Blog
When employees say yes to unsolicited push notifications, they effectively allow a malicious actor to bypass the controls offered by two-factor authentication – and open a new vulnerability for phishing attacks, or "phushing."
AI, augmented reality, biomedical sensors and beyond – by mapping out a clear vision now, we can widen our ambitions and improve modernization strategies to better harness the vast potential offered by technology advances.
When implemented correctly, these programs can effectively crowdsource security research and testing services to help uncover real world exploitable vulnerabilities.
Despite significant investment and well over a decade of different transformation plans and initiatives, there’s still much to do before we can say the health and care system has truly gone through a digital revolution.
Health system IT leaders need to be ready to enable care delivery anywhere, anytime, to any patient. New advances in cloud and telehealth/remote monitoring are forcing the issue.
While RPA has proved its success for some administrative functions, other technologies are emerging as options to help address the worker shortage and reduce workload in clinical and operational areas.
While compliance-based frameworks are not without merit, it is important that they be viewed as minimum acceptable standards and not as end goals.
As Medicaid programs determine what's next for health IT investments, state and regional HIEs, increasingly serving as "health data utilities," are natural partners to build on current programs with Medicaid Enterprise System funding.
One CIO names the technologies and leadership strategies he'll be focused on this year: platform design, 'Virtual Care 3.0' and more.
As ambient technologies improve, additional use cases to leverage voice will emerge – that leaves us with the question of how patients and physicians are responding to voice-enabled tools in their healthcare encounters.