Glosario eSalud | eHealth Glossary

Glosario sobre eSalud | eHealth Glossary

Browse the glossary using this index

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL
Currently sorted Surname ascending Sort by: Surname change to descending | First name

Page:  1  2  3  4  5  6  7  8  9  10  ...  39  (Next)

Picture of System Administrator

System Administrator

Picture of System Administrator

10 key insights on clinical partnering

by System Administrator - Tuesday, 27 January 2015, 2:26 PM

10 key insights on clinical partnering

This is the year we can increase the efficiencies of clinical trials through collaboration, innovation and enhancing quality. Where are the opportunities? How can we work differently with our partners? How can we embrace the changing technologies? How can we sustain effective clinical partnerships?

These are crucial questions and ones that we answer in our latest ebook – 10 key insights on clinical partnering.

  • Jo Sawyer, Head of External Partnerships, Novartis AG
  • Geno Gregory, Associate Director, Strategic Development, Global Phase 1 and Early Development Strategy, J&J
  • Mireille Zerola, Clinical Data Management Expert, Boehringer Ingelheim
  • Russell Svensen, Head Clinical Operations, Ipsen Pharma
  • Dave Walker, Senior Director, Clinical Development, Norgine
  • Olena Goloborodko, Senior Manager Global Contracts and Outsourcing Management, Astellas

Please read the attached eGuide

Picture of System Administrator

11 Steps Attackers Took to Crack Target

by System Administrator - Monday, 19 October 2015, 5:05 PM

11 Steps Attackers Took to Crack Target

By Thor Olavsrud

Aorato, a specialist in Active Directory monitoring and protection, delivers a step-by-step report on how attackers used the stolen credentials of an HVAC vendor to steal the data of 70 million customers and 40 million credit cards and debit cards from the retailer.

Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titanTarget, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection.

Leveraging all the publicly available reports on the breach, Aorato Lead Researcher Tal Be'ery and his team catalogued all the tools the attackers used to compromise Target in an effort to create a step-by-step breakdown of how the attackers infiltrated the retailer, propagated within its network and ultimately seized credit card data from a Point of Sale (PoS) system not directly connected to the Internet.

Many of the details of how the breach occurred remain obscured, but Be'ery says it is essential to understand how the attack happened because the perpetrators are still active. Just last week, the Department of Homeland Security (DHS) and United States Secret Service released an advisory that the malware used to attack Target's PoS system has compromised numerous other PoS systems over the past year.

Tracing the Attack Is Like Cyber Paleontology

While Be'ery acknowledges that some of the details in Aorato's account may be incorrect, he feels confident that the reconstruction is largely accurate.

"I like to think of it as cyber paleontology," Be'ery says. "There were many reports on the tools that were found in this incident, but they didn't explain how the attackers used these tools. It's like having bones, but not knowing what the dinosaurs looked like. But we know what other dinosaurs looked like. With our knowledge we were able to reconstruct this dinosaur."

In December 2013, in the midst of the busiest shopping season of the year, word began trickling out about a data breach at Target.

Soon the trickle was a torrent, and it would eventually become clear that attackers had gotten the Personal Identifiable Information (PII) of 70 million customers as well as data for 40 million credit cards and debit cards. CIO Beth Jacob and Chairman, President and CEO Gregg Steinhafel resigned. Target's financial damages may reach $1 billion,according to analysts.

Most who have followed the Target story know that it began with the theft of credentials of Target's HVAC contractor. But how did the attackers get from that initial point of penetration, at the boundary of Target's network, to the very heart of its operations? Be'ery believes the attackers took 11 deliberate steps.

Step 1: Install Malware that Steals Credentials

It started with stealing the credentials of Target's HVAC vendor, Fazio Mechanical Services. According to KresonSecurity, which first broke the story of the breach, the attackers infected the vendor with general purpose malware known as Citadel through an email phishing campaign.

Step 2: Connect Using Stolen Credentials

Be'ery says the attackers used the stolen credentials to gain access to Target-hosted web services dedicated to vendors. In a public statement issued after the breach, Fazio Mechanical Services President and Owner Ross Fazio said the company "does not perform remote monitoring or control of heating, cooling or refrigeration systems for Target. Our data connection with Target was exclusively for electronic billing, contract submission and project management."

