News
Success Stories & ROI
The app – with features galore and other apps intertwined – has seen a fivefold increase in daily use, with data showing that it meets the goal of being a central part of how patients and families interact with the health system.
The Michigan-based health system has told patients, for the second time in three years, that personal and protected health information has been breached during a ransomware attack.
These additions come while work is underway to consolidate the app with similar apps from other public healthcare clusters.
Homeland Security is calling for vigilance against state-sponsored CyberAv3ngers and other pro-Iranian hacktivists, who have a history of attacking operational control and IoT systems to steal access and control devices.
Success Stories & ROI
Taking a patient history upfront via telemedicine has been very fruitful for the high-demand specialty provider. By combining history via virtual care with a then more limited in-person visit, care can be delivered more efficiently – and more patients can be seen.
A principle-based approach to AI adoption emphasises risk management and privacy and security, among others, says the Health Information Management Association of Australia.
Fostering a culture of transparency, accuracy, and respect for patient data may be key to fully realise AI's potential in healthcare, says a healthcare data analyst.
An extension for Oracle electronic health record users connects mobile, home and rural care providers to patient EHR data, regardless of network connectivity, to improve health data interoperability and patient care.
AI & ML Intelligence
Yesha Patel, from Keck Medicine of USC, offers a sneak peek at her HIMSS AI in Healthcare Forum presentation, which shows how the health system has pulled off major implementations of AI technologies both acquired and homegrown.
New research shows that 75% of healthcare leaders increased their device and security budgets over the last 12 months, and they're willing to shell out for advanced protection or built-in exploit prevention.