Posted 5th June 2019 by Joshua Broomfield
Denise Anderson is president of the Health Information Sharing and Analysis Centre (H-ISAC), USA. She spoke to us about her perspective on Healthcare Cybersecurity, the value of information sharing, and the paradigm shift the industry requires in light of new risks brought about by rapid innovation.
Posted 22nd May 2019 by Joshua Broomfield
In my previous post, I discussed the likely applications of Blockchain technology in the short, medium, and long-term future. These applications follow on from the key strategic priorities necessitated by the healthcare industry’s trend towards digital decentralized care delivery models.
Posted 15th April 2019 by Joshua Broomfield
Merck, Sharp & Dohme operates a hub model with IT hubs in the US, Czech Republic, and Singapore.
All operations and important functions of IT are distributed within those three hubs. It ensures not only that we follow the standard model but also ensures the regional presence and cooperation with the sites in any region.
Posted 1st April 2019 by Joshua Broomfield
This is the second instalment of a two-part blog post from Jothi Dugar, one of the pioneers in the field of Cyber Security. Here, Jothi explains how her experience with integrative medicine has transformed her approach to Cyber Security in a healthcare setting.
Posted 25th March 2019 by Joshua Broomfield
This is the first instalment of a two-part blog post from Jothi Dugar, one of the pioneers in the field of Cyber Security. Here, Jothi shares her experience of Cyber Security and developing an Information Security Office in a healthcare setting.
Posted 4th April 2018 by Jane Williams
It might surprise a lot of people to learn that standards can be viewed as a tool to support innovation, to set businesses free and to focus on the core of their product where their expertise lie. When working with the use of electronic communication systems within the entire healthcare sector, the main focal point is often ensuring a good support for collaboration and work processes.
Posted 28th March 2018 by Jane Williams
The time for comprehensive IT security within healthcare facilities has come. We see news stories every day making the need obvious: stolen data, compromised devices, and interruptions in care delivery. The cyber security threat landscape is constantly evolving. Our defensive measures must evolve too.