Health IT and Electronic Health Activate your FREE membership today |  Log-in

Community Blog:

Risk assessment


September 10, 2015  11:49 AM

Five healthcare security strategies to adopt now



Posted by: adelvecchio
cybersecurity, Data breach, data breach security, Risk assessment

myers_lysa

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend

December 4, 2013  2:08 PM

Healthcare risk assessment guide: Steps for disaster preparation



Posted by: adelvecchio
Disaster planning, Protected health information, Risk assessment

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


February 19, 2013  3:15 PM

Use advanced IT tools to proactively manage high-risk patient populations



Posted by: Jenny Laurello
coordinated care, health IT tools, longitudinal care, proactive care, Risk assessment

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


February 15, 2013  11:13 AM

Exceed every expectation for your health care network in 2013



Posted by: Jenny Laurello
data interoperability, health information exchange, HIE, IDNs, Interoperability, Networking, patient identification, public health information exchanges, Risk assessment

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


October 9, 2012  10:55 AM

Risk assessment for HIPAA compliance and MUS2 readiness



Posted by: Jenny Laurello
HIPAA, HIPAA risk assessment, Meaningful use, MU stage 2, MUS2, Risk assessment, Stage 2

Bookmark and Share     Comments are off for this post.     RSS Feed     Email a friend


July 6, 2012  8:00 AM

mHealth for health care payers: 5 key focus areas for mobile applications



Posted by: Jenny Laurello
Health plans, mHealth, mhealth apps, mobile applications development, Mobile apps, payers, Risk assessment

Guest post by: Baskar Mohan, Director, Healthcare Practice, Virtusa Corporation Some would argue that mobile health (mHealth) applications are getting more attention these days than gaming applications such as Angry Birds or Draw Something. According to a recent survey, more than 80% of...


March 7, 2011  2:26 PM

Risk of data breach: Tips for mitigating risk now that the threat has shifted from external to internal



Posted by: Jenny Laurello
Data privacy, Data security, HIPAA, HITECH, PHI, Risk assessment

Guest Post:  Jay Hill, Director of Product Management and Marketing, Informatica Your computer network is protected by a firewall including endpoint protection against malware and other types of attacks. Antivirus software is in place to prevent and detect...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: