Skip to main content

Privacy & Security

Data Warehousing
By Jessica Davis | 05:21 pm | July 13, 2018
A breach in financial services, the second most expensive sector, costs only half of what hospitals wind up spending.
Privacy & Security
By Mitchell Parker | 09:52 am | July 13, 2018
The final in a four-part series maps out ways to get radio frequency identification tools right and what health org’s should expect to do, even when vendors claim “no IT involvement.”
IT Infrastructure
By Jessica Davis | 04:07 pm | July 12, 2018
The newest variant of the prolific ransomware forms this year has been updated to include a stolen National Security Agency exploit.
Revenue Cycle
By Bill Siwicki | 11:21 am | July 12, 2018
Healthcare executives need to track these three key technology advancements to keep pace with coming changes.
IT Infrastructure
By Mitchell Parker | 10:48 am | July 12, 2018
The third in a four-part series outlines the path to secure radio frequency identification.
Electronic Health Records
By Jessica Davis | 04:21 pm | July 11, 2018
Emergency and stroke patients are still being diverted to ensure patients receive the best possible care, but the Missouri health system remains fully operational thanks to its prepared incident response plan.
Analytics
By Bill Siwicki | 03:18 pm | July 10, 2018
APIs, automation, blockchain along with mobile and medical devices will enable a new era of learning networks capable of adapting to deliver faster innovation.
IT Infrastructure
By Mitchell Parker | 11:08 am | July 10, 2018
The second in a four-part series looks at what healthcare providers need to do when implementing radio frequency identification because it’s not secure enough on its own.
Data Warehousing
By Bill Siwicki | 02:18 pm | July 09, 2018
Shivom has created what it calls a Unique Global Genome ID, designed to allow providers and researchers to more easily work with precision data and give patients ownership of their genomic information.
IT Infrastructure
By Jessica Davis | 02:02 pm | July 09, 2018
Hackers hijacked an employee email account and diverted emails sent to the account to another account for which the county did not have access.