Data Hides From Your Meaningful Use Risk Analysis
Is Your Meaningful Use Risk Analysis Complete? By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting EHR System – The Tip of the Iceberg Many times during…
Read MoreIs Your Meaningful Use Risk Analysis Complete? By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting EHR System – The Tip of the Iceberg Many times during…
Read MoreDo You Know Your Stuff? What do you know about HITECH, HIPAA, or ACA? Here are some quizzes that will test your knowledge or correct…
Save $ 1,699,900 with Encryption By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting A state health department lost an unencrypted hard drive and paid a $…
Current Certification Criteria are Overly Burdensome By John Halamka, MD As stakeholders in payer, provider, and government communities debate the optimal timing of ICD10, Meaningful…
How Strong is Your HIPAA Compliance? By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting The Meaningful Use program can help offset technology costs or could cost…
EHR in the Cloud! A Smart Data Approach that can Avoid Major Storms By Ed Rubinstein, Senior Sales Associate, VersaForm Systems As someone who has…
What it really means to maintain BA HIPAA compliance By: Tod Ferran, CISSP, QSA Follow him on Twitter @TodFerran During the last few months of…
Cybersecurity Needs Health Sector Input Seeking: Health sector input into The National Institute for Standards and Technology’s (NIST) national voluntary framework for improving cybersecurity Target…
HIPAA Security Rule – Addressable, not Optional! By Mike Semel Blog: 4Medapproved.com/HITSecurity Twitter: @SemelConsulting Everyone complains that the HIPAA Security Rule is inconvenient— which it…