Digital Transformation: History, Present, and Future Trends

The world is changing faster than ever. The Internet of Things (IoT), mobility, cloud, big data, augmented reality, blockchain, and social media are driving companies to the next level of digital customer engagement and IT-enabled business processes, products, and services. In virtually every industry, digital technologies are bringing about unprecedented transformation and changing our work and lives in ways we have never anticipated. Continue reading

Health InfoSec: How to Stay Ahead of Cyber Threats

The healthcare industry was a major target for cybercriminals in 2015, the worst year in history for healthcare data breaches. Thus, it comes as no surprise that in 2016, information security is considered the top health IT concern. Patient data protection has become a critical business priority for all healthcare organizations, regardless of their size or scope, as every vulnerability puts their reputations and financial performance at risk. Continue reading

Health InfoSec: The Wellbeing of the Healthcare Industry in the Era of Cyber-Attacks

The healthcare industry is going through a digital revolution. Hospitals pay more attention to technology than ever before. Both patients and professionals realize the benefits of telemedicine, mHealth, wearables, and smart devices and systems. Patient electronic medical records are entered online, letting patients access their own health data from home, helping doctors collaborate with each other remotely, and giving medical researchers access to millions of healthcare records.

But this transformation comes at the cost of security. Digital patient records have become a prime target for hackers due to the huge amount of sensitive information they contain. According to the newly released Study on Privacy and Security of Healthcare Data by the Ponemon Institute, nearly 90% of healthcare organizations experienced at least one data breach in the past two years, and 45% of them had more than five. Continue reading

Five Signs That You Need to Reengineer Your Software

AAEAAQAAAAAAAAOiAAAAJGUxMjc1ZDQ2LWQ5NjUtNDRlNS04NzkxLTI4NjI2ZTAzMjM4ZATaking advantage of the latest technologies has become the key to business competitiveness and the main challenge for manufacturers in all industries. In today’s fast-changing IT world, new software development technologies, methods, tools, and paradigms are constantly being developed: the benefits for first-movers are huge (in turnover, efficiency, and reputation alike), and the consequences for laggards devastating.

Software reengineering, porting, and code refactoring may be a cost-effective way to keep your product up to date with the cutting-edge developments and thus competitive in the market. However, many businesses find it tricky to determine when their software needs to be enhanced. Here are five canaries in the coalmine that clearly show it is time to reengineer your software. Do you recognize any of them in your own company? Continue reading

HL7 Security Issues – How to Protect Patient Data

With the rapid progress of informatization, data protection has come to the fore, and especially stringent requirements are rightly imposed for the protection of health information. The recently developed protocols already correspond to the new requirements. But what about long-in-the-tooth systems, dinosaurs of the times when no one thought that patient data would be of interest to hackers? Developers working with such systems cannot always use the latest versions of protocols; however, this does not mean that data protection is impossible. Continue reading