Executive Briefs | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

Executive Briefs

  • Executive Brief: The C-Suite Battle Plan for Cyber Security Attacks in Healthcare

    “If you know your enemy and you know yourself, you need not fear the result of a hundred battles.”  ― Sun Tzu, The Art of War

    The Best Leaders Never Fail to Identify, Consider, and Protect Their Weakest Links…

    The key to your defensive strategy lies in your ability to understand the unique needs of your organization and your ability to observe and manage your employee behaviors and clinical workflow needs in an insightful way: a way that works for them, not against them.

  • Secure SaaS, Safe Patients: How to Move to the Cloud

    Take Keys Steps to Securing SaaS Apps in Healthcare

    Hospitals and health systems are struggling with the pace of change that a disruptive technology platform like SaaS brings to information security. “Three years ago,” says Bitglass’ SVP, Rich Campagna, “most healthcare organizations were unaware of SaaS as an option. Today they have a general discomfort to moving from their data center to the cloud. They can’t hug it. It’s a fair concern.”

  • Research Report—IT Service Innovation in The Healthcare Industry: The Mobile Opportunity to Use Information and Technology to Optimize Care Delivery Processes

    “Having capabilities that help to make better decisions about a patient available in a mobile format can be very powerful and improve quality of care and lower error rates.”

    The healthcare industry’s dependence on the availability and reliability of information can be a matter of life and death. Patient centricity is a key trend in the provisioning of healthcare and has contributed to steady growth in these areas:


  • NOT IF BUT WHEN: Preventing the Next Generation of Security Attacks in Healthcare

    Over the past few years, healthcare organizations such as New York-Presbyterian Hospital and Columbia University, Cignet Health, and Blue Cross Blue Shield of Tennessee have paid millions of dollars in data breach settlements. But the costs go far beyond those fines. Blue Cross Blue Shield Tennessee estimates it paid out over $17 million in “investigation, notification, and protection efforts” after its breach caused by the theft of unencrypted hard drives.

  • Telehealth Rising: Practical Insights and Strategies for Success

    While barriers still stand in the way, remote patient monitoring and virtual visits are finally starting to get healthcare providers’ attention.

    According to Neal Ganguly, CIO of JFK Medical Center in Edison, N.J, “There’s a heavy, consumer convenience-driven wave that is coming that will force a lot of change. The current model is very inefficient, and the generation behind us isn’t going to wait in a doctor’s office 45 minutes for a five-minute interaction.”

  • Healthcare Informatics Research Report: Two Factor Authentication and Digital Identity Management

    "Even if an organization uses strong passwords or requires them to be changed frequently, they’re a very thin line of defense."

    According to one recent study, three-quarters of security breaches involve lost or stolen passwords, and it’s not uncommon for healthcare employees to share passwords with others.

    Simply put, password protection is outdated and poses unacceptable security risks.

  • Healthcare Informatics Research Report: A Roadmap for Population Health Management

    A valuable guide to the decisions you will have to make as your organization navigates the tricky transition to value-based care.

    As payers increase the pressure on providers to take financial risk, healthcare organizations will have to sort through the wide variety of population health management (PHM) strategies and pursue the approaches that can truly benefit their patient base and organization.