By Chase Higbee – Internet-connected devices have changed the world we live in. It has changed the way we shop, the way business is done, how we provide healthcare, and even how we communicate with one another. Some argue it has made the world a lot smaller and built a global community with the ability to instantaneously communicate around the planet.Read More
By Marty Puranik – Throw on any spy movie from years ago and you are guaranteed to get a scene where a code is being written or cracked in some clever manner. While ciphers, lemon juice as invisible ink, and number coding are fun, these methods are easily revealed.
Companies are seeking talent for the fastest growing industries in tech and healthcare is on the top of the list. Who is looking for what? Here are posted opportunities being reported from Atlantic.Net, DrFirst, Medicomp, & AZHealthCurrent.
If you haven’t seen our white paper resources yet, these are a good place to start. Here are the most popular of 2019.
Business news from ClearData, Atlantic.Net, NextGate, RevSpring, Vocera Communications, Inc., HealthEC, Rhinogram, Drawbridge Health, Verato Inc., and more.
The challenges of cybersecurity in healthcare are continuing to be top stories this year. Here are some resources and thoughts from thought leaders in the industry on helping with these challenges.
By Marty Puranik – While the majority of HIPAA violations involve electronic data breaches, the HIPAA Security Rule requires that healthcare providers and business associates implement “physical safeguards for all workstations that access ePHI to restrict access to authorized users.”
Companies are seeking talent for the fastest growing industries in tech and healthcare is on the top of the list. Who is looking for what? Here are posted opportunities being reported from Kuma, Medicomp, Atlantic.Net, & Wolters Kluwer.
By Marty Puranik – Especially given the Breach Notification Rule, the requirement to send out notifications to patients and other parties following compromise of your healthcare information defenses, it is important to think specifically about what a breach is and how likely ones of different types are to occur.