
Open Dental 25.4 is live and packed with updates. From OCR on eClipboard that auto-fills patient insurance info, to a Clerri integration for in-house membership plans, there’s a lot to explore, including 11 features requested directly by users.

Learn about Open Dental’s standard reports and user queries that allow you to pull the data you need to manage your practice effectively.

Installing Open Dental on additional workstations is a simple process. These prerequisites will ensure your installation goes smoothly, and the post-install steps will allow the new user to hit the ground running!

In our continuing Employee Spotlight series, we introduce Mark, whose hard work and dedication have truly made a difference in our organization.

Learn how to set up global and user-level permissions in Open Dental to ensure appropriate security and a smooth workflow.
Read content written by featured third-party guest writers.

EPCS certification isn’t just a regulatory checkbox. It’s what makes electronic prescribing of controlled substances actually safe, reducing fraud, cutting errors, and keeping providers on the right side of DEA requirements.

HIPAA violations run the gamut from snooping out of idle curiosity to malicious data breaches. A look at common violations and the penalties incurred.

Google recently introduced a new feature for local listings, highlighting which insurance plans medical and dental practices accept. Update your GoogleMyBusiness listing to help patients see you as their best fit!

What is practice intelligence, and how can it change the quality and amount of patient care you provide? See the role data played in this practice’s success.

A HIPAA Security Rule checklist is an invaluable document you can refer to periodically to make sure you remain compliant with the HIPAA Security Rule.

The best way to protect against the hassle and cost of data breaches is prevention, but the first step is understanding them. This guide outlines the types of data breaches your practice could encounter and the simple steps to prevent data breach incidents from occurring in the first place.