This web application was very limited, Be'ery says. While the attackers now had access to a Target internal web application hosted on Target's internal network, the application did not allow for arbitrary command execution, which would be necessary to compromise the machine.

Step 3: Exploit a Web Application Vulnerability

The attackers needed to find a vulnerability they could exploit. Be'ery points to one of the attack tools listed in public reports on the list, a file named "xmlrpc.php." According to Aorato's report, while all the other known attack tool files are Windows executables, this was a PHP file, which is used for running scripts within web applications.

"This file suggests that the attackers were able to upload a PHP file by leveraging a vulnerability within the web application," The Aorato report concludes. "The reason is that it is likely the web application has an upload functionality meant to upload legitimate documents (say, invoices). But as often happens in web applications, no security checks were performed in order to ensure that executable files are not uploaded."

The malicious script was probably a "web shell," a web-based backdoor that allowed the attackers to upload files and execute arbitrary operating system commands.

Be'ery notes that the attackers likely called the file "xmlrpc.php" to make it look like a popular PHP component — in other words the attackers disguised the malicious component as a legitimate one to hide it in plain sight. This "hiding in plain sight" tactic is a hallmark of these particular attackers, Be'ery says, noting that it was repeated multiple times throughout the attack.

"They know they're going to get noticed in the end because they're stealing credit cards, and the way to monetize credit cards is to use them," he explains. "As we saw, they sold the credit card numbers on the black market and pretty soon afterward Target was notified of the breach by the credit card companies. The attackers knew that this campaign would be short-lived, a one-off. They weren't going to invest in infrastructure and becoming invisible because in a few days this campaign would be gone. It was enough for them to hide in plain sight."

Step 4: Search Relevant Targets for Propagation

At this point, Be'ery says, the attackers had to slow down and do some reconnaissance. They had the capability to run arbitrary OS commands, but proceeding further would require intelligence on the layout of Target's internal network — they needed to find the servers that held customer information and (they hoped) credit card data.

The vector was Target's Active Directory, which contains the data on all members of the Domain: users, computers and services. They were able to query Active Directory with internal Windows tools using the standard LDAP protocol. Aorato believes the attackers simply retrieved all services that contained the string "MSSQLSvc" and then inferred the purpose of each service by looking at the name of the server (e.g., MSSQLvc/billingServer). This is likely also the process the attackers would later use to find PoS-related machines, according to Aorato.

With the names of their targets, Aorato says the attackers then obtained their IP addresses by querying the DNS server.

Step 5: Steal Access Token from Domain Admins

By this point, Be'ery says the attackers had identified their targets, but they needed access privileges to affect them — preferably Domain Admin privileges.

Based on information given to journalist Brian Krebs by a former member of Target's security team, as well as recommendations made by Visa in its report on the breach, Aorato believes the attackers used a well-known attack technique called "Pass-the-Hash" to gain access to an NT hash token that would allow them to impersonate the Active Directory administrator — at least until the actual administrator changed his or her password.

As further evidence of the use of this technique, Aorato points to the use of tools, including penetration test tools, whose purpose is to logon sessions and NTLM credentials from memory, extract domain accounts NT/LM hashes and history and dump password hashes from memory.

Step 6: Create a New Domain Admin Account Using the Stolen Token

The previous step would have allowed the attackers to masquerade as a Domain Admin, but would have become invalid if the victim changed their password, or when trying to access some services (like Remote Desktop) which require the explicit use of a password. The next step, then, was to create a new Domain Admin account.

The attackers were able to use their stolen privileges to create a new account and add it to the Domain Admins group, giving the account the privileges the attackers required while also giving the attackers control of the password.

This, Be'ery says, is another example of the attackers hiding in plain sight. The new username was "best1_user," the same username used by BMC's Bladelogic Server Automation product.

"This is a highly abnormal pattern," Be'ery says, noting that the simple step of monitoring the users list and flagging new additions for sensitive accounts like administrator accounts could go a long way toward stopping attackers in their tracks. "You have to monitor access patterns."

He also notes that the reconnaissance actions taken in step four are another example of abnormal usage that activity monitoring can detect.

"It's very important to monitor for reconnaissance," Be'ery says. "Every network looks different, has a different structure. Attackers have to learn about that structure through queries. That behavior is very different from the normal patterns of users."

