I wrote this column shortly after being named section editor this fall. I was impressed by how many doctors I talked to were unimpressed by the electronic health records systems they felt were being foisted upon them.
I'm sure our coverage of the HealthCare.gov website launch misfire would rank high on the list, taken collectively, but there were so many stories to write about everything that went wrong (and so many other outlets chasing the same story), that only this one about a CIO beating a hasty retreat showed up near the top of the list.
(15) Hacking Electronic Health Records The pitch: How a dangerous security flaw discovered in one of the most pervasive electronic medical record platforms in the US was found and fixed before it could do damage.
This story about vulnerabilities in VistA, the open-source platform originally developed by the Veterans Administration, is one we picked up earlier this month from our colleagues at Dark Reading.
What Have We Learned? Aside from a sequel to our practice management roundup, looks like readers can't get enough of remote patient monitoring and its potential. But what do you think of this list as a model for what InformationWeek Healthcare ought to be covering in 2014? With Obamacare coming into full force, Meaningful Use Stage 2, ICD-10 coding -- there are plenty of serious issues we ought to be covering, and we will.
I'd just like to know what the sexy issues will be, too.
Though the online exchange of medical records is central to the government's Meaningful Use program, the effort to make such transactions routine has just begun. Also in the Barriers to Health Information Exchangeissue of InformationWeek Healthcare: why cloud startups favor Direct Protocol as a simpler alternative to centralized HIEs. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.