Health systems’ IT priorities for 2018: Cybersecurity technologies, patient-generated data
Many major health systems plan to invest in improved cybersecurity technologies next year. “Cybersecurity improvements are top of mind for health IT […]
10 top health technology hazards for 2018
With 2017 coming to a close, it is time to look ahead to 2018 and the top 10 health technology hazards to […]
Career advice from women leaders proves health IT isn’t a boys’ club anymore
Women in Health IT: Some of the industry’s top women leaders share lessons learned that have helped them succeed in an industry […]
HXG Cybersecurity Series: Multi-Factor Authentication
The Everlasting Issue of Breaches and How We Avoid Them We recently discussed how security breaches affect the healthcare system and the […]
Cloud computing will change the nature of hospital IT shops
Healthcare IT News: Cloud Computing “IDC says cloud services are transforming IT departments into lines of business as they acquire daily operations […]
Automated telemedicine is coming, for everyone
How are you feeling, About automated telemedicine? “When people without health insurance experience suspicious symptoms, they often rely on an internet search […]
EHR satisfaction survey 2017: After years of frustrations, user wish-list turns positive
Electronic Health Records: Surprisingly, Users are Satisfied Overall “CIOs, clinical staff still want better interoperability and ease of use, but the focus […]
Telehealth could lure more providers to ACOs
HealthcareDive Insight “Telehealth and alternative payment models are a natural fit for Medicare. CMS wants to tie 50% of the program’s payments to ACOs […]
Slow breach detection, patching, operational snags handcuff healthcare security
Healthcare IT News – Privacy & Security “When it comes to healthcare security, security experts would rank the industry in the middle or […]
Healthcare is turning a corner on cybersecurity, new HIMSS research shows
Healthcare IT News – Privacy & Security “The sector is now making security a top priority, hiring CISOs, undertaking threat management and penetration […]