IT Administrators report heightened interest in visibility, configurations, settings, and standards.
The Ohio Department Of Mental Health And Addiction Services (OhioMHAS) has announced a wide-reaching breach to affected patients. By Megan Williams, contributing writer
Even as Big Data has ushered in excited conversations around a future shaped by population health and predictive analytics, the healthcare industry continues to struggle with challenges around interoperability, data silos, security, and other concerns. By Megan Williams, contributing writer
A new set of cryptographic standards released by the NIST could impact practices around healthcare data encryption.
The regulatory environment in healthcare is becoming increasingly complex, but healthcare organizations are still managing to keep up. Unsurprisingly, this has created an environment where compliance with regulations frequently takes precedence over actual security.
0 transaction fees, mobile management app, and employee schedule top desired features.
Your clients interested in patient engagement and HCAHPS scores should make note of Apple’s most recent middleware announcement, Apple CareKit. The new software framework is designed to facilitate the development of apps that aid patients in actively managing their medical conditions.
The above headline was used 30 years ago for the “From The Editor” in the first issue of Business Electronics magazine. In Robert Mueller’s article, the editor and associate publisher wrote that the office automation industry had experienced many changes, with many more to be expected.
If any of your healthcare clients aren't using EMV payment systems, they might be at risk for enormous fraud bills.
The poor state of security at CMS’ Federal Data Services Hub has been revealed in a report released March 23. According to FierceGovernmentIT, the report included the surprising announcement that Healthcare.gov was victim to 316 security incidents over a 17-month period. While the GAO is still concerned about the technical controls used to protect information that flows in and out of the site and to federal partners’ data systems, they are reporting that none of the incidents resulted in systems being compromised or any sensitive data being leaked.