Step 7: Propagate to Relevant Computers Using the New Admin Credentials

With their new credentials, the attackers could now proceed to go after their targets. But Aorato notes two obstacles were in their path: bypassing firewalls and other network-based security solutions that limit direct access to relevant targets, and running remote processes on various machines in the chain toward their relevant targets.

Aorato says the attackers used "Angry IP Scanner" to detect computers that were network accessible from the current computer and then tunneled through a series of servers to bypass the security measures using a port forwarding IT tool.

As for remotely executing processes on the targeted servers, Aorato says the attackers used their credentials in conjunction with the Microsoft PSExec utility (a telnet-replacement for executing processes on other systems) and the Windows internal Remote Desktop (RDP) client.

Aorato notes that both tools use Active Directory to authenticate and authorize the user, which means Active Directory is aware of this activity if anyone is looking for it.

Once the attackers had access to the targeted systems, they used the Microsoft Orchestrator management solution to gain persistent access, which would allow them to remotely execute arbitrary code on the compromised servers.

Step 8: Steal 70 Million PII. Do Not Find Credit Cards

At this point, Aorato says the attackers used SQL query tools to assess the value of database servers and a SQL bulk copy tool to retrieve database contents. And here, Be'ery says, is where PCI compliance seems to have presented a big obstacle to the attackers — ultimately what may have kept them to stealing "only" 40 million credit cards and debit cards rather than 70 million, a 40 percent reduction of the incident's repercussions.

Section 3.2 of the PCI-DSS standard states: "Do not store sensitive authentication data after authorization (even if encrypted). If sensitive authentication data is received, render all data unrecoverable upon completion of the authorization process."

In other words, while the attackers had already managed to access the PII of 70 million Target customers, it did not have access to credit cards. The attackers would have to regroup with a new plan.

"Since Target was PCI compliant, the databases did not store any credit card specific data, so they had to switch to plan B and steal the credit cards directly from the Point of Sales themselves," Be'ery says.

Step 9: Install Malware. Steal 40 Million Credit Cards

The PoS system was probably not an initial target of the attackers, Be'ery says. It was only when they were unable to access credit card data on the servers they had accessed that they focused on the PoS machines as a contingency. Using the intel garnered during step four and the remote execution capabilities garnered during step seven, the attackers installed the Kaptoxa (pronounced "Kar-toe-sha") on the PoS machines. The malware was used to scan the memory of infected machines and save any credit cards found to a local file.

This step, Be'ery notes, is the only one in which the attackers seem to have used custom-written malware rather than common IT tools.

"Having antivirus would not help you in this case," he says. "When the stakes are so high, with profit in the tens of millions of dollars, they don't care about the cost of creating tailor-made tools."

Step 10: Send Stolen Data via Network Share

Once the malware obtained the credit card data, it created a remote file share on a remote, FTP-enabled machine using a Windows command and the Domain Admin credentials. It would periodically copy its local file to the remote share.

Again, Be'ery notes, these activities would have been authorized against Activity Directory, making it aware of the activity.

Step 11: Send Stolen Data via FTP

Finally, once the data arrived on the FTP-enabled machine, a script was used to send the file to the attackers' controlled FTP accounting using the Windows internal FTP client.

"The initial penetration point is not the story, because eventually you have to assume you're going to get breached," Be'ery says. "You cannot assume otherwise. You have to be prepared and have an incident response plan for what to do when you are breached. The real problem arises when malware is able to enable an attacker to penetrate deeper into the network."

"If you have the right visibility, that activity really stands out," he adds.

How to Protect Your Organization

Be'ery recommends that organizations take the following steps to protect themselves:

  • Harden access controls. Monitor and profile access patterns to systems to identify abnormal and rogue access patterns. Where possible, use multi-factor authentication to sensitive systems to reduce risks associated with theft of credentials. Segregate networks, limit allowed protocols usage and limit users' excessive privileges.
  • Monitor users' lists for the addition of new users, especially privileged ones.
  • Monitor for signs of reconnaissance and information gathering. Pay special attention to excessive and abnormal LDAP queries.
  • For sensitive, single-purpose servers, consider whitelisting of allowed programs.
  • Don't rely on anti-malware solutions as a primary mitigation measure since attackers mostly leverage legitimate IT tools.
  • Place security and monitoring controls around Active Directory as it is involved in nearly all stages of the attack.
  • Participate in Information Sharing and Analysis Center (ISAC) and Cyber Intelligence Sharing Center (CISC) groups to gain valuable intelligence on attackers' Tactics, Techniques and Procedures (TTPs).


