In a major move announced by HSJ today, NHSX plans to merge into a new transformation directorate to combine digital and operational improvement teams within NHS England and NHS Improvement. Although first proposed at a board meeting in January, NHS England is still waiting for full approval from the Treasury and the Department of Health and
The COVID-19 pandemic has put the use of healthcare dashboards under the global spotlight. Each day, the global cases and deaths dashboard created by the Center for Systems Science and Engineering at the US’ John Hopkins University, receives around 1.2 billion requests. Created by Professor Lauren Gardner and her graduate student, Ensheng Dong, the public-facing
The U.S. Department of Veterans Affairs notified its beneficiaries on Monday that a data breach has exposed the personal information of approximately 46,000 veterans. According to the VA’s Office of Management, an online application used by the agency’s Financial Services Center was accessed by unauthorized users in an attempt to divert payments to community care
IBM this week launched Rapid Supplier Connect, a blockchain-based network it says can help healthcare organizations, whether hospitals or government agencies, address equipment shortages during the pandemic by helping them find alternative suppliers. WHY IT MATTERS Northwell Health, the largest healthcare provider in the state hardest hit by COVID-19, and the Worldwide Supply Chain Federation
UnityPoint Health is notifying 1.4 million patients that their records may have been breached when its business system was compromised by a phishing attack. This is the second breach for UnityPoint this year. In April, another phishing attack on staff email accounts at its Madison campus breached the data of 16,000 patients. According to the notice,
Add hardware maintenance to the list of IT tasks that artificial intelligence can improve upon for hospitals and other organizations. The technologies are planting early roots in a number of areas within the healthcare industry, from radiology and pathology to medical device security to specific treatment regimens, much the way Mount Sinai, for instance, is
In March, the Internet Engineering Task Force approved the Transport Layer Security version 1.3, the key function to enable HTTPS function on the web. On the surface, the new encryption model shores up network communications and provides substantially improved security features. As the new encryption model used to browse the internet, the TLS 1.3 standard
Hospital information security teams considering a bug bounty program should know a few things before entering the endeavor. The phrase bug bounty, for the uninitiated, refers to programs where hackers are paid to detect and report back on network vulnerabilities. Bug bounty and vulnerability disclosure programs have been proven to deliver excellent results in finding
UNC Health Care has reached Stage 7, the highest level on the HIMSS Analytics EMR Adoption Model, which measures healthcare facilities on their use of advanced analytics and health information technology. The designation applies to all UNC facilities: its hospitals, physician practices and applied analytics. "The Stage 7 honors confirm UNC Health Care's place as
We and our partners use cookies on this site to improve our service, perform analytics, personalize advertising, measure advertising performance, and remember website preferences.Ok