Skip to main content

Network Infrastructure

IT Infrastructure
By Jessica Davis | 02:02 pm | July 09, 2018
Hackers hijacked an employee email account and diverted emails sent to the account to another account for which the county did not have access.
IT Infrastructure
By Mitchell Parker | 09:56 am | July 09, 2018
The first in a four-part series on successfully implementing radio frequency identification explains three ways the tech can improve patient experience and engagement.
IT Infrastructure
By Jessica Davis | 02:19 pm | June 29, 2018
Healthcare providers are investing more in cybersecurity, but an increase in threat sophistication and new bad actors mean the industry is still not ready for the next big global cyberattack.
IT Infrastructure
By Gus Venditto | 04:03 pm | June 27, 2018
Tests have shown that distance between the cloud provider and the enterprise can have a significant impact on latency with delays when the cloud is far away.
Data Warehousing
By Gus Venditto | 03:18 pm | June 27, 2018
It is important that provider organizations develop a clear picture of their EHR migration objectives before choosing a CSP.
IT Infrastructure
By Jessica Davis | 05:04 pm | June 18, 2018
Organizations should treat the third-party vendor relationship like a marriage, continuing to assess and manage compliance, Henry Ford Health System’s Privacy and Security Director says.
Data Warehousing
By Bill Siwicki | 10:36 am | June 13, 2018
Hospitals should also expect Blockchain, patient experience and new iteration of vendor neutral archive capabilities.
Analytics
By Mike Miliard | 10:19 am | June 12, 2018
Most healthcare execs are planning to buy AI and IoT technology, but they'll need other capabilities and competencies to ensure they're safely deployed.
Compliance
By Jessica Davis | 12:28 pm | May 25, 2018
In March, the Internet Engineering Task Force approved the Transport Layer Security version 1.
Compliance
By Mike Miliard | 05:37 pm | May 22, 2018
Security organizations just made it easier and more effective for hospitals to deploy and operate the dominant infosec frameworks.