Commentary, opinions, responses and topics relevant to healthcare data management.
Advancing recovery architectures in a cybercrime world
In his fourth blog in our series on cybersecurity, Steve Matheson, Product Manager for BridgeHead’s RAPid™ Data Protection solutions, discusses a recent meeting with a customer where they undertook post-event analysis following a cyber event with some interesting...
Reducing disruption to clinical operations following a cyberattack
Here is the third blog in this cybersecurity series where Steve Matheson, Product Manager for BridgeHead’s RAPid™ Data Protection solutions, explores the nature of cyberattacks in healthcare; some of the new, emerging threats, focusing on ‘data manipulation’; and...
The hidden vulnerabilities in Healthcare Data Management
In this second in the series of blogs on cybersecurity, Steve Matheson, Product Manager for BridgeHead’s RAPid™ Data Protection solutions, explores what makes healthcare organizations prime targets for cyber intrusions, explains the difference between 'attack...
Arming the healthcare enterprise for cyberattack risk mitigation
In this first in a new series of blogs on cybersecurity, Steve Matheson, Product Manager for BridgeHead’s RAPid™ Data Protection solutions, discusses planned and unplanned outages and their repercussions for healthcare organizations with a focus on what makes...
How is your hospital protecting its Linux workloads?
In this next blog of the series on data protection and cybersecurity, Steve Matheson, Product Manager for BridgeHead's RAPid™ Data Protection solutions, takes a closer look at the burgeoning use of Linux across the healthcare Enterprise and examines some of the key...
“What has a FHIR repository ever done for us?”
In this blog, Adam Coombes, Product Owner for BridgeHead's HealthStore, explores the value of a FHIR repository, leveraging the genius of Monty Python references to make his point. “Well, maybe not an aqueduct, but there’s healthcare!” Let’s begin by quoting directly...
Cyberattack protection – don’t dismiss the obvious!
In this data protection and cybersecurity blog series, Steve Matheson, Product Manager for BridgeHead's RAPid™ Data Protection solutions, explores some key themes around backup, disaster recovery, and business continuity as it pertains to healthcare, kicking us off...
Fewer applications mean more secure healthcare environments
The global prevalence of cyber-crime in healthcare has increased exponentially in recent years. According to the World Economic Forum, since 2016, the number of confirmed cyber attacks against healthcare organizations has doubled, and strikingly between 2022-2023, the...
The 21st Century Cures Act And How It May Affect Legacy Clinical Applications
The 21st Century Cures Act (Cures Act), which was signed into law in the U.S. in December 2016, contains provisions designed to promote the rapid and widespread adoption of electronic health records (EHRs) and facilitate health information exchange. Among its many...
What are your legacy applications costing you? (Part 2)
In part 1 of this blog, we talked about the financial costs that healthcare organizations have to bear when managing their legacy application estate. But… Legacy applications cost more than just money! I’ve often heard the expression, ‘it’s not all about money’ – and,...
What are your legacy applications costing you? (Part 1)
‘Digital transformation’, that somewhat overused and under-defined term in my opinion, is happening across the globe. The ultimate aims seem to be centered around increasing efficiencies in the delivery of care and improving patient outcomes – all laudable goals....
HIPAA – A Brief History And Summary
The Health Insurance Portability and Accountability Act (HIPAA) was passed on August 21, 1996, with the dual goals of making healthcare delivery more efficient and increasing the number of Americans with health insurance coverage. This complex and comprehensive set of...
More than 1,200 hospitals around the world rely on BridgeHead’s data management solutions.