Image of shield for blog about The HITECH Act and funding workforce development

2 min read

The HITECH Act and funding workforce development

The HITECH Act was a piece of legislation that addressed shortages of skilled professionals needed for electronic health records (EHRs) and other health IT systems. The adoption relied on initiatives such as the Workforce Development Program, which...

Read More
image of medical records for blog about The HITECH Act and the Meaningful Use program

2 min read

Understanding the Meaningful Use program

Meaningful Use refers to standards established by the Centers for Medicare and Medicaid Services (CMS) to encourage healthcare organizations to use...

Read More
Image of laptop for blog about The issue with EHR vendor lock-in

2 min read

The issue with EHR vendor lock-in

When an Electronic health record (EHR) system is not flexible or interoperable with other tools, healthcare providers can have difficulty sharing...

Read More
Image of workplace for blog about Handling PHI when reporting workplace violence

1 min read

Handling PHI when reporting workplace violence

When evidence used in workplace violence (WPV) reports contains identifiable details about a patient that could link them to the organization and the...

Read More
Image of someone sharing ideas with another person for blog about Using empathetic language in weight-related discussions

2 min read

Using empathetic language in weight-related discussions

Empathetic language is the art of using words to show understanding and care for another person’s feelings. According to a study published in the...

Read More
Image of lock for blog about What are strong security practices?

2 min read

What are strong security practices?

Strong security practices and methodologies, such as email authentication, are advisable to protect organizations from cyber threats. These are...

Read More
Image of lock for blog about The impact of the CMS proposed rule on the authorization process 

2 min read

The impact of the CMS proposed rule on the authorization process

Prior authorization (PA) is a process where healthcare providers must obtain approval from insurers before delivering specific treatments or...

Read More
Image of Senate chamber for blog about What is the SAVE Act?

2 min read

What is the SAVE Act?

Over the past two years, healthcare employees have faced increased threats and assaults, further compounded by the stress and resource constraints of...

Read More
Image of shield for blog on New cybersecurity guidance targets espionage threats

2 min read

New cybersecurity guidance targets espionage threats

The CISA, NSA, and FBI along with international partners, released guidance in response to recent cyber espionage by PRC-affiliated threat actors.

Read More
medical monitoring device on wrist with smartphone

1 min read

FDA recommendations pave the way for safer AI-driven medical devices

The FDA has introduced recommendations for managing the continuous updates of AI-enabled medical devices. The approach includes a plan outlining how...

Read More
blue digital lock shield

2 min read

Understanding risk mitigation strategy

According to the HHS Security Series on Risk Analysis and Management, “The required implementation specification at § 164.308(a)(1)(ii)(A), for Risk...

Read More
hands going through paperwork

3 min read

The steps required for a risk analysis

Risk analysis includes identifying where ePHI is created, received, maintained, or transmitted. Organizations can discover potential risks to their...

Read More
Image of locks for blog about Managing technological and physical risk

1 min read

Managing technological and physical risks

Technological risks are the vulnerabilities arising from digital infrastructure. Meanwhile, physical risks are threats that could lead to physical...

Read More