Posts Tagged with it

by adgrooms on May 30, 2019

We have recently looked at the risk of phishing scams in healthcare and how to avoid them. We have seen that the number of patient data breaches has reached one per day in 2018. But why do hackers continue the relentless attacks on healthcare institutions? What are the hackers after? What reward do ...

Read More
by adgrooms on May 28, 2019

Stealing and exposing patient data is, unfortunately, a lucrative activity. Hackers are relentlessly looking for vulnerabilities in institutions that amass personal health data. In 2018 there were 365 data breaches involving patient data, that is one per day! In addition to the personal costs to the individuals who are ...

Read More
by adgrooms on May 22, 2019

The onslaught of hackers in healthcare never ceases. Personal Health Information (PHI) is so essential and valuable, it is a tempting target. Even with multi-layered security systems in place, some hackers still slip through. Phishing is currently one of the most popular ways to breach the security layers. It is perpetrated by preying on employees through their email. [In a recent ...

Read More
by adgrooms on April 30, 2019

In healthcare, making an administrative choice to use a piece of software in a clinical setting or not isn’t quite the same decision as making a choice to operate on someone or not. However, that software could affect the decision to operate on someone, and should not be discounted.

As with deciding on how to treat a patient, a variety of information and factors should be considered when ...

Read More
by adgrooms on April 12, 2019

“Just log into your patient portal to see your blood test results in a few days” said the front desk lady, answering my question, as she hurried me out the door. I looked back down the hall and said bye to my doc as he hurriedly typed on his little laptop. I wondered what else he could be inputting at such a furious pace...Is he still typing about my appointment? Another patient? Billing? ...

Read More