Five roles to develop and four rules to follow for effective and secure data governance in the age of AI, analytics, pop health and precision medicine. Data governance is one of the foundational must-dos for any health system looking to innovate its strategies to drive operational efficiencies, boost quality improvement, optimize population health management or
Plaintiffs in a class action suit against Premera Blue Cross allege the company willfully destroyed a computer that may have shown that attackers actually removed
The 2018 Gartner Information Security & Risk Management Summit covers cyber security, risk management, information security, cloud technology, and more. Learn about the event!
A new framework aims to improve patient safety and data integrity by helping healthcare entities to more consistently and accurately match patients with all their information, Kirk Botula and Melanie Mecca of the CMMI Institute, explain. The organization developed the Patient Demographic Data Quality framework with federal regulators. The recently released framework to improve patient
Google has a new way to safeguard your online accounts. Here’s how the program works, and why it may (or may not) be a better security choice for you.
Tech attacks have become even more common in recent months for healthcare organizations and hospitals. In fact, hundreds of thousands of computers and systems have been brought down by ransomware, and this trend is poised to continue. Cyberattacks like WannaCry have exposed vulnerabilitiesin many operating systems that must be addressed by IT departments. For hospitals,
Roy Jacques, M.D., in April 2016 was convicted of one count of conspiracy to commit healthcare fraud, eight counts of healthcare fraud, two counts of making a false statement relating to healthcare matters and one count of obstruction of justice, the Department of Justice notes in a statement about the sentencing. Roy has been in
The vulnerability in Windows Search service could let a hacker take complete control over a server or workstation and leverage worm-like spreading capabilities like those found with WannaCry. Microsoft released its August 2017 patches on Tuesday, which fixed 48 security flaws in six of the company’s main products. While 25 were rated critical, one is
A cyberattack does not occur spontaneously for it requires some planning and preparation. These attacks make use of a variety of techniques, including methods of social engineering, and they are prepared stealthily and a long time in advance, says IT security expert Stefan Rass, associate professor at the Institute for Applied Informatics (InfAI), Alpen-Adria-Universität Klagenfurt
Health care is a data-intensive industry. Technological advances have allowed healthcare organizations to use real-time data visualizations to improve their reporting capabilities and response times. Considering that 2.5 quintillion bytes of data are produced every day, the issue clearly isn’t going away. In this guest post, Wendy Schott, CMO of a data stream network delivering