plan fpr 2018 is October 1st, 2018. These plans provide significant benefits to business owners and their key staff members:

  • Business owners to make the maximum 401(k) contribution this year ($18,500 or $24,500 if age 50+);
  • Safe harbor company contributions can be either a flat 3% contribution to eligible employees, or a matching contribution of up to 4% of pay;
  • The plan may allow for additional profit sharing or matching contributions;
  • These plans can be paired with cash balance/defined benefit plans for even larger tax-deductible contributions.

Please contact us ASAP so we can start designing a solution for your needs. We look forward to working with you!

Joshua C. Harper, CFP®, CLU®, ChFC®

 Office (404) 926-1303

Cell (404) 277-1604

Fax (470) 777-2470

 

Three Alliance Center

3550 Lenox Road NE, Suite 1100

Atlanta, GA 30326

Article provided by Joshua C. Harper , CFP®, CLU®, ChFC®, for Capstone Financial. For questions, please contact here.

The Story Of Windows 7 & Server 2008 End Of Life Has Just Gone Viral!

Categories: Articles

Microsoft’s most loved computing operating systems are ending sooner than we think. Support for Windows 7, Windows Server 2008 and Windows Server 2008 R2 end on January 14th, 2020. This means that they will discontinue all support, including paid support; and all updates, including security updates. At this time your systems will no longer receive regular security updates, it is because of this that your older systems will no longer be considered compliant. Additionally, your computers, servers, medical modalities running these older systems will be prone to new unpatched exploits, potentially leaving your systems open to further attacks.

Between now and January 2020, Microsoft is offering “extended support” for Windows 7. Which means, Microsoft is still offering paid support and continues to provide security updates. No new features will be released.

As for Windows Server 2008, everyone will need to migrate to Windows Server 2012 or higher. Microsoft will no longer accept warranty claims, or provide non-security hot fixes. Microsoft will continue to offer bug fixes and security updates through extended support. Be mindful though, that we must validate what systems are being supported by your line of business and your applications before proposing an upgrade solution, it is not uncommon for software vendors (including many EMRs) to not support the most recent Server operating systems.

In the table below you can see the current dates that Microsoft will be ending support for various operating systems:

What Do You Do Now?

Now, its time to upgrade your operating systems. The whole process takes time and careful planning, especially if you have a lot of machines and systems to assess in the process. Here are the steps to take to make sure your transition is successful:

1. Identify devices that need to be upgraded or replaced that meet essential (HIPAA) security compliance.

2. Develop a budget for upgrades, replacements and a timeline of when this will occur.

3. If your systems needing upgrades aren’t powerful enough for the latest Microsoft upgrades, we recommend backing up valuable data and then shredding the hard drive, recycling the old PC, and replacing it with a new computer running Windows 8 Professional or Windows 10.

4. Have security controls in place to separate difficult systems from Windows 7 and Server 2008 machines that cannot be upgraded or removed.

5. Training employees on the new upcoming operating systems that are going to be implemented in your practice/business.

What is Windows 10 and how do I upgrade From Windows 7?

If you don’t have a product key or a digital license, you can buy Windows 10 Pro from the Microsoft Store. Select the Start button, select Settings > Update & security > Activation, and then select Go to Microsoft Store.

The great thing about Windows 10 is that it supports apps that are used across multiple devices, including PCs, tablets, and smartphones. It supports face login, touchscreen, and keyboard/mouse input methods and is faster than Windows 7.

It has a lot of useful benefits like interface, security, speed, compatibility, and software tools that are a massive improvement over Windows 7. The goal of Windows 10 is familiarity and a much simpler learning curve. It gives you the best of both worlds.

Is your practice/business still using Windows 7 and Server 2008? Do you need help upgrading your operating system, replacing your computers with Windows 10 and Server 2012, hard drive shredding and recycling?

Then, Contact Us.

We’re always here to help with all of your IT needs.

Article provided by Mike Jann , for Medicus IT  mjann@medicusit.com.

Don’t Get Put on the SHAME LIST! ; Contribute to a Safer Web by Switching to HTTPS

Categories: Articles

Google has given us all a final push to defend our sensitive information since July (2018) with the release of Chrome 68, a new version of their free internet browser. This, of course, includes prospective patients that may be searching for a healthcare provider. The new version will mark all HTTP sites as “Not Secure,” according to a blog post published by Emily Schechter, Chrome security product manager. In a gradually increasing effort to ensure visitor safety and security throughout the web, Google started to mark more and more HTTP websites as “Not Secure” last January, including those asking for credit card information and passwords. Outside entities even published “Shame Lists” of websites that had not yet made the switch!

