IFHIMA Releases White Paper to Help HIM Professionals Navigate Global Privacy Trends

A new white paper from the International Federation of Health Information Management Associations (IFHIMA) discusses the challenges of managing the privacy of health information in an increasingly mobile, digital, data-oriented world with a global perspective.

Read More
The Road to Cybersecurity Runs Through the C-Suite
Sep04

The Road to Cybersecurity Runs Through the C-Suite

For cybersecurity protection measures to be successful, policies need to be implemented from the top down. That means getting the attention of—and investment from—the C-suite and the board of directors.

Read More

Unveiling the Illusion of Digital Health Data Security [Sponsored]

HIM professionals have worked diligently to protect data privacy and security during a time of digital transformation to healthcare. The unfortunate reality? Hackers have worked even harder to access that data.

Read More

AHIMA Releases Updated Cybersecurity Guidelines

The best way to defend against a cybersecurity attack is to develop a robust, tested cybersecurity plan. AHIMA has released updated guidelines for providers looking to implement cybersecurity prevention measures.

Read More
Lower Health Care Costs Act Includes HIM-Relevant Provisions
Jul23

Lower Health Care Costs Act Includes HIM-Relevant Provisions

Before Congress departed for the Fourth of July district work period last week, the Senate Health, Education, Labor and Pensions (HELP) Committee overwhelmingly passed S. 1895, the Lower Health Care Costs Act out of committee. Since the beginning of this year, the Senate HELP Committee has held five hearings on how to reduce healthcare costs and four hearings to explore the rising cost of prescription drugs.

Read More
Learn More About the New Face of Cybersecurity
Jul01

Learn More About the New Face of Cybersecurity

HIM professionals have worked diligently to protect data privacy and security during a time of digital transformation in healthcare. The unfortunate reality? Hackers have worked even harder to access that data. It’s a game of ‘cat and mouse,’ and regrettably, the mice (i.e., hackers) appear to have a competitive edge.

Read More