Skip to main content

Network Infrastructure

IT Infrastructure
By Jessica Davis | 02:03 pm | May 18, 2018
MedEvolve, a practice management software vendor, left its FTP server open to the public without the need for a login.
IT Infrastructure
By Jessica Davis | 04:07 pm | May 11, 2018
From legacy infrastructure to potential medical device hacks, some of the industry’s leading voices opened up about how the industry can begin to combat the inevitable breach.
Electronic Health Records
By Tom Sullivan | 10:40 am | May 09, 2018
Regulations are different internationally and electronic health record systems made in America are too pricey for the rest of the world.
Compliance
By Jessica Davis | 02:47 pm | May 08, 2018
Inspector general says Defense Health Agency sites failed to consistently implement technical, physical and administrative protocols and may have violated HIPAA regulations in the process.
Interoperability
By Bill Siwicki | 03:08 pm | May 02, 2018
Organizations said they will advance testing of a secure digital ID proof-of-concept program that is designed to reach millions of consumers, while Trusted Key also announced a $3 million round of funding.
IT Infrastructure
By Jessica Davis | 04:01 pm | May 01, 2018
The planned update is just the latest move to improve the National Health Services since WannaCry.
IT Infrastructure
By Jessica Davis | 03:27 pm | April 26, 2018
Hackers hit the IT vendor of three Center for Orthopaedic Specialists locations in February, which locked out users and encrypted patient data.
IT Infrastructure
By Jessica Davis | 01:41 pm | April 25, 2018
MEDantex left a portion of its customer portal open to the public after it rebuilt its site due to a ransomware attack.
Electronic Health Records
By Leontina Postelnicu | 11:12 am | April 25, 2018
BJ-HC speaks to James Rawlinson, The Rotherham NHS Foundation Trust Director of Health Informatics, about the new Electronic Patient Record (EPR) Infrastructure upgrade.
Analytics
By Mike Miliard | 10:20 am | April 24, 2018
Artificial intelligence-powered threat detection and response can be very valuable – as long as it's researched and deployed with care and planning.