Tag: Network Infrastructure

The rise of the dashboard

The COVID-19 pandemic has put the use of healthcare dashboards under the global spotlight. Each day, the global cases and deaths dashboard created by the Center for Systems Science and Engineering at the US’ John Hopkins University, receives around 1.2 billion requests. Created by Professor Lauren Gardner and her graduate student, Ensheng Dong, the public-facing

VA payments system hit by hackers, breaching data of 46,000 vets

The U.S. Department of Veterans Affairs notified its beneficiaries on Monday that a data breach has exposed the personal information of approximately 46,000 veterans. According to the VA’s Office of Management, an online application used by the agency’s Financial Services Center was accessed by unauthorized users in an attempt to divert payments to community care

IBM launches blockchain network to bolster medical supply chain during COVID-19

IBM this week launched Rapid Supplier Connect, a blockchain-based network it says can help healthcare organizations, whether hospitals or government agencies, address equipment shortages during the pandemic by helping them find alternative suppliers. WHY IT MATTERS Northwell Health, the largest healthcare provider in the state hardest hit by COVID-19, and the Worldwide Supply Chain Federation

Putting AI and cloud computing to work automating hardware maintenance

Add hardware maintenance to the list of IT tasks that artificial intelligence can improve upon for hospitals and other organizations.  The technologies are planting early roots in a number of areas within the healthcare industry, from radiology and pathology to medical device security to specific treatment regimens, much the way Mount Sinai, for instance, is

Did a change in encryption models tie the hands of data centers?

In March, the Internet Engineering Task Force approved the Transport Layer Security version 1.3, the key function to enable HTTPS function on the web. On the surface, the new encryption model shores up network communications and provides substantially improved security features. As the new encryption model used to browse the internet, the TLS 1.3 standard

What infosec pros need to know before conducting a bug bounty program

Hospital information security teams considering a bug bounty program should know a few things before entering the endeavor.  The phrase bug bounty, for the uninitiated, refers to programs where hackers are paid to detect and report back on network vulnerabilities.  Bug bounty and vulnerability disclosure programs have been proven to deliver excellent results in finding

UNC Health reaches Stage 7 with advanced EMR, analytics capabilities

UNC Health Care has reached Stage 7, the highest level on the HIMSS Analytics EMR Adoption Model, which measures healthcare facilities on their use of advanced analytics and health information technology. The designation applies to all UNC facilities: its hospitals, physician practices and applied analytics. "The Stage 7 honors confirm UNC Health Care's place as