How Medical Computers can Help Combat the Opioid Crisis

Prescription opioids have been in the news quite a bit lately. Congress just recently passed sweeping legislation, commonly known as the SUPPORT bill, to help combat the opioid epidemic that has been on the rise the past several years. According to studies done by the National Institute on Drug…


Read More

3 Ways to Extend the Life of Legacy Medical Devices

Legacy technology is defined as technology which is no longer produced (or in many cases even supported), but which still functions and can be used. The medical industry is filled with legacy technology, and while it eventually becomes necessary to sundown a given piece of medical tech – retiring…


Read More

Understanding the Move to Mobile and HIPAA

Five years after the Internet went live to an unsuspecting public - one that had no idea how much it would need cat videos, online shopping and binge-watching -  the Health Insurance Portability and Accountability Act (HIPAA) was born in 1996. Fast forward more than 20 years and we’ve seen the…


Read More

Healthcare IT and the Impact of the Blockchain Ledger

Cryptocurrencies have been trending in the news lately because of their volatile market price, security, and popularity. Investors and money moguls alike have dumped "real" money into the cryptocurrency market, turning fiction into fortune with an intangible concept of data that holds wealth in…


Read More

EHR and it’s Evolution into CHR: A Critical Look at Cutting-Edge Technology in Healthcare

Epic CEO, Judy Faulker, recently expressed her view how Electronic Health Records are evolving into Comprehensive Health Records—a term that evaluates more than just a specific window of sampling an individual's health from doctor visits. CHR is a term that may be invented as the new EHR,…


Read More

How Two-Factor Authentication is a Small-Scale Standard for Protecting Information

This year is no stranger to cyber-security attacks. One need only to refer to the Equifax data leak to recall security mishaps or the ransomware culprit "WannaCry" that holds protected information "ransom" unless victims pay to have the compromised files released. These and other attacks hit…


Read More

How to Avoid Data Corruption in Hospitals: Prevention Starts with Awareness

Technology in any industry is always subject to Murphy's Law; if a problem can arise, it will. That's the lay of the land in tech, and there's no avoiding it. However, awareness of data corruption in hospitals and being prepared with the right hardware helps any facility combat whatever…


Read More

What The FDA’s Postmarket Management of Cybersecurity in Medical Devices Means for Manufacturers of Medical Devices

The FDA‘s guidance on “Postmarket Management of Cybersecurity in Medical Devices”[PDF] is a complementary document for the 2014’s “Content of Premarket Submissions for Management of Cybersecurity in Medical Devices” [PDF]. The 30 pages of the guidance contain detailed recommendations, and the…


Read More

Can Your Medical Computers Run Military Genesis EHR?

MHS Genesis EHR is now a reality. After four years of planning, months of tests and delays, and a $4.3-billion contract, Department of Defense’s first electronic health records implementation is live at Fairchild Air Force Base in Washington. Military Healthcare System (MHS) Genesis is based on…


Read More

Data At Risk – BYOD vs Medical Tablets in Healthcare

You would be hard-pressed to find a healthcare worker who does not use a smartphone or tablet for work. Be it for taking notes during a phone conversation, searching for references, using medical apps, tapping out a quick email on the go, video conferencing with a patient, or signing medical image…


Read More