Healthcare IT News Blog

July 01, 2015 | John Halamka
Every leader is different and working for them requires an understanding of their preferences. John Halamka, MD, shares his advice on thriving in complex hierarchical... More

Recent Posts

July 01, 2015 | Jeff Peters
A robust data repository, or a health information exchange, can be the linchpin in sharing information across the care continuum and different care settings. Those... More
June 26, 2015 | Adam Winn
The equipment used in hospitals is often not user-serviceable and therefore often running out-of-date software or firmware. This creates a dangerous situation where... More
June 25, 2015 | Gary Glover
To reduce opportunities for hackers to succeed, healthcare entities must be proactive about protecting sensitive data across their organization. Security must be an... More
June 25, 2015 | Jeff Rowe
Fifty states plus the feds makes 51 sets of privacy rules many healthcare organizations have to take into account as they manage their digital information. More
June 23, 2015 | Rick Kam
Everyone involved in healthcare needs to know their responsibilities with regard to privacy and security, because everyone is potentially held accountable by customers,... More

Featured Bloggers

COO, HIMSS Analytics

HIMSS Analytics

Medicity

Editor, ICD10Watch

Christina's Considerations

Medsphere Systems Corporation

Contributing Writer

CareGroup Health System, Life as a Healthcare CIO

Chilmark Research

Director, Center for Connected Health

Healthcare Standards

CISO, FireHost

June 17, 2015 | Christy Erickson
With the Oct. 1, 2015, deadline fast-approaching, is your organization ready for ICD-10? Here's a quick readiness assessment to benchmark where you are -- and where... More
June 15, 2015 | Steve Reinecke
Electronic health records are altering nearly every aspect of the caregiver-patient relationship -- not to mention changing caregivers' workflows with omnipresent... More
June 11, 2015 | Irv Lichtenwald
Looking to dupe urbanite travelers, bartenders and bar owners in rural Western taverns sometimes fasten antelope horns to the head of a large jackrabbit, and mount it... More
June 10, 2015 | Scott Rea
Securing patient data starts with encryption, but equally important is the use of strong identity authentication. Authentication guarantees that the sender and recipient... More
June 08, 2015 | Bob Chaput
What used to be viewed as an operational issue is now a trustee responsibility because of the likelihood of lawsuits following a data breach. Boards across the U.S. want... More