Data Warehousing

By Dan Costantino 11:47 am August 03, 2020
Collaboration tools are undergoing drastic version updates and feature overhauls on a very frequent basis, which force security departments to keep a close eye on upcoming changes to determine whether their standards will still be met.
By Sharon Taylor 04:30 pm July 07, 2020
When working with big data, small inconsistencies in data entry matter. Leaving the task of cleaning up registration or demographic data to data scientists or IT staff will be expensive.
By Brian Ahier 01:59 pm February 06, 2017
"Data is the currency of the next century," says Brian Ahier. And nowhere are health data and data management processes discussed, analyzed and examined more than at the HIMSS Annual Conference and Exhibition.
By Mac McMillan 11:16 am February 23, 2016
Last week we all read another sobering account of the disruption that cyber incidents can cause. The ransomware attack at Hollywood Presbyterian Medical Center was despicable in its nature and alarming in it what it says about the overall preparedness of healthcare to deflect these threats.
security
By Aaron Miri 10:30 am January 27, 2016
One of my all-time favorite Star Trek original series episodes is entitled "The Trouble with Tribbles." In this episode, Captain Kirk urgently races to a space station that's in distress.
By Mac McMillan 10:12 am January 11, 2016
The real enemies of good cybersecurity -- and its closely related cousin, patient safety -- are often intangible: apathy, ignorance and indecision. Not the many threats we face today.
By Torben Nielsen 02:04 pm December 04, 2015
In November, CMS updated guidance that previously called for health plans to update provider directories on a monthly basis. Unfortunately for patients, the data is now only required to be updated quarterly.
By Chris Bowen 03:29 pm November 30, 2015
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
By Rick Kam 09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
By Chris Bowen 10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?