As the Manager of Patient Care Device Integration at Iatric Systems, hospital staff often ask me “With my tight IT budget and so many competing initiatives, how can I justify the spend for smart pump interoperability?” Recently, I came across an interesting article by HCA IT&S Division Director Application Development, Sean Albert, Five Reasons to Implement IV Pump Interoperability. This article discusses value justification for Smart Pump EHR Interoperability.
National Nurses Week was celebrated this month and it was great to see the support of and celebration of all the great nurses who make a difference for patients and families every day. If you’ve ever been a patient in a medical setting, I’m sure you would agree that nurses truly are the heart and soul of the medical community that keeps everything moving.
One way that I can think of to honor and support our great nurses is to provide ways to make their jobs easier. I have spoken with a lot of clinicians who tell me they wish they could spend more time on the patient care part of their job, and less time on record keeping and the manual entry of data, especially when it comes to medical devices.
The Two Tales of Remote Access Security: Protection from Hackers, and Meeting Regulatory Requirements.
It’s all over the news - a new healthcare breach here, a new healthcare IT study there, that talks about how healthcare IT security needs to be a focus in 2019. Yet, we are already seeing more breaches in 2019 than ever before.
All hospitals know that they need to have some form of security plan in place to protect patients and their information. The problem is that the changing requirements and increase in breaches means that this plan has to always be evolving. Hospitals likely have goals for what they would like to change in the future to make sure they are adapting to the ever-changing threat landscape.
I recently posted about Ten Best Practices to Mitigate Cybersecurity Threats that came from recommendations by the Health and Human Services publication, “Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients.” That document addresses five cyber threats, with ten best practices for small to large healthcare organizations.
On October 27, 2015, Congress passed the Cybersecurity Information Sharing Act (CISA). Section 405 of CISA is specific to healthcare and charges Health and Human Services (HHS) with the responsibility of leading healthcare cybersecurity efforts, with the goal of keeping patient personal data secure.
ECRI Institute recently announced their annual “Top 10 Health Technology Hazards for 2019.” If you keep abreast of Health Information Technology (HIT) news, you already know the number one risk: hackers can exploit remote access to systems, disrupting healthcare operations.
"The consequences of an attack can be widespread and severe, making this a priority concern for all healthcare organizations," said ECRI Health Devices Program Executive Director David Jamison. "In critical situations, this could cause harm or death."
The topic of security is on the minds of most healthcare IT professionals today. Securing remote access to your hospital's network is the deadbolt that helps protect your data. Most people don't leave their backdoor wide open, or expect that little doorknob lock to be secure, so why do most hospitals do the equivalent with their networks?
Times, they are a changing! And, that's a good thing! Have you evaluated or made plans to move to MEDITECH's new Expanse platform? I wanted to share with you how we are keeping up with the changes and helping hospitals keep up too.