Patient Privacy

Interoperability and HIE

Report Writing

Guy McAllister, Product Manager - Iatric Systems, Inc.

Guy McAllister is the Product Manager for Partner Risk Manager and SecureRamp. Guy has served in healthcare IT leadership for 18 years, primarily in the role of CIO. He has been instrumental in bringing the benefits of information technology to the rural settings in both the ambulatory and acute environments. He was an early implementor of a private HIE in rural Georgia. Under his leadership, HIT provided the foundation for initiatives around clinical integration, ACO development and robust population health analytics. McAllister holds a MA in Religious Education, and is a member of the HHS Cybersecurity Information Sharing Act (CISA) 405(d) Task Force, while also serving as Secretary/Treasurer of the board for Community Health IT. Guy is passionate about HIT and uses his background to educate organizations on the benefits HIT can offer.

Why You Could Be Liable for Your Vendors' Breaches

 

Vendors always attempt to position themselves as a partner and a friend. The vendor relationship can sometimes get confusing and cause frustration around expectations, and one of those expectations is protecting data. So, the Vendor Relationship: BFFs? or Covered Entity and Business Associate?

It’s enough stress on CIOs and IT Directors to worry about a breach occurring in their own organization; but add to that stress the concern of being responsible as well, if a breach happens at one of their vendors. It can be overwhelming!

Read More

Why Hackers Accessing Your Network is the Top Risk for 2019

 

ECRI Institute recently announced their annual “Top 10 Health Technology Hazards for 2019.” If you keep abreast of Health Information Technology (HIT) news, you already know the number one risk: hackers can exploit remote access to systems, disrupting healthcare operations.

"The consequences of an attack can be widespread and severe, making this a priority concern for all healthcare organizations," said ECRI Health Devices Program Executive Director David Jamison. "In critical situations, this could cause harm or death."

Read More

Make Sure Remote Access to Your Network is as Safe as a Deadbolt

The topic of security is on the minds of most healthcare IT professionals today. Securing remote access to your hospital's network is the deadbolt that helps protect your data. Most people don't leave their backdoor wide open, or expect that little doorknob lock to be secure, so why do most hospitals do the equivalent with their networks?

Read More

Comments

0 COMMENTS