Health Innovation

How to Respond to a Stolen Device

By Steve Spearman – When we look at all of the high profile HIPAA breaches that happened in the past year, it’s easy to think that HIPAA breaches only happen at large practices, or at least that they only happen to other large practices. it’s easy to think that a security breach cannot happen to your practice until after the breach has happened.



As Health IT Matures, Security Approaches Must Mature With It

By Irv H. Lichtenwald – Not that long ago, healthcare worried mostly about the physical loss of personal health information (PHI) by way of a lost thumb drive, a stolen laptop, some misplaced paper files. These were the primary concerns in HIMSS initial 2008 security survey.
Five years later, the largest healthcare security breaches came from cyber attacks not lost or stolen devices.





EHR Incentive Programs

By Andy Slavitt & Karen DeSalvo – As we mentioned in a speech previously, the Administration is working on an important transition for the Electronic Health Record (EHR) Incentive Program. We have been working side by side with physician organizations and have listened to the needs and concerns of many about how we can make improvements that will allow technology to best support clinicians and their patients.


Effectively Maintain Your Legacy System During the Chaos of an Install

By Paul Allen – Resources are limited, funds are limited, and time is invaluable. What should an organization do to maintain their legacy system during the installation of a new system? It’s impossible to ignore the compliance, patient service needs, and required enhancements to your current system. What should you consider to remain compliant? What can be done to make the go-live more productive and seamless?