Andrea Fox
Joint governance, audit monitoring and effective communication can help win patient trust, even in a fraught cybersecurity landscape where health systems are targeted for their patient data, says a Kaiser Permanente informatics leader.
The American Telemedicine Association says the new measures, calculators and other tools will help communities address the economic burden of inaction on health disparities and improve health through better access to virtual care.
Carthage Area Hospital and Claxton-Hepburn Medical Center were forced to divert patients from the ransomware attack on August 31 and are still canceling appointments.
As chief strategy officer for 1upHealth, the former national coordinator for health IT and interoperability guru gets a lot of feedback from industry stakeholders. Here are some of the questions, comments and concerns he's hearing.
When healthcare CISOs owned responsibility for medical device security, the application of frameworks such as HHS 405(d) Health Industry Cybersecurity Practices increased by as much as 18%, according to early peer benchmarking research results.
But restarting the paused Electronic Health Record Modernization program will first require a successful deployment at Lovell Federal Health Care Center in Chicago, says Dr. Neil Evans of the EHRM Integration Office.
In a letter to Anne Milgram, administrator of the Drug Enforcement Administration, they say Congress created a special registration under the SUPPORT Act "not as an option for DEA to utilize, but a requirement."
The payer says its new care management platform built on Salesforce Health Cloud helps understand members' care needs better and other tools reduce the processing time for benefits administration from 24 hours to five minutes.
Guardians of the Grid, designed for individuals and organizations to use as a preparation tool, invites players to take their roles as cybercriminals or cyber defenders. The healthcare CISO who invented it wants to raise funding with Kickstarter.
As it works to safeguard existing cybersecurity protocols from easy decryption by a future quantum computer, the agency is requesting feedback on standards for three algorithms designed to withstand quantum-powered cyberattacks.