This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The following is a guest article by Chris Bowen, Founder and CISO at ClearDATA The recent Cybersecurity concept paper from HHS, while a gesture towards progress, falls critically short of what’s imperative in today’s climate. Here I agree – we can use all the help we can get.
Welcome to our Healthcare IT Today Weekly Roundup. Each week, we’ll be providing a look back at the articles we posted and why they’re important to the healthcare IT community. NextGen’s Investments in Mobile, Cybersecurity, and Interoperability. Read more… A Guide to Proactive HealthcareCybersecurity.
The following is a guest article by Heather Randall, PhD, Chief Compliance Officer at TrustCommerce Regardless of whether the information is clinical, financial, or demographic, patients are increasingly worried about the possibility that their personal data could be compromised.
When it comes to cybersecurity, it is important for organizations to take a proactive approach and implement strong safeguards to protect against potential threats. Healthcarecybersecurity refers to the measures and practices put in place to protect sensitive data and systems within the healthcare industry.
Welcome to the weekly edition of Healthcare IT Today Bonus Features. This article will be a weekly roundup of interesting stories, product announcements, new hires, partnerships, research studies, awards, sales, and more. The bad news: Organizations face multiple challenges in collecting, coding, and using SDOH data.
Welcome to the weekly edition of Healthcare IT Today Bonus Features. This article will be a weekly roundup of interesting stories, product announcements, new hires, partnerships, research studies, awards, sales, and more. Payment integrity vendor Apixio launched HealthData Nexus.
Welcome to the weekly edition of Healthcare IT Today Bonus Features. This article will be a weekly roundup of interesting stories, product announcements, new hires, partnerships, research studies, awards, sales, and more. ZeOmega integrated its Jiva SDOH Social Care solution with Microsoft Cloud for Healthcare.
Welcome to our Healthcare IT Today Weekly Roundup. Each week, we’ll be providing a look back at the articles we posted and why they’re important to the healthcare IT community. Read more… Working Together for Stronger HealthcareCybersecurity. Legislation and policymaking are a black box for most people.
The following is a guest article by Justin Kozak, Life Sciences Specialist at Founder Shield In an era where digital innovation drives healthcare forward, healthtech companies are at the forefront of a double-edged sword. The sector’s unique vulnerabilities stem from the highly sensitive nature of healthdata.
The following is a guest article by Shawn Fergason, Senior Vice President of Information Technology and Technology Services at MediQuant Securing healthcaredata archiving is not just good practice – it’s essential for safeguarding confidential patient information and should be a cornerstone of a healthcare organization’s cybersecurity program.
The following is a guest article by Dr. Sriram Rajagopalan , Enterprise Agile Evangelist at Inflectra Today’s most significant risk regarding security and privacy issues in health services is consumers’ need for more awareness of personal health information. What do I mean?
The following is a guest article by Matt Murren, Co-Founder and CEO at True North Modern healthcare groups depend on dozens of vendors, from EHR and other software companies to imaging services and medical device manufacturers. This wave of venture capital crested in 2021, according to Rock Health’s Market Insights Report.
The following is a guest article by Anthony Murray, Chief Interoperability Officer at MRO In the ever-evolving landscape of healthcare, the quest for interoperability has become paramount. While the vision of seamless data exchange promises improved patient care and streamlined operations, the journey is not without its hurdles.
Everyone in the industry has a shared responsibility to maintain security standards, keep healthdata safe, and keep it moving. Moreover, employee training on cybersecurity best practices, including the use of strong passwords and recognizing phishing attempts, is vital to safeguard against cyber threats.
As the cellular chips get much lower and lower cost, all devices are going to be integrated with cellular to truly enable home healthcare. Brian Golumbeck, HealthcareCybersecurity Leader at Optiv We believe that securing AI is the second thing in line behind AI. We could not do this without your support.
The following is a guest article by Chad Peterson, Managing Director at NetSPI As ransomware attacks become more sophisticated, healthcare organizations have become desirable targets due to the valuable data shared across medical records and the constant need for service availability.
The following is a guest article by Bruno Kurtic , Co-Founder, President, and CEO at Bedrock Security It’s becoming increasingly evident that the U.S. BIOSECURE Act will soon become the law of the land. Unlike exposed passwords or credit card numbers, for example, a person’s genetic code never changes.
We organize all of the trending information in your field so you don't have to. Join 48,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content