Interoperability and HIE

Privacy and Security

Report Writing

Guy McAllister, Product Manager - Iatric Systems, Inc.

Guy McAllister is the Product Manager for Partner Risk Manager and SecureRamp. Guy has served in healthcare IT leadership for 18 years, primarily in the role of CIO. He has been instrumental in bringing the benefits of information technology to the rural settings in both the ambulatory and acute environments. He was an early implementor of a private HIE in rural Georgia. Under his leadership, HIT provided the foundation for initiatives around clinical integration, ACO development and robust population health analytics. McAllister holds a MA in Religious Education, and is a member of the HHS Cybersecurity Information Sharing Act (CISA) 405(d) Task Force, while also serving as Secretary/Treasurer of the board for Community Health IT. Guy is passionate about HIT and uses his background to educate organizations on the benefits HIT can offer.

How to Make Sense of the VPN Mess

Let me begin by saying, I live on the Atlantic coast, just north of Jacksonville, FL. Because it’s hurricane season in this area, I always keep a keen eye on hurricane updates. Recently, I tracked and monitored Hurricane Dorian and the impact it might have on my family.

Read More

The Two Tales of Remote Access Security

The Two Tales of Remote Access Security: Protection from Hackers, and Meeting Regulatory Requirements.

It’s all over the news - a new healthcare breach here, a new healthcare IT study there, that talks about how healthcare IT security needs to be a focus in 2019. Yet, we are already seeing more breaches in 2019 than ever before.

Read More

Three Impacts of a Third-Party Security Breach

All hospitals know that they need to have some form of security plan in place to protect patients and their information. The problem is that the changing requirements and increase in breaches means that this plan has to always be evolving. Hospitals likely have goals for what they would like to change in the future to make sure they are adapting to the ever-changing threat landscape.

Read More

Call To Action: Make Cybersecurity a Priority to Protect Patient Safety

I recently posted about Ten Best Practices to Mitigate Cybersecurity Threats that came from recommendations by the Health and Human Services publication, “Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients.” That document addresses five cyber threats, with ten best practices for small to large healthcare organizations.

Read More

Ten Best Practices to Mitigate Cybersecurity Threats

On October 27, 2015, Congress passed the Cybersecurity Information Sharing Act (CISA). Section 405 of CISA is specific to healthcare and charges Health and Human Services (HHS) with the responsibility of leading healthcare cybersecurity efforts, with the goal of keeping patient personal data secure.

Read More

Why Hackers Accessing Your Network is the Top Risk for 2019

ECRI Institute recently announced their annual “Top 10 Health Technology Hazards for 2019.” If you keep abreast of Health Information Technology (HIT) news, you already know the number one risk: hackers can exploit remote access to systems, disrupting healthcare operations.

"The consequences of an attack can be widespread and severe, making this a priority concern for all healthcare organizations," said ECRI Health Devices Program Executive Director David Jamison. "In critical situations, this could cause harm or death."

Read More

Make Sure Remote Access to Your Network is as Safe as a Deadbolt

The topic of security is on the minds of most healthcare IT professionals today. Securing remote access to your hospital's network is the deadbolt that helps protect your data. Most people don't leave their backdoor wide open, or expect that little doorknob lock to be secure, so why do most hospitals do the equivalent with their networks?

Read More

Comments

0 COMMENTS