Just since last year, more than 68% of Google Chrome users on Android and Windows and more than 78% on Chrome OS and Mac now have protection through HTTPS encryption.  Of course, Google aims for 100% of traffic to be protected by HTTPS encryption by default. What does this mean for you? It means that your website needs a certificate for use with SSL or TLS if it does not have one yet.

Lost in a cloud of abbreviations? Here’s what you need to know:

HTTPS (HyperText Transfer Protocol Secure) is an extension of HTTP and a certain code that two computers use to scramble the messages they send to each other so that hackers can’t intercept those messages (i.e. your CC info, passwords, etc.) and read them. An SSL is a Secure Sockets Layer and TSL means Transport Layer Security. These layers are where HTTPS uses this “crime-fighting” code. They allow private and secure transfer of data to a browser from a server. Therefore, since July, anyone without an SSL or TLS will be deemed “Not Secure.”

Right now, HTTPS sites show a green lock and the word “Secure” in the far left of the URL bar. While previous versions of Chrome would only alert the visitor that the site was not secure when entering data into certain fields, anyone that does not switch to HTTPS will surely turn off visitors by showing a red “i” in a circle and the words, “Not Secure.”

If this switch has already impacted your website, don’t worry; there is a path to recovery. It may cause damage (turning patients away from your site), but it can be reversed. There are new automatic auditing tools that make migrating to HTTPS very simple, such as the audit in Lighthouse. Developers can use Lighthouse to determine which parts of your site are ready to update to HTTPS. Moving to HTTPS will also allow for new features and performance enhancements that HTTP cannot support.

In February 2018, Google reported that HTTPS was already the default for 81% of the top 100 sites. Ask NicheLabs to help you obtain your SSL today by calling 888-978-9254 or click here to send a message.

Article provided by Christina O’Brien, Marketing Manager, NicheLabs. For questions, please contact here.

Let the Patient Inside Before Their Visit; The Benefits of Virtual Tours

Categories: Articles

It’s safe to say that most people do not stroll around town to look for healthcare practices when they need a check-up or to see the doctor for a sore throat. Besides word-of-mouth (no pun intended), how do they find the right doctor’s office? Google tells us that consumers use mapping tools (like Google Maps) 44% of the time when they are searching for businesses. After they find you, they need a reason to learn more and book an appointment. The longer they engage with your site, the more likely they are to make an appointment. A Google Street View Virtual Tour is an easy, low maintenance, one-time investment that lasts forever and can increase both web traffic and in-office visits.

We’ve all sat in the waiting room for what feels like forever, anxiously waiting for our doctor to provide us some relief or at least some answers. When someone searches for “doctor’s office near me,” they want to find a place that looks comfortable and clean. This is where Google Street View Virtual Tours come in. The 3D tours are an addition to the Google Maps platform. Anyone with a physical location listed with Google My Business can integrate a tour into their listing. As one of the most high-impact marketing tools available, a virtual tour literally gives a potential patient the ability to move around inside your business, choosing what they want to see.

Meet Medicus IT, a leading Healthcare IT Support Provider serving the Southeast. Nichelabs gave Medicus IT the power to leverage Google Virtual Tour Technology and showcase their beautiful new office in Alpharetta, GA.

What does the 3D tour tell us about Medicus IT?

Benefits of Google Virtual Tour, Medicus IT - Image 1

The vibrancy of their office exudes the energy of their brand. Polished and professional, the space gives the correct impression that they are a successful business. Any website can go on boasting for paragraphs about how fantastic their patient services are and how great their practice’s reputation is because of it. Why not just SHOW the prospective patient the fruits of your labor and instill the confidence that you are an established, active healthcare practice of integrity. The most powerful copywriting imaginable still could never produce the impact that we get from this virtual tour.

Benefits of Google Virtual Tour, Medicus IT - Image 2

In order to take care of your patients, you must first take care of your medical and administrative staff. We are able to see the office lounge area, complete with comfy couch, pool table, and even a foosball table. Notice how it is right next to a mass of spacious cubicles; In fact, the whole office has an openness to it. This Virtual Tour allows us to SEE that they promote an atmosphere of open communication and idea sharing, which for a doctor’s office would leave less room for patient cases, inquiries, and test results getting lost in translation.