Picture of System Administrator

12 steps to the perfect health system

by System Administrator - Tuesday, 10 November 2015, 7:13 PM

12 steps to the perfect health system


By Ilene MacDonald

Recent FierceHealthcare coverage has highlighted the challenges hospitals and health systems face daily: high costsinfection control and patient satisfaction to name just a few.

And though organizations have made strides to transition to value-based care and better manage population health, overall the United States spends more on healthcare but ranks last in quality compared to 10 other industrialized Western nations.

It's hard to imagine or dream that a perfect health system could exist--one that would meet all patients' needs at reasonable costs.

So it was with interest that I recently started to read Mark Britnell's new book, "In Search of the Perfect Health System." Britnell, the former chief executive candidate for the National Health Service (NHS) in England, now serves as the chairman and partner of the Global Health Practice at auditing firm KPMG. He's spent the last five years working in 60 countries to help governments and public and private sector organizations with operations, strategy and policy.

His travels have allowed him to witness first-hand examples of great health and healthcare. Although he hasn't found a perfect health system, he writes that if he found one it would feature 12 components that take from the best practices from around the world. And it would look something like this:

1. Universal healthcare: The best, he says, is offered by the NHS in the United Kingdom. The NHS was the first in the world to create a universal healthcare system, one that is available to all citizens, regardless of whether they have the ability to pay for it.

2. Primary care: Britnell turns to Israel for the example of excellent primary care. Indeed, Israel has one of the highest life expectancy rates in the world (average age of 82) and one of the lowest shares of gross domestic product (GDP) spent on health. Primary care is supported by four health maintenance organizations that act as both purchaser and provider for preventive, primary and community services. Out-of-hours care is provided around the clock, he writes, and integrated with evening care centers, urgent care centers and home visit services.

3. Community services; For inspiration, he suggests we look to Brazil where community teams made up of doctors, nurses, nurse auxiliary and community health workers visit households every month, whether or not they demand or need it. These teams offer immunizations, chronic disease management and screenings.

4. Mental health and well-being: Australia has made the most progress in this area, according to Britnell's research, offering public funding to invest in crisis and home treatment, early intervention and assertive outreach.

5. Health promotion: The Nordic countries best address the social determinants of health, encouraging individual responsibility and fostering collective action, according to Britnell. The five countries have public health and illness prevention strategies that contribute to low smoking, alcohol consumption and obesity rates, he says.

6. Patient and community empowerment: Britnell says the world can learn about patient empowerment from Africa, which blends community activism, patient education, social marketing and behavior change to promote better health. One example is the maternity care program in Kenya, which encourages mothers and women to share experiences to help cut maternal and infant death.

7. Research and development: This is where the U.S. shines, he says, noting the number of high-impact drugs and medical devices we've developed. But he also called out the innovation of new business and care models, including Kaiser Permanente's health information and technology systems, Geisinger Heath Systems' population health management and Virginia Mason's lean manufacturing principals.

8. Innovation, flair and speed: Britnell has found inspiration for the adoption and adaption of new innovations in India, where several organizations have been able to create a hub-and-spoke model that focuses on cost effectiveness rather than cost-cutting. Examples included standardized care pathways, making it easier to shift tasks and do more with fewer staff; referral networks that channel patients to the correct settings and even hospitals manufacturing their own devices or implants when suppliers refused to reduce prices.

9. Information, communications and technology: Singapore offers great examples of the sharing of patient data via a national electronic health record that allows access to all hospitals, community facilities, practitioners and long-term care homes, he writes. This provides the country with the ability to fully analyze clinical, financial and operational data to better assess healthcare costs and outcomes.

10. Choice:  There are no out-of-network providers in France. Patients can go to any doctor or hospital they wish, he says. Patient satisfaction is particular high, he notes, as are the country's quality and outcomes.

11. FundingNo country does it better than Switzerland, which spends11.5 percent of GDP on health, according to Britnell. The country also boasts high patient satisfaction, good clinical outcomes and life expectancy of 82.7 years. But Britnell notes that the country can afford to spend so much because its economy is globally competitive and dynamic.

