It certainly is not a sure thing, but healthcare IT officials are reasonably sure that there will be no additional changes to Stage 2 guidelines for Meaningful Use. The reasoning behind this opinion is that such regulatory changes would require the Centers for Medicare and Medicaid Services (CMS) to first post a notice of the… Read more »

With the requirements of Meaningful Use Stage 2, facilities must start using patient portals. Patient portals can be instrumental in ensuring accurate, quality patient care by allowing patients instant access to their medical records, but they are not without security risk. As with any system there are the possibility of security breaches, HIPAA violations and… Read more »

As the industry knows, healthcare is becoming increasingly consumer focused. Technology is becoming a bigger part of healthcare, but like any system, it has its drawbacks. EHR systems are being implemented by facilities but not without technology or personnel challenges. The Problem is Provider Resistance. While Electronic Healthcare Records software have its share of useful… Read more »

Imagine your child has type 1 diabetes.  As a parent, you constantly worry about your child’s insulin level.  Your little one goes off to school and you hope they remember to check their levels and stay healthy. Now imagine being able to track your child’s insulin with an app on your smartphone. These remote monitoring… Read more »

In the age of tablets and apps, more people are turning to electronic devices to manage their health. Apps are being adopted faster than they can be developed. According to recent data, consumers are expected to spend about $26 billion by 2017 on mobile health applications! Within five years about half of all mobile phone… Read more »

Protecting patient healthcare information has increasingly become an important issue for healthcare providers as security breaches have become more common. There are measures healthcare organizations can take to reduce the chances that their information will be compromised, according to IT experts. First of all, to secure protected information, it is important for organizations to foster… Read more »

As healthcare organizations move forward with the installation of electronic medical record systems, they face a big decision – whether to control the system in-house or to outsource their IT management. In making a decision about outsourcing, many elements need to be taken into consideration. There are five major reasons why healthcare providers go with… Read more »

As healthcare providers move to meet Meaningful Use Stage 2 requirements, they are looking at ways of providing patients with greater access to their health information. The main goal of Stage 2 is to use clinical decision support (CDS) and care coordination to improve the overall quality of care by providers. As such, Stage 2… Read more »

Cloud computing has become a mainstay of the business world because of the advantages it offers – the ability to store large amounts of information and deliver it on demand, allowing users powerful IT access without having to worry about IT maintenance. It is also making big inroads in healthcare and is predicted to have… Read more »

More physicians, and other healthcare professionals and facilities, today are using mobile devices to store, send and receive health information. As with other electronic devices, security is an ongoing concern. Healthcare providers need to be sure they are not unknowingly allowing unauthorized access to protected health information. To prevent this, there are a number of… Read more »