Benefits of Google Virtual Tour, Medicus IT - Image 3

Notice the adorable “DADDY” drawing from an employee’s son or daughter. Clearly, you will not be dealing with “robots” if you call Medicus IT.

Benefits of Google Virtual Tour, Medicus IT - Image 4

“Take a walk” down the hall and you will see the impressive lunch area. They clearly care about employee experience.
There are so many positive mental notes that the visitor can infer as they navigate through this 3D tour. The interest it creates quickly turns to interaction to see and know more. Click, Click, Click!

Google Virtual Street Tours Enhance Your Online Visibility

Benefits of Google Virtual Tour: Enhance visibility

When it comes to online presence, it pays to look good, but it is important to understand that you are also aiming to impress Google’s algorithms. There are certain factors that Google looks at to determine whether your business is relevant to a community, including distance. What better way to show Google that you are a real and credible practice than visual proof that you are where you say you are?

Beyond instant credibility, virtual tours help to boost your Local SEO, search engine rankings, and website traffic. The point of local SEO is to increase your visibility in your community.

After searching, “doctor’s office near me,” or “IT company near me,” the user may see a box on the right side with information about a local company (in the respective industry) such as hours of operation, phone number, address, and reviews. This box is called the Knowledge Panel. One of the sources that “influences” the Knowledge Panel is Google My Business. Google Street View Tours are a great way to optimize your Google My Business Page, improving your Local SEO. Google’s research indicated that 41% of the searches through mapping tools (mentioned earlier) resulted in site visits, and business listings with photos and virtual tours were twice as likely to generate interest.

More Interaction = Enhanced SEO

Click-through rate is another factor that tells Google whether you are important or not. It is a measurement of how successful an ad, post, campaign, or link is at capturing interest. It is calculated by dividing the number of clicks (interactions) by the number of impressions (views). Increase click-through rate by getting your users to interact! It only matters that you are found if users visit your site and stay there long enough to complete a desired action. If your content is boring, why would they stay? If you fail to give them a reason to look any further than your landing page or homepage, you will have a high bounce rate and a low click-through rate.

To improve click-through rate, you can embed video, photos, text, and links in the tour that, when clicked, will redirect the user to another landing page or part of your website that calls for an action. Ex. When the user views the reception desk, they see a “Book an Appointment” button that takes them straight to a reservation system or contact page.
Besides your My Google Business Page, how can you use your virtual tour?

  • Embed it in your website or feature it on a dedicated landing page.
    Imagine a tab in your website menu titled “See Inside.” The user sees a large, vivid, 3D tour pop up. There is a slim chance of them not clicking one of the arrows to move around and explore. Congratulations, you’ve just engaged your potential client by providing an interactive experience. Visitors will stay on your site longer and are more likely to hop from page to page.
  • Integrate into your Facebook page, Facebook ads, and feature in your social media posts
    Think of how many times you have clicked on a picture on Social Media to enlarge and get a better view. Posts are more enticing when they include a virtual tour that users can interact with to view from different perspectives.
  • Add audio, video, links, and info…
    …to get even more clicks and redirect to more pages. Remember that click-through rate!

A Google Virtual Street Tour is a real “set it and forget it.” No campaign necessary. If you would like to invite your future patients in before they even leave home, contact NicheLabs to create your Google Virtual Street Tour today.

Healthcare is one of the biggest hacking targets for two major reasons: legacy technology and the need to access data to ensure operations..

Categories: Articles

Healthcare is a hacking target

In the article below, the Department of Homeland Security issued an alert to help medical organizations about all CPUs with Intel hardware, who may have potential security flaws. They go on to emphasize the need to one, perform a Security Risk Analysis, and two, place protocols within your organization that will help monitor any suspicious activity. Most practices utilize a third party IT firm to help manage and monitor their networks, and work with them to learn how to mitigate risks. Additionally, a third party privacy & security expert can help create information security policies to help a practice follow “best practices.”

Read Full Article

Submitted by
Bill Steuer
GSG Capital, LLC
GSG Compliance, LLC
877-270-8306 ext. 133
678-209-2021 x133 (local)

Five reasons why your practice should implement a SIEM

Categories: Articles

A Security Information & Event Management (SIEM) system combines analyzing system events and device logs in real time to safeguard against unauthorized access to protected information. By utilizing a SIEM, it highlights the actionable events to proactively prevent a security incident while filtering out the noise found in traditional log data.