12. Aged care: Japan offers its citizens compulsory long-term care insurance, which offers social care to all those older than 65 based solely on need. The ability to pay is not part of the assessment process. Care offered under the plan includes home help, community-based services, and residential and nursing care. The country has also created dementia homes where groups of people live together in a supportive, home-like environment, he writes.

Wouldn't it be wonderful to live in a country that offered this type of healthcare system? Given the continued fight in the country to just provide affordable care to all, it does seem impossible. But I guess we can dream.-- Ilene (@FierceHealth)

Related Articles:




Picture of System Administrator

12 Ways Secure Texting is Used in Healthcare

by System Administrator - Monday, 12 January 2015, 6:34 PM

12 Ways Secure Texting is Used in Healthcare

This infographic outlines how secure messaging is used within a healthcare organization as well as layout the benefits.

Please read the attached PDF

Related Resources:

Picture of System Administrator

2014 Healthcare Innovation Report

by System Administrator - Tuesday, 13 January 2015, 1:07 PM

FierceHealthIT's 2014 Healthcare Innovation Report

This FierceHealthIT special report celebrates the advancements made by healthcare solutions providers to ensure healthcare is more affordable and accessible. The report also recognizes the winners of the 2014 Fierce Innovation Awards: Healthcare Edition.

Please read the attached PDF report.


Picture of System Administrator

2014 Insider Threat

by System Administrator - Thursday, 14 August 2014, 9:22 PM


The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal accounts by the latest malware attacks. This report captures the key findings, focusing on comparisons critical results around organizations insecurities, concerns, technology investments as well as comparisons against their US counterpart's responses.

Picture of System Administrator

2015 Annual Security Report

by System Administrator - Monday, 2 March 2015, 2:28 PM

Cisco 2015 Annual Security Report: New Threat Intelligence and Trend Analysis

Despite advances by the security industry, criminals continue to evolve their approaches to break through security defenses. Attackers are realizing that bigger and bolder is not always better. The Cisco 2015 Annual Security Report reveals shifts in attack techniques, emerging vulnerabilities, and the state of enterprise security preparedness.

Please read the attached whitepaper.

Picture of System Administrator

2015 global life sciences outlook

by System Administrator - Tuesday, 30 December 2014, 9:26 PM

Infographic: 2015 global life sciences outlook

Greg Reh | DTTL Global Life Sciences Sector Leader | Greg is the DTTL Global Life Sciences Sector Leade...More

The extended nature of life sciences product development mandates that sector stakeholders adopt a long-term approach to strategic planning, portfolio management, and market expansion. However, organizations must also prepare for and react to near-term challenges and opportunities. Four major trends are expected to capture the sector’s attention in 2015: searching for innovation and growth; changing regulatory and risk environment; preserving and building shareholder value; and preparing for the “next wave.” The resulting challenges and opportunities can be both global and market-specific.

Check out top life sciences sector issues for 2015 in the inforgraphic below.

Click here to download a copy of the infographic and full report.

Please read the attached infographic file.

Picture of System Administrator

2016 EHR Software Pricing Guide: How to Compare EMR Systems

by System Administrator - Monday, 19 October 2015, 6:39 PM

2016 EHR Software Pricing Guide: How to Compare EMR Systems

by Software Advice

This guide is based on extensive market research and is designed to help chiropractic professionals: 

  • Learn about relevant pricing models
  • Understand common price ranges
  • Account for additional cost factors
  • Budget by desired applications
  • Compare prices of popular systems

Please download the attached whitepaper.

Below are additional offers that might interest you:

2016 Applicant Tracking Systems Pricing Guide
Simplify your ATS software evaluation process with this free download! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

5 Key Aspects to Accurate HR Software Pricing
Simplify your software evaluation process with this 2016 HR software pricing guide! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

2016 Payroll Software Pricing Guide: How to Compare Systems
Simplify your payroll software evaluation process with this free download!! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

5 Key Aspects of Accurate Payroll Software Pricing
Simplify your software evaluation process with this 2016 payroll software pricing guide! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

5 Key Aspects of Accurate Applicant Tracking Systems Pricing
Simplify your software evaluation process with this 2016 ATS software pricing guide! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

5 Key Aspects of Accurate Learning Management Systems Pricing
Simplify your software evaluation process with this 2016 LMS software pricing guide! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

