The transition from paper-based to electronic medical records continues to create challenges for the health care industry. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk. IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected.
In practice, security, compliance and privacy requirements often create barriers to technology adoption, which sacrifices convenience and productivity, frustrates caregivers and, ultimately, detracts from patient care. For instance, clinicians are typically prohibited from using smartphones, text messaging and other modern forms of communication due to the perceived security risks. As a result, the use of pagers and other outmoded technologies continues as the status quo.
To quantify the economic and productivity impact of the continued use of outdated communication technologies in health care, the Ponemon Institute and health care IT security company Imprivata recently surveyed 577 health care professionals for a report titled “The Economic and Productivity Impact of IT Security on Healthcare.” Overwhelmingly, respondents agreed that communications tools currently in use decrease productivity, increase patient discharge time and limit the time doctors have to spend with patients, collectively costing U.S. hospitals more than $8.3 billion annually. Dr. Sean Kelly, chief medical officer at Imprivata and physician at Beth Israel Deaconess Medical Center in Boston, dissects the key findings of the Ponemon study and why U.S. hospitals are continuing to lose billions every year.
While cyber crime continued to dominate headlines and wreak havoc on organizations of all sizes across nearly every industry in the first half of 2014, it's refreshing to note law enforcement also stepped it up. ... More >>
The patches released by Microsoft for the August Patch Tuesday include nine bulletins (two critical and seven important) and cover 38 CVEs. ... More >>
Here are five steps organizations and individual users should take now to protect their most sensitive password-protected information. ... More >>