To best protect systems and ePHI, Healthcare practices should implement a multi-layered cybersecurity program to help protect their sensitive data and ultimately protect the practice. One way to improve any cybersecurity program is by utilizing SIEM.

Five reasons why your practice should implement a SIEM:
1. Respond to Incidents In Real Time
2. Reporting – Ability to Prove it
3. HIPAA Security Compliance
4. Dedicated Cybersecurity Team
5. A Single Security Breach Could Put Your Practice at Risk

How SIEM Works

SIEM software collects and aggregates log data generated throughout the organization’s technology infrastructure, from host systems and applications to network and security devices such as firewalls and wireless access points.

The software identifies and categorizes incidents and events, as well as analyzes them so practices can address issues that matter before the security incident occurs. The software sifts through thousands and thousands of security-related events, such as successful and failed logins, malware activity, and other possibly malicious activities to find the needle in the haystack.

Quote from Paul Musich, EMA

Why Your Practice Needs Managed Cybersecurity Services

The list of vulnerabilities to protect and monitor for is growing at a rate that IT support teams cannot keep up with and as a result, many businesses are choosing to outsource network security and monitoring to companies dedicated to providing expert security service 24/7.

If you are wondering how SIEM can benefit your practice and why you should consider implementing a SIEM solution as part of your cybersecurity program, then read the five reasons below.

1. Respond to Incidents In Real Time

Hackers, bots, viruses, malware, and, ransomware attacks are occurring daily in healthcare. A SIEM solution logs, reports, and alerts on known items or events out of the ordinary. Our Security Operations Center (SOC) team reviews flagged items and address items which need attention, such as a brute force attack or continued unauthorized access attempts to systems.

2. Reporting – Ability to Prove It

Reporting covers anything security-related such as successful and failed logins, malware activity, and other malicious activities attempting to hack into your network. Having this information helps not only to show compliance with the practice’s required HIPAA Policies & Procedures (P&P’s), but also can help prove whether a cybersecurity incident has occurred or not. When a cybersecurity incident occurs, it is up to the practice to prove that ePHI is not compromised. A SIEM can help in many cases to show what was accessed and even how much data was transferred, which alone could save hundreds of thousands of dollars.

3. HIPAA Security Compliance

Most medical practices don’t have the in-house security expertise necessary to perform the event monitoring and security reporting required to maintain HIPAA compliance, which is where SIEM comes into play. Reports generated by a SIEM allow your practice to demonstrate to the OCR auditor that you have reasonable means for protecting ePHI. Having reports and documentation on such cyber activity is required, according to HIPAA guidelines, to pass an audit by the OCR.

4. Dedicated Cybersecurity Team

Most practices think that SIEM is something that they can implement on their own without realizing the amount of information the software spits out. Also, many who try to analyze the data themselves without using a cybersecurity expert could potentially miss some tell-tale signs of a severe security issue. A qualified team managing your practice’s cybersecurity program will not only give you peace of mind but also ensure that you receive notification of security incidents that need to be addressed.

5. A Single Security Breach Could Put Your Practice at Risk

One single security breach could cost your practice thousands, if not millions in damages, attorney fees, fines and penalties, data forensics, crisis management, patient notification costs, and credit monitoring. Not to mention the damage to the reputation of the practice should you ever have to report to the media about your security breach. The above is reason alone for you to think about your practice’s current security program and what you can do to make it better.

By: Medicus IT
www.MedicusIT.com
678-495-5900

20 Things We Should Never Say to a Graphic Designer – But We’re Often Asked to by Customers

Categories: Articles

a 4 part series…

Graphic designers can be hard to communicate with. That’s the reason we communicate with them on our customer’s behalf.

Having worked with designers for about 25 years, it helps that we know the right kind of questions that will move the project along and create a final product that everyone will be happy with. They expend time and energy to come up with ideas, concept and designs to achieve their goals. Sometimes our customers will ask us to ask our designers questions that bring the project to a crashing halt, with incorrect assumptions about the design process.

1. “We haven’t finished writing the copy, but can you design a draft?”

