09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
01:21 pm October 29, 2015
In 2015, it seems like barely a month goes by without another report of a data breach suffered by a healthcare organization exposing personal information about patients or employees. Here's to a better 2016.
08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
10:36 am August 25, 2015
Facing a new EHR implementation is like facing the bogeyman of health IT. Transition to a new system can be a nightmare. But as technology advances, such a move can be a necessity. These folks can help.
09:12 am August 12, 2015
Given that healthcare organizations must sometimes exchange sensitive patient data with external parties, how can they ensure that this is done safely, protecting patient privacy and complying with HIPAA requirements?
09:26 am July 30, 2015
The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate threat in most security incidents is failure to comply with regulatory requirements.
01:58 pm July 21, 2015
As providers gain value from the digital revolution, most can't reach ultimate integration nirvana due to data silos and disparate systems. Data virtualization enables hospitals and health systems to create a more agile information architecture.
11:37 am July 13, 2015
As more healthcare organizations employ cloud software-as-a-service solutions to leverage their elasticity, scalability and ease-of-access, questions arise as to how these systems actually work and whether their effectiveness and feasibility translates into tangible investment potential.
10:28 am July 07, 2015
Many organizations do a decent job of limiting access to data and systems for their general user population. When it comes to privileged access, however, most simply attempt to limit who has this type of access without considering some inherent risks.