Healthcare IT Experts

Banner Health Investigated for Cyberattack

2018-03-20T22:32:17-04:00By |Big Data, Healthcare IT, Services|

Verizon has re-examined the data within their Data Breach Investigations Report (DBIR) series to focus in on the healthcare sector’s unique profile and security challenges, and particularly the use/abuse of protected health information (PHI). Verizon’s 2018 Protected Health Information Data Breach Report (PHIDBR) is underpinned by 1,368 incidents from this caseload covering 27 countries.

Unique Cybersecurity Challenges for Healthcare Sector

2018-03-13T21:14:21-04:00By |Big Data, Healthcare IT, Services|

Verizon has re-examined the data within their Data Breach Investigations Report (DBIR) series to focus in on the healthcare sector’s unique profile and security challenges, and particularly the use/abuse of protected health information (PHI). Verizon’s 2018 Protected Health Information Data Breach Report (PHIDBR) is underpinned by 1,368 incidents from this caseload covering 27 countries.

Preserving Cybersecurity Requires New Approach

2018-01-02T16:05:23-04:00By |Healthcare IT, Services|

This year’s "McAfee Labs 2018 Cybersecurity Threats Predictions Report" focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes, long-term implications of corporations gathering children’s user-generated content, and the emergence of a machine learning innovation race between defenders and adversaries.

Cybersecurity Threats Predictions Report For 2018

2017-12-05T22:59:30-04:00By |Healthcare IT, Services|

This year’s "McAfee Labs 2018 Cybersecurity Threats Predictions Report" focuses on the evolution of ransomware from traditional to new applications, the cybersecurity implications of serverless apps, the consumer privacy implications of corporations monitoring consumers in their own homes, long-term implications of corporations gathering children’s user-generated content, and the emergence of a machine learning innovation race between defenders and adversaries.

C-Suite Cyber-Security Quick References

2017-10-24T18:36:54-04:00By |Healthcare IT, Services|

“To geek or not to geek?” that is not the only question. The real c-suite cyber-security question for executives might be, “Trust or not to trust?” All things IT still intimidates most people, no matter the generation. Being informed about security, network structures, and intrusive software challenges many experts in the field. Handing the responsibilities over to internal or contracted specialists without understanding the general concepts of cyber-security creates a blind spot. Not unlike, not grasping financial concepts because the accounting department handles that stuff.

Healthcare Payer Operations Improve With More Data

2017-09-20T17:53:15-04:00By |Big Data, Financial Analysis, Healthcare IT|

As healthcare payer operations integrate new practices to align with the value-based care paradigm, payers are critically challenged with identifying root causes to solve issues in order to improve and sustain performance. BHM Healthcare Solutions play a critical role in a larger operational system and offers two resources for consideration when reviewing the larger payer operational landscape.

Cyber-attacks: Not A Matter Of “If”, But “When”

2023-08-13T16:39:07-04:00By |Healthcare IT, Services|

The KPMG 2017 Cyber Healthcare & Life Sciences Survey of providers and health plans found a dramatic rise in computer system breaches, cyber-attacks, and data compromises, which include patient records, over the past two years. Despite that increase, more executives, who oversee protecting patient records and other information, say they are better prepared than two years ago to protect themselves against cyber-attacks.

Go to Top