
Open Dental Version 25.3 has been released as Stable! Our latest blog post goes into some of the highlights from this version, including a few user feature requests!

Learn more about using the various Audit Trails available in Open Dental to see who took specific actions in the software, and when.

Learn about Open Dental’s standard reports and user queries that allow you to pull the data you need to manage your practice effectively.

Installing Open Dental on additional workstations is a simple process. These prerequisites will ensure your installation goes smoothly, and the post-install steps will allow the new user to hit the ground running!

In our continuing Employee Spotlight series, we introduce Mark, whose hard work and dedication have truly made a difference in our organization.
Read content written by featured third-party guest writers.

Staff shortages, endless charting, patients who zone out mid-explanation. These are real problems. AI dental software is quietly solving them. Here’s what it does, what it doesn’t, and how to know if it’s right for your practice.

A HIPAA Security Rule checklist is an invaluable document you can refer to periodically to make sure you remain compliant with the HIPAA Security Rule.

The best way to protect against the hassle and cost of data breaches is prevention, but the first step is understanding them. This guide outlines the types of data breaches your practice could encounter and the simple steps to prevent data breach incidents from occurring in the first place.

Learn the critical IT setup components, their timeline, and what to look for in an IT partner for your start-up dental practice.

Just as there are many causes of stress in the dental profession, there are also many solutions to coping with and overcoming it. In this article, we’ll explore how using actionable data can help you to build a team where everyone thinks like an owner.

A disaster recovery plan is essential for all HIPAA compliant businesses. Moreover, it is crucial this plan is regularly updated to ensure PHI data is safe no matter what.