Data Warehousing

healthcare accessing public wifi
By Mike Miliard 02:56 pm April 20, 2017
Dell survey finds connecting to public Wi-Fi to access confidential information, using personal email for work and widespread use of public cloud services also pose risks to health information.
employees greatest cybersecurity risk
By Bill Siwicki 02:43 pm April 18, 2017
Nearly 80 percent of executives said employee security awareness is their greatest concern. And that’s despite 85 percent indicating they have existing security awareness programs, a new Level 3/HIMSS Analytics study finds.
By Bill Siwicki 02:02 pm April 18, 2017
Cybersecurity has become an enterprise-level risk in healthcare and should be managed like one, CynergisTek says.
how blockchain works
By Mike Miliard 12:25 pm April 13, 2017
To say the technology is advanced is an understatement, but hospitals should understand the reasons that it’s getting so much attention.
cybercriminals malware OLE packages
By Bill Siwicki 09:27 am April 13, 2017
Cybercriminals increasingly are using object linking and embedding packages though healthcare executives have options to fight them.
Tressa Springmann

Tressa Springmann, senior vice president and CIO, information services at LifeBridge Health.

By Bill Siwicki 12:36 pm April 12, 2017
LifeBridge Health CIO says back-and-forth about data dashboards, tools and structure needed to chart a solid plan for value-based care.
NIST cybersecurity

The MAIN STREET Cybersecurity Act, introduced by Sen. Brian Schatz, D-Hawaii, left, and supported by Sen. John Thune, R-South Dakota, was passed to protect digital assets that could greatly benefit small and medium healthcare providers.

By Jessica Davis 01:36 pm April 07, 2017
If passed, the law would help small- and medium-sized healthcare providers that often have constrained security budgets.
ONC health data provenance challenge

Steven Posnack, director of ONC's Office of Standards and Technology, has launched the challenge because the integrity of health data requires having a way to trace and verify the source of information and how it's been altered throughout its lifecycle.

By Mike Miliard 12:45 pm April 07, 2017
The contest seeks better ways to determine where data has come from, and whether it's reliable and trustworthy.
By Jessica Davis 12:05 pm March 27, 2017
Urology Austin, a healthcare provider with locations throughout central Texas, began notifying its patients March 24 that hackers may have accessed patient records that included names, dates of birth, addresses, medical information and Social Security numbers.
By John Andrews 10:32 am March 27, 2017
Artificial intelligence and machine learning are fast accelerating the insights that can be gleaned from the granular descriptions enabled by ICD-10.

Most Read

The Daily Brief Newsletter