Skip to main content

Privacy & Security

Cybersecurity
By Corinne Smith | 12:15 pm | October 10, 2018
As HIPAA was written when most providers still used paper charts, the framework today has plenty of room for improvement.
Data Warehousing
By Jessica Davis | 10:38 pm | October 09, 2018
A hacker obtained access to an employee email account of California-based Gold Coast Health Plan, attempting to fraudulently move funds to their account.
Compliance
By Jessica Davis | 03:09 pm | October 09, 2018
Part two of our cyber insurance series highlights the need for healthcare organizations to compare prices and find a carrier willing to partner on cybersecurity.
Patient Engagement
By Jessica Davis | 05:36 pm | October 08, 2018
What if the challenge to overcome with data sharing was the policies common among hospitals? A new study published in JAMA Network Open found just that: Patients are facing many hurdles when they request to receive their records from hospitals.
Cybersecurity
By Leontina Postelnicu | 12:13 pm | October 08, 2018
As compliance continues to be a point of concern, we take a look at the implications of GDPR for UK health and care.
Analytics
By Tom Leary | 09:41 am | October 08, 2018
Tom Leary highlights milestones made during the annual event and looks at this year’s NHITWeek points of engagement.
Analytics
By Tom Sullivan | 08:30 am | October 08, 2018
NHITWeek 2018 moves beyond proving the value of HIT to focus on showing successes of using information and technology.
IT Infrastructure
By Jessica Davis | 05:22 pm | October 05, 2018
The healthcare sector is well-aware that medical devices are vulnerable, but it’s hard to obtain the extra resources to fix the issue.
Privacy & Security
By Mike Miliard | 11:24 am | October 05, 2018
A new CHIME-KLAS survey of CIOs, CISOs and other security leaders finds that few are confident in their ability to protect patient safety and prevent disruptions from cybercriminals.
Cybersecurity
By Dan Costantino | 10:42 am | October 04, 2018
Penn Medicine CISO Dan Costantino outlines the steps to gathering information so you can plan strategically and educate the business about threats.