You’ll often hear marketing experts say that “Content is king.” A design should be built around the content, not vice versa. Presenting content to its best advantage will always look better and get better results than trying to squeeze all the content into an existing design. Plus, going back and trying to re-arrange the design to fit the copy can be time-consuming for a designer and increases the turn-around time for you or your company. Get the copy as close to its final version as you can before asking to get the designer to get started — it’s better for everyone.

2. “Can I get you to do something really quick?”

Are you sure it will be quick? Do you know what’s involved? The designer is more than likely happy to accommodate an extra task or an adjustment here and there, but will definitely appreciate my asking how much time it will take (rather than if you just assume it’s a quick fix). Designers are good at giving estimates and will let you know how much time they need if you ask.

3. “Can you put it in a format that we can edit?”

We’ve been asked if we can furnish an editable source file. To edit a print file would take specialized graphic design software to open the file. Then, if you can even open the file, you run the risk that making edits to your carefully crafted project will compromise the design if you don’t have any design knowledge yourself. If we need to fix the file, that will incur extra fees. A better option when you want a professional-quality design but will need to make edits regularly, consider a DIY online option, where you can have access to templates created by designers that you can customize or tweak at any time without compromising design quality (they say that, but not sure that’s really true). The files must be saved and/or output in the proper format for printing, and without that knowledge of how to do that, you might not like the printed results.

4. “Can you do lots of different versions? I think I’ll know what I want when I see it.”

We get asked this quite often and our response to the customer is usually not well received. It tends to be something like, “sure, if you are willing to pay for it.” A great analogy goes something like this: “Let’s say you’re buying an expensive, tailor-made suit or a fancy, custom dress. Would you say to the seamstress, “Can you make me six versions of the outfit? When I see them, I’ll choose the one I like best and pay for just that one.” Of course not. Just because graphic design is a digital rather than physical/tangible product doesn’t mean that the designer puts any less time and care into the work. I’ve seen it written, “The design process will go more smoothly for all parties involved if we first spend some time developing a detailed creative brief. The brief helps the designer understand exactly what you’re looking for and are trying to achieve with the design — including information like your intended audience, preferred tone or aesthetic, budget, etc.”

After 25 years in business, we live in the real world. We suggest to customers and prospects that they get online and look around at logos, business cards, brochures, postcards…whatever products we are working on. Whether they see something they like or hate, we suggest they copy/cut/paste into a Word document, noting what they like, love, hate and why.

5. Don’t ask: “Can you Photoshop a photo…?”

Yes, Photoshop and other advanced design software can do some amazing things. But it can’t do everything; sometimes we receive requests that really are technically impossible for a designer to do. And just because you can do something doesn’t necessarily mean you should. Some of the more extreme or outlandish effects and treatments that are possible are not necessarily the best choice from a design perspective — plus, we’ve all seen Photoshop choices backfire, such as a model with an oddly angled arm or leg or impossibly thin proportions. Instead, we can ask designer to give some feedback and constructive criticism; she/he will usually have a pretty good idea of what will or won’t work for your design.

Submitted by Sheila Fox-Lovell from Shandy Creative Solutions
sheila@shandycreative.com
770.951.0305

Why Do A Security Risk Assessment?

Categories: Articles

Doing a “gap analysis” each year does not replace a Security Risk Assessment.

In a recent article from OCR, a clear distinction is made between what a gap analysis should be used for and why the need for a full Security Risk Assessment. They point out that practices and providers need to consider all potential risks regarding ePHI, not just previous years’ concerns.

See the rest of the article HERE.

Should you have any questions about your Risk assessment and corrective action plan, we are glad to see if we can help. If you are not sure what the differences are or if and when you need to perform them, please call on us for help.

WWW.GSGCOMPLIANCE.COM

Todd Greenberg and Bill Steuer

GSG COMPLIANCE

877-270-8306 ext. 133

678-209-2021 x133 (local)

877-828-8809 (fax)

404-643-4276 Cell

How to Prevent and Respond to Security Incidents

Categories: Articles

prevent and respond to security incidentsMedical practices are quickly getting a dose of reality on how critical it has become to protect information systems in the wake of the city of Atlanta ransomware attack this past month. An attack that caused courthouse documents and services like payment processing to become inaccessible for consumers.

Costs quickly add up to respond, correct and recover from a security breach. According to a recent article, written by Engadget, “The ransom demand was approximately $51,000, but according to the city’s Department of Procurement, Atlanta has spent much more than that on efforts to rectify the situation.” The city of Atlanta is reportedly facing a $2.7 million price tag to fix the issue.

