Tech content writer specializing in health IT, cybersecurity, and telecoms. I have written for Amazon Web Services, Cloudticity, Paubox, iNTERFACEWARE, and NearshoreNetworks.
Transforming Healthcare Without Sacrificing Security How enabling private cloud functionality can allow healthcare providers to take an active part in shaping the industry’s ever-evolving digital transformation.
How enabling private cloud functionality can allow healthcare providers to take an active part in shaping the industry’s ever-evolving digital transformation.
Disaster Recovery Planning
A comprehensive disaster recovery (DR) plan is essential to surviving and thriving in the modern
business environment where any unforeseen downtime has major consequences for the overall
customer experience. Unfortunately, many organizations struggle to define exactly what their DR
plan should include or how best to implement it.
This eBook will help you better understand why a bulletproof DR plan is vital to your business’ success and the various components and considerations to account for ...
Sick of Hearing about HCM systems? We get it, and so are we.
We know…you’ve probably searched “human capital management systems” a million times at this point. And there’s no shame in that as a quality HCM investment can save massive amounts of time and money as you continue to transform your organization to keep up with the rapid pace of business today.
The key to a truly transformative investment, however, is choosing an integrated HCM system. But how do you even define what an “integrated HCM system” is, to begin with? How do they work and how are t...
data breaches in healthcare
Under Attack:
Healthcare was the most vulnerable industry to sensitive data breaches across all major attack vectors in 2021:#1 for ransomware attacks #1 for third-party/supply chain attacks #1 for human and system insider errors As the number one sector for the most data breaches for the third year in a row, the healthcare industry reported more than 330 incidents or 18% of 2021’s total data compromises according While the number of industry-related data breaches increased slightly (8%) last...
data breaches in financial industries
services in 2021Under Attack:
The financial services industry incurred 15% of 2021’s record number of data breaches, with a total of 279 incidents reported by U.S.-based organizations, according to the Identity Theft Resource Center’s 2021 Annual Data Breach Report. Last year saw a 200% increase in the number of data breaches (from 138 incidents in 2020 to 279 incidents in 2021) while the number of individuals impacted by data breaches increased six-fold (from 2.7 million in 2020 to 19.7 mill...
Education Guide to Sensitive Data Breaches
The impact of sensitive education in 2021
The education sector was the fifth largest victim of major data breaches during 2021. According constituents. Last year, the educational sector incurred a three-fold increase in the number Three-quarters (76%) of all education data breaches included the theft or exposure of sensitive data, impacting students, parents, alumni, and faculty members and costing institutions millions of dollars in damages. The average total cost of a data breach in the edu...
Understanding GCP IAM Roles
Role-based, attribute-based, & just-in-time access to infrastructure
Get a demo
In this article, we will provide an in-depth overview of Google Cloud Platform (GCP) identity and access management (IAM) roles. You’ll learn about how GCP IAM works and the different types of roles that can be delegated to users as well as when those roles are most appropriate in the GCP environment. By the end of this article, you’ll have a clear understanding of the pros and cons of each different role type as ...
Understanding the Difference Between IAM Roles and Policies in AWS
TLDR; In this article, we will discuss the similarities and differences between identity and access management (IAM) roles and policies in Amazon Web Services (AWS). You’ll learn the difference between AWS roles vs. policies and see examples of each. By the end of this article, you’ll have a clear understanding of what distinguishes an AWS role from a policy, in addition to understanding the difference between IAM roles, users, and groups.
What's the Difference Between Roles and Policies in A...
A New ERA in CMS Quality Data Submissions – 2021
ACO’s that have been relying on the comfort of submitting CMS Web Interface reports during the 2021 buffer year will no longer have that luxury come 2022 as CMS completely switches to the eCQM or MIPS CQM reporting model. This means that organizations must implement a technology that allows them to switch to an electronic method of reporting as well as one that allows them to report on all-patient data regardless of payer. Implementing these new objectives across multiple EHRs is sure to frus...
AI and Persivia: How VBC Organizations Can Begin to Implement AI Solutions for Maximum Impact
The Current Environment
At the moment, fully integrated healthcare systems are performing value-based-care programs across the board like ACO, Medicare, Medicaid Risk, CCR, and bundled payment programs. This means that several concurrent data feeds like Clinical, Claims, SDOH, HIEs ADT, and EHR are going through the system. This makes for an extremely complicated environment when organizations utilize disparate, non-integrated solutions that don’t have the necessary scalability for physician ...
Appropriate Use Criteria Program & Its Impact on Radiologists
The Protecting Access to Medicare Act (PAMA) established in 2014 was designed to increase the rate of advanced diagnostic imaging services provided to Medicare beneficiaries. It currently gives beneficiary patients access to:
Computed Tomography (CT)
Positron Emission Tomography (PET)
Nuclear Medicine
Magnetic Resonance Imaging (MRI)
This program led to the development of a workflow between physicians that ordered the diagnostic imaging tests as well as those that furnished them. The evolutio...
Get connected and compliant with ONC 21st Century Cures Act and CMS 9115-F
Going over how mphrX can help providers become compliant with the 21st Century Cures Act.
Controlling the ever-expanding IT frontier
Why the demands of a remote-centric
workforce require endpoint protection
in the new generation of data lifecycle
management tools.
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier
The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to ensure that sensitive data is properly collected, stored and operationalized in accordance with regulatory standards and owner preferences.