to learn more about dhouldin, share content, and exchange messages and invites.
Not a member? Join Now!
to create and rate content, and to follow, bookmark, and share content with other members. Not a member? Join Now!
Healthcare IT is moving away from the top down, “command and control” model of 10 years ago. Back then, IT provisioned all devices and the mobile device environment was more homogeneous, strongly managed a... Preventing Future Healthcare IT Infections by Strengthening Your Security Immune SystemBack When security technologies are introduced together with usability improvements in healthcare solutions they have a much greater chance of being approved and winning acceptance by healthcare workers. This is in contras... Usability and Security: Two Key Ingredients in a Healthy Solution RecipeBack The benefits of analytics in healthcare are compelling, and big data is fueling this with increasing quantity and quality of patient data with potential to enable major improvements in evidence based medicine,... Secure Healthcare Analytics in the CloudBack In a 2013 HIMSS global security survey of 674 frontline healthcare workers (Workarounds in Healthcare, a Risky Trend), too many layers of login was cited by 36 percent as a key driver compelling the use of risky worka... Improving Healthcare Solution Usability with Single Sign-OnBack Evernote says security has been breached by hackers. Dropbox password breach highlights cloud security weaknesses. These recent headlines are just two in a long list of examples of popular apps being compromised, putt... Enabling Healthcare with Apps – and Managing the RisksBack Healthcare workers are increasingly being empowered with many powerful technologies, from BYOD, to social media, texting, and even personal email and USB sticks that have been around for a while. These tools provide n... Workarounds in Healthcare: A Risky TrendBack In my last blog, What Types of Workarounds Are Your Healthcare Workers Using?, I explored the types of tools healthcare workers are using to circumvent solutions or security that gets in the way, driving non-c... Are Healthcare Workers Aware of Workaround Security Risks?Back In my last blog, What is Driving the Use of Risky Workarounds in Healthcare?, I explored the reasons why frontline healthcare workers are using workarounds that are out of compliance with policy, drive increased priva... What Types of Workarounds Are Your Healthcare Workers Using?Back In my last blog, I discussed the extent to which healthcare workers are doing workarounds to get their jobs done, using personal smartphones, tablets, laptops, USB keys, apps, email, texting, social media and ... What is Driving the Use of Risky Workarounds in Healthcare?Back In my last blog, I mentioned a global survey of frontline healthcare workers completed January 2013 by HIMSS and Intel on what motivates the use of workarounds, what types of workarounds are being used, and where ther... Are Workarounds Putting Your Sensitive Healthcare Data at Risk?Back We spend a lot of time and attention analyzing vulnerabilities with specific endpoint devices or cloud platforms, which is warranted, but often not the most significant source of privacy and security risk. Hea... What Cloud is Your Healthcare Data In?Back Breaches resulting from lost or stolen electronic medical record (EMR) servers or backups are usually less likely than breaches from loss or theft of mobile devices. However, searching on “server” or ̶... Avoiding EMR Server and Backup BreachesBack Healthcare and Life Sciences are currently challenged with multiple major trends including EHR, HIE, BYOD IT (Bring Your Own Device – Information Technology), Big Data IT, social media, advanced threats, and inc... Data Security in Healthcare: A Foundational ApproachBack Healthcare workers are being empowered by several key trends. BYOD (Bring Your Own Device), also known as consumer IT, is widely believed to be the future of IT. Social media and social networking are also empowering ... How to Prevent Health IT Security WorkaroundsBack Risk assessments are often driven by regulations such as HIPAA Security Rule, incentives such as Meaningful Use (see Core Objective 15) or compliance with standards such as ISO 27001 for Information Security Managemen... Improving Your Healthcare Organization’s Security PostureBack Global health reform includes reducing the cost of health to patients. As part of this, healthcare organizations need to reduce costs, including IT cost reduction. Healthcare organizations must make a tradeoff and ach... Maximizing the Value of Risk Management in HealthcareBack Healthcare workers are under cost reduction and time pressure, working to deliver improved patient care with less time and resources. Privacy and security are generally recognized by healthcare workers as important, ... Healthcare User Experience, Compliance and RiskBack Consumer IT is a key and growing component of the future of IT in healthcare. This trend is also known as the Consumerization of IT, or BYOD (Bring Your Own Device), and involves healthcare workers globally, and at al... Consumerization of IT in Healthcare: Why You Should Not 'Just Say No'Back