The purpose of the HIPAA Security Rule is to ensure that every covered entity has implemented safeguards to protect the confidentiality, integrity, and availability of ePHI; protecting the practice and its patients. Practices must diligently prepare to protect itself from a security breach. It is imperative and a requirement for all practices to implement systems, policies, and procedures to protect electronic protected health information (ePHI).

To help prepare practices for such instances, we put together nine simple tips that every practice should know to help prevent and respond to security incidents.

1. Conduct a Security Risk Assessment
Understand potential security threats (e.g., downtime and costs associated with ransomware) and the impact they may have on your practice (risk and lost revenue). Use this information to shape your overall security strategy while understanding the risk and likelihood of each scenario occurring.

2. Train Your Employees
Because cybersecurity threats are continually evolving, an ongoing training plan for employees must be implemented. The training should include examples of security risks, as well as instruction on security best practices (e.g., lock laptops when away from your desk). Train your employees and then hold them accountable to follow the practice’s policies diligently.

3. Protect Your Network and Devices
Implement a password policy that requires strong passwords that expire every 90 days. Deploy firewall, VPN and antivirus technologies to ensure your network and endpoints are not vulnerable to attacks. Consider implementing multi-factor authentication and encryption for hard drives. Constant network monitoring is vital especially if you work in healthcare where ransomware attacks are a daily occurrence.

4. Update Your Software
It is essential to use current software products and be vigilant about patch management. Cybercriminals exploit software vulnerabilities utilizing a variety of tactics to gain access to computers and data.

5. Create Straightforward Cybersecurity Policies
Write and distribute a clear set of rules and instructions on cybersecurity and distribute to all employees of the practice. These policies may include policies on social media use, personal device use, authentication requirements, and even what employees can and can’t do on the company computers and network.

6. Back Up Your Data
Regular backups are a requirement to recover from data corruption or loss resulting from security breaches. Consider using a modern data protection tool that takes incremental backups of data periodically throughout the day to prevent data loss.

7. Enable Uptime
Choose a modern data protection solution that enables “instant recovery” of data and applications. Application downtime can significantly impact your business’ ability to generate revenue.

8. Know Where Your Data Resides
Maintaining oversight of business data is an essential piece of the security puzzle. The more places data exists, the more likely it is that unauthorized individuals can gain access to it. Avoid “shadow IT,” which is information-technology tools and systems used inside practices without explicitly organizational approval. An example of this is employees using Dropbox to share data without knowledge to the practice.

9. Control Access To Computer
Use security cards or similar security measures to control access to facilities. Ensure that employees use strong passwords for access to all systems. Remove administrative privileges from all parties who do not need them on a regular basis to reduce the risk.

Provided by Chris Jann, Founder & CEO, Medicus IT (678.495.5902 or cjann@MedicusIT.com).

How to Recruit Top Talent: Referrals

Categories: Articles

Employee Referrals - Avery PartnersWhen it comes to recruiting people who are sure to succeed in their role, Avery Partners relies foremost on Employee Referrrals.

Research shows that referral programs are many times more effective than relying on job boards to find and hire applicants. Employee referral programs have proved to improve the recruiting function’s return on investment because referred individuals typically get up to speed faster, need less onboarding, are more satisfied in their roles and stay longer at the company. Referrals have also proved to be a cost-effective way to tap into a large, qualified labor pool of passive job seekers.

The more you research it, the more it becomes clear: almost always, the first step of any hiring process should be asking your existing employees if they know someone good for the role. A great referral program allows you to turn your entire workforce into recruiters. When you only have so many recruiters and so many resources to reach out to candidates, it helps to have a great referral program to empower all of your employees to help in sourcing.

The Avery Difference

At Avery Partners, we are different in that we take all the risk. We meet each of our candidates face to face for the interview to make sure they are the best fit for the job. These candidates are also OUR employees. We manage all their paperwork, applications, check references, federal verification and tax forms, background checks, drug screenings, pay-records, taxes, etc. This takes the hassle off your company and staff so that you can do what you do best.

Please contact Jennifer Hall for more information at the office (770) 642-6100 x237 or email Jennifer.Hall@AveryPartners.com

© Copyright - Healthcare Services - Website support by NicheLabs.com