How Telehealth is Helping Hospital Revenue Cycles

We’ve talked about the major benefits and trends of telehealth, but one of the lesser known benefits is the improvement telehealth can bring to the billing and payment cycle for hospitals. As patient financial responsibility for healthcare bills evolve, there has been an increase in the use of online platforms to streamline payments between patients […]

Legal, Financial, and Criminal Consequences for HIPAA Violations

Protecting patients’ private health information has become a major concern for most of the world. That’s because this information and data, otherwise known as “protected health information” (PHI) and electronic protected health information” (e-PHI), has increasingly become a primary target of a variety of hackers and scammers. And while this data and information is protected […]

The Top 6 Websites for Healthcare IT News

Being up-to-date in your industry is important for any job, but is even more crucial in the evolving world of healthcare IT. Thankfully, these six sites make it easy to keep up with breaking stories, tech updates, industry trends, and more. 1. Healthcare IT News Healthcare IT News is a great source for news in […]

The HITECH Act’s Health IT Infrastructure Standards and Requirements

The HITECH (Health Information Technology for Economic and Clinical Health) Act was passed in 2009 as part of the American Recovery and Reinvestment Auto of 2009 (ARRA). This piece of legislation was created to accelerate the adoption of electronic health records (EHRs), and its supporting technology, in U.S. healthcare organizations. The 7 major goals of the HITECH […]

e-PHI Data Security: What is e-PHI Data Theft?

PHI stands for protected health information and includes just what it sounds like: identifiable information in a person’s health data records, such as health details, date of birth, Social Security number, fingerprints, photos/images, and even financial information. e-PHI is the same thing, it’s just used, held, and transmitted via electronic form (there are actually 18 […]

HIPAA Security Rule Part 2: General Data Security Rules for Electronic Protected Health Information

In part 1 of the HIPAA Security Rule blog series, we introduced you to healthcare data security basics, or in other words, what the HIPAA Security Rule is, what the primary objectives are, and what kind of information is protected by the HIPAA Security Rule. Below, and as part 2 of this series, we are […]

HIPAA Security Rule Part 1: An Intro to Data Security for Electronic Protected Health Information

Information and data security are hugely important topics, and no group knows that more than those who work in the healthcare field. Whether it’s who physicians and healthcare providers can talk to about a specific patient’s care, how to protect your healthcare facility from healthcare data hackers, or how to secure individuals’ “electronic protected health […]

Healthcare IT Solutions

Technology is a crucial element of the healthcare industry, but this fact goes much deeper than the technology of machines and communication — it also applies to maintaining business continuity and protecting the data that allows daily functions to remain continuous and smooth, should downtime occur. From patient information in a hospital, all the way […]

The Future of Big Data in Healthcare

Big data in healthcare offers great potential for improving care, but healthcare agencies face challenges of improving infrastructure, analytics capabilities, and data security, according to “The Big Data Cure” report by MeriTalk.[1] MeriTalk surveyed 150 IT-related executives in Federal Agencies that focus on healthcare and healthcare research. The majority of respondents suggested that less than […]