The search found 3760 results.
Blog
An increasing number of hospitals are finding value providing iPads for inpatient use. During the current COVID-19 pandemic, many hospitals are severely limiting visitors.
Press
Increased Demand for Convenient and Secure Access to Patient Data Cited as Driving Force
News
As an emergency room physician at a Boston teaching hospital, I see the devastation the opiate epidemic wreaks on families and communities. As the chief medical officer of a healthcare technology company, I know what a powerful weapon technology can be in fighting this scourge. But while policymakers are responding to the epidemic, they may not be using all of the technology tools at their disposal.
Blog
There’s a lot of discussion around meaningful use, its definition and how organizations can obtain the government incentives that recent legislation promises. However, in the dash for these types of healthcare IT investment reimbursements, one must not overlook the role of security risk in satisfying compliance requirements.
Blog
The HITECH Act, HIPAA, as well as mandates from State regulations (e.g. Massachusetts 201 CMR 17.00), are raising the minimal requirements that organizations such as healthcare-covered entities and business associates must implement to prevent unauthorized access. Further, the Connecticut Attorney General’s lawsuit against Health Net of Connecticut for failing to secure approximately 446,000 enrollees’ Protected Health Information (PHI), and to notify State authorities and enrollees of a security breach, is a reminder that breaches are not just a risk to information, but a risk to the organization.
Blog
Salesforce Security Architect and former author of the Verizon Data Breach Investigations Report Kevin Thompson offers key insights from the 2020 DBIR.
Blog
Healthcare data breaches are increasing exponentially year after year, and it doesn’t seem like they’re going to slow down any time soon. It’s important for healthcare IT professionals to take steps to safeguard their systems, whether that means protecting against external threats posed by hackers and cyber criminals or securing internal threats that come from access abuse from internal users.