The Infrastructure Adoption Model: Identifying Your Leaky Pipes

It All Starts With Plumbing. Electronic Health Records, population health, data analytics, telemedicine, and other healthcare technology initiatives are directly reliant on the agility, security, and operational efficiency of the technical infrastructure on which it sits. Planning for future scalability takes strategic and tactical know-how. And to benchmark where a health system is on its…

A Big Hack or Big Hack Job?

Explosive news accounts based on anonymous sources are easy targets in this era of “fake news.” Usually reserved for partisan political debate, it’s unusual for such a charge to be leveled at a legitimate news organization for coverage of the technology industry. But Bloomberg Businessweek finds itself in the crosshairs and in this case, the…

Falling Short: Predictive Analytics and Healthcare Security

VertitechIT Executive Project Officer and IT security/HIPAA compliance consultant Teresa Grogan says many healthcare institutions are employing a “set it and forget it” mentality when implementing predictive analytics technology to fight cyber threats. She says that practice is a shortcut that will come back to haunt them. In an interview with Healthcare Info Security, Terry…

IoMT: Keep Up or Clean Up

When your smart thermostat fails, your home may get a little overheated. The breach of a security camera might result in a break in or a stolen package off the front porch. But failure of an Internet-connected heart monitor or the hacking of a device configured to remind an elderly patient to take their hypertension…