2016 Learning Management Systems Pricing Guide
Simplify your learning management software evaluation process with this free download! This guide is based on extensive market research and is designed to help chiropractic professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

2016 HR Software Pricing Guide: How to Compare HR Systems
Simplify your HR software evaluation process with this free download! This guide is based on extensive market research and is designed to help HR professionals: • Learn about relevant pricing models • Understand common price ranges • Account for additional cost factors • Budget by desired applications • Compare prices of popular systems
Download This Research

Forrester Report: Security Risks Faced By Healthcare Providers Empowering Mobile Moments
This report will not only look at the drivers for remote system access but will show how some of the most mature hospitals and other healthcare providers have done it without compromising privacy and security.
Download This Research

Making the Switch: Replacing Your EHR for More Money and More Control
This whitepaper serves as a guide to identifying an under-performing EHR and replacing it with a solution that delivers results. It offers answers to a number of common questions about EHR adoption and replacement and demonstrates how the right EHR can help practices get more money and more control, freeing up physicians to focus on patient care.
Download This Research 


Picture of System Administrator

25 Best Health Tech Infographics of 2014 - 1/3

by System Administrator - Thursday, 15 January 2015, 8:28 PM

25 Best Health Tech Infographics of 2014 - 1/3

Annual yearly recap of the best health tech infographics created in 2014

Over the past 12 months, HIT Consultant has covered some of the most in-depth and well designed healthcare technology related infographics in this industry. Infographics provide a great way to display complex information or research data in a visually appealing format. Themes this year covered the gamut of healthcare technology including trends transforming health IT (EHR, meaningful use), mobile healthcare, patient engagement, big data and much more.

For our annual recap, we’ve collected 25 of our favorite healthcare technology infographics of 2014 shown below based on the following criteria: 

    • Storytelling
    • Valuable information
    • Data Visualization & Design Creativity 
    • Data Sources
    • Insightful key takeaways
    • Popularity (number of social shares)

1. 10 Medical Innovations Transforming Healthcare in 2015

Illustrates Cleveland Clinic’s annual top 10 medical innovations that are likely to have a major impact on improving patient care in 2015.

2. How Wearable Technology Is Transforming Mobile Health

Created by Career Glider features statistics on how wearable technologies is transforming mobile health, including how they’re affecting the way Americans stay active and healthy.

3. ICD-10 Could Help Track Ebola Outbreak

Illustrates the public health impact of ICD-10 in supporting the biosurveillance of the eBola outbreak created by the Coalition for ICD-10 . If the ICD-10 delay was not announced back in spring, the U.S. would be able to use the ICD-10 code for the Ebola virus – A98.4 to assess the efficacy of treatment and outcomes.

4. Patient Portal Adoption: Baby Boomers vs. Millennials

Key findings from Xerox’s annual survey on the usage of electronic health records reveals differences between Millennials and Baby Boomers when it comes to online patient portals.

5. Meaningful Use Audits Could Return $33M in Incentive Payments

Meaningful Use audits could recover $33M in EHR incentives, according to data from the HHS published.

6. How Millennials Are Reshaping Digital Health

Key findings from “Healthcare Without Borders: How Millennials are Reshaping Health and Wellness” report by Communispace reveals that Millennials, dissatisfied with the current healthcare system, have developed unique POVs for managing, maintaining their health and what it means fordigital health.

7. Why Healthcare Is Moving to the Cloud

How health care entities are moving to the cloud for their data and mission-critical applications created by AIS Network

8. Rise of the Digital Patient

The digital patient is here. From pre-screening potential doctors to viewing their treatment information and tracking their fitness/health data, the digital patient is increasingly embracing mobile health to improve their well-being.

9. Wearable Fitness Trackers Adoption Trends

While the use of health and fitness tracking devices has more than doubled in the last two years, a new nationwide survey conducted byTechnologyAdvice shows that only 25.1 percent of adults are currently using either a fitness tracker or a smartphone app to monitor their health, weight, or exercise.

10. The Convergence of Big Data and EHR

The convergence of big data and EHR infographic created by UC Berkeley School of Information explores the how the growing relationship between health data and EHR adoption is transforming healthcare.


Page:  1  2  3  4  5  6  7  8  9  10  ...  39  (Next)