Posts

by adgrooms on January 8, 2020

It is now 2020. Many of us enjoy amazing capabilities such as video streaming and driverless vehicles, brought to us by improved connectivity and artificial intelligence. There is still not healthcare interoperability though. There are many technology companies that are trying to address the healthcare interoperability shortcomings in different ways. Two, in particular, Health Gorilla and ...

Read More
by adgrooms on January 8, 2020

We all make mistakes. In healthcare, mistakes can have consequences that can vary from losing a few seconds of time to affecting patient outcomes. In hindsight, many mistakes can be avoided, and better procedures are implemented to avoid making the mistake again. In the ongoing effort to eliminate mistakes and provide a better quality of care, sometimes it is beneficial to borrow processes ...

Read More
by adgrooms on December 20, 2019

We are taking a break from posting progress on our data breach report to discuss a security feature, password lockout. It is employed to discourage password guessing attacks. An added layer of security is good to protect against bad actors, but are there drawbacks?

Most of us have probably experienced this feature by forgetting our password. If you are unfamiliar, a password lockout allows ...

Read More
by adgrooms on December 19, 2019

Our recent posts have been sections of a data breach report that we are preparing. Its purpose is to gain insight into the trends and implications of reported incidents over the last ten years. This is our fifth installment with a look at the financial cost of healthcare data breaches.

Data breaches are costly in every business sector worldwide, but when reviewing the information [gathered ...

Read More
by adgrooms on December 17, 2019

We are currently working on a healthcare data breach report, visualizing and analyzing reported breaches from the last ten years. In each blog post, we are releasing a piece of the report which will ultimately be available in one PDF file. The first two posts have focused on the number of individuals whose personal health information has been compromised. This post focuses on the different ...

Read More