White Papers

09:47 am February 21, 2017
How can you succeed under new value-based reimbursement (VBR) models? For starters, healthcare systems must document and code full patient acuity, not just conditions treated during a visit, in order to represent a patient's true health risk.
Sponsor:
3M
09:43 am February 21, 2017
CMS is moving aggressively to shift healthcare payments towards value-based payment models. How do hierarchical condition categories (HCCs) affect reimbursement for health systems and physicians? What are best practices for accurately capturing HCCs?
Sponsor:
3M
05:23 pm February 15, 2017
For nursing leaders: A look at how hospitals can leverage interactive technology and processes to improve the patient experience and reduce preventable readmissions.
Sponsor:
Sonifi Health
05:21 pm February 15, 2017
How hospitals use existing coaxial cable to deliver interactive patient care and hospital system integration.
Sponsor:
Sonifi Health
10:59 am February 13, 2017
Unfortunately, many of today’s strategies fail to create a compelling case for action, undermining the CISO’s support and credibility. These six steps create an effective security strategy linked with key business interests and success factors.
Sponsor:
Armor
10:56 am February 13, 2017
Balancing security and compliance requires a proactive strategy, starting with an understanding the importance of HIPAA compliance, surmising possible threats, and formulating policies that protect data while conforming to the necessary regulations.
Sponsor:
Armor
10:29 am February 13, 2017
To avoid regulatory fines and a damaged reputation, healthcare organizations turn to a compliance checklist. But that alone doesn't ensure proper security. This whitepaper focuses on safeguarding sensitive data, the intention behind the regulations.
Sponsor:
Armor
10:23 am February 13, 2017
The Office of the National Coordinator (ONC) for Health IT found through a study that privacy and data loss are very much on patients’ minds--and those attitudes have the potential to impact both treatment outcomes and organizational reputations.
Sponsor:
Armor
10:08 am February 13, 2017
Compliance alone does not guarantee that a sufficient security program is in place. This paper shows how to conduct internal risk management processes that determine which security controls are necessary to protect the sensitive data they hold.
Sponsor:
Armor
10:01 am February 13, 2017
When your organization is leveraging multiple clouds to power and scale data, services and applications, it's time to evaluate your approach to instant/virtual machine (VM) security, through vulnerability mitigation and attack detection methods.
Sponsor:
Armor

Most Read

The Daily Brief Newsletter