Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
2011 was a challenging year for healthcare IT professionals. Providers rolled out electronic health record systems to qualify for the government's Meaningful Use financial incentives. Meanwhile, mobile health apps took off, e-prescribing increased, health info exchanges got a start, and some organizations suffered data breaches. On the plus side, more health IT jobs became available.
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit
2014 Analytics, BI, and Information Management SurveyThe desire to simplify data analytics and business intelligence has been gaining steam for years. But this year, interest in visual data analysis tools came to the forefront, and the use of Hadoop and NoSQL databases made slow but steady gains. While established companies like IBM, Microsoft, Oracle, SAP and SAS are still the top dogs for BI and analytics, smaller and nimbler vendors like Tableau and QlikTech are forcing the giants to innovate.
2014 Analytics, BI, and Information Management SurveyITís tried for years to simplify data analytics and business intelligence efforts. Have visual analysis tools and Hadoop and NoSQL databases helped? Respondents to our 2014 InformationWeek Analytics, Business Intelligence, and Information Management Survey have a mixed outlook.