11:47 am August 03, 2020
Collaboration tools are undergoing drastic version updates and feature overhauls on a very frequent basis, which force security departments to keep a close eye on upcoming changes to determine whether their standards will still be met.
04:30 pm July 07, 2020
When working with big data, small inconsistencies in data entry matter. Leaving the task of cleaning up registration or demographic data to data scientists or IT staff will be expensive.
01:59 pm February 06, 2017
"Data is the currency of the next century," says Brian Ahier. And nowhere are health data and data management processes discussed, analyzed and examined more than at the HIMSS Annual Conference and Exhibition.
11:16 am February 23, 2016
Last week we all read another sobering account of the disruption that cyber incidents can cause. The ransomware attack at Hollywood Presbyterian Medical Center was despicable in its nature and alarming in it what it says about the overall preparedness of healthcare to deflect these threats.
10:30 am January 27, 2016
One of my all-time favorite Star Trek original series episodes is entitled "The Trouble with Tribbles." In this episode, Captain Kirk urgently races to a space station that's in distress.
10:12 am January 11, 2016
The real enemies of good cybersecurity -- and its closely related cousin, patient safety -- are often intangible: apathy, ignorance and indecision. Not the many threats we face today.
02:04 pm December 04, 2015
In November, CMS updated guidance that previously called for health plans to update provider directories on a monthly basis. Unfortunately for patients, the data is now only required to be updated quarterly.
03:29 pm November 30, 2015
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?