HealthAxis Blog

9Feb, 2018

FDA lays out digital health goals in 2018 strategic roadmap

By: | Tags: , , , ,

Leveraging innovation and competition to better healthcare is one of the four cornerstones of the Food and Drug Administration’s 2018 policy roadmap “The roadmap touches on several efforts to help develop medical devices, specifically the establishment of a Total Product Life Cycle Office within the Center for Devices and Radiological Health and the development of an alternative 510(k) pathway. FDA also plans to publish final guidance on what digital health technologies fall under FDA’s regulation and those that the agency plans to exercise enforcement discretion on. In December, the agency […]
READ MORE

25Jan, 2018

Providers: Email is main data breach culprit

By: | Tags: , , , , , ,

A recent survey by Mimecast and HIMSS Analytics states that providers overwhelmingly rank email as the No. 1 source of potential data breaches  “Of physicians who experienced a cyberattack, nearly three in 10 with medium practices reported nearly an entire day of downtime as a result. As with the Mimecast-HIMSS survey, sharing personal health data between providers was a high priority. The survey data also show providers are looking to strengthen security. Nearly all of the respondents, about 95%, said preventing malware and/or ransomware attack is a top priority in […]
READ MORE

23Jan, 2018

OCR: 5 ways to fight internal health data breaches

By: | Tags: , , , , , ,

Healthcare organizations can protect themselves from internal healthcare data breaches. “Healthcare organizations are a prime target for internal breaches caused by former employees, but there are several steps that groups can take to protect themselves from the threat. The Department of Health and Human Services Office for Civil Rights (OCR) issued a number of tactics (PDF) to prevent recently terminated staffers from accessing private healthcare data.”  Read the full article. Check out this article and more on social media!
READ MORE

3Jan, 2018

Health systems’ IT priorities for 2018: Cybersecurity technologies, patient-generated data

By: | Tags: , , , , , , , ,

Many major health systems plan to invest in improved cybersecurity technologies next year. “Cybersecurity improvements are top of mind for health IT executives this coming year, but they’re planning a more cautious approach when it comes to technologies like wearables and artificial intelligence, according to a new survey. IT leaders said they want to be more proactive in detecting and preventing cyberattacks or data breaches. Fifty-four percent of respondents said they want to invest in better identification technologies, including risk assessment and education initiatives, and 50% said they plan to invest in protection […]
READ MORE

27Dec, 2017

10 top health technology hazards for 2018

By: | Tags: , , , , ,

With 2017 coming to a close, it is time to look ahead to 2018 and the top 10 health technology hazards to be aware of this year “Research firm ECRI has issued its top health technology hazards for 2018, identifying potential sources of danger that warrant high attention in the New Year. ECRI picked information security threats as the biggest risk next year.”  Read the full article. Check out this article and more on social media!
READ MORE

14Dec, 2017

HXG Cybersecurity Series: Multi-Factor Authentication

By: | Tags: , , , , , , ,

The Everlasting Issue of Breaches and How We Avoid Them We recently discussed how security breaches affect the healthcare system and the impact these breaches have on everyone involved, from large corporate entities down to the individual patients and their personal information.  Recognizing threats is a good start in the never-ending battle against online pirates and their attempts at profiteering on identity theft, but now let’s discuss what we can actively do to ensure we take full measures to protect the private information of the millions of customers who trust […]
READ MORE

29Nov, 2017

Cloud security and IoT are the new peanut butter and jelly

By: | Tags: , , , , ,

For enterprises using cloud services with IoT, it’s critical to adhere to as many security practices as possible. Experts weigh in on the best approaches to take. “The Internet of Things (IoT) adds another sticky layer to the question of cloud security. Most organizations think in terms of the devices themselves, rather than the services offered through the cloud, as potential vulnerability points. However, with all the data being gathered through IoT devices, organizations will find that utilizing cloud services may be the best way to alleviate strain on their […]
READ MORE

27Nov, 2017

Hospital datacenters: Extinct in 5 years?

By: | Tags: , , , , ,

Cloud Computing: Datacenter of the future “Prominent healthcare executives are predicting a drastic shift from on-premise IT infrastructure into the cloud. That includes electronic health records, clinical decision support and analytics. Every time Carolinas HealthCare System gets rid of server or storage hardware, someone in the IT department takes out a roll of red tape. They cut off two pieces and lay those down on the floor in the shape of an X, as in: Do not put any new hardware here.” Read the full article. Check out this article and […]
READ MORE