It’s time to stop overlooking the cybersecurity risks that exist within the supply chain and provide guidance on how to deal with them, says Greg Garcia, who talks about a new toolkit aimed at small-to-medium sized organizations.
Implementing a system that can accurately identify patients isn’t as simple as adding a field to an EMR system. But it is going to require “a mobilization and educational effort similar to the one that made EMR usage pervasive,” says Mitch Parker.
As healthcare enters “the digital revolution,” perhaps the greatest challenge for leaders is balancing the need for data access with the need for security, says Pamela McNutt, CIO at Methodist Health System.
Should patients be able to access and share their medical records? Of course. But are patients willing to read all the fine print, and qualified to properly vet third parties? That, says Chuck Christian, is the big question.
Though it may seem counterintuitive, mindfulness can actually help organize technology use, reduce distractions, and lower the risk of security breaches, says Mitch Parker – if you follow these guidelines.