Telehealth Services Are Redefining Healthcare

Telehealth Services Are Redefining Healthcare

Remember when doctors used to make house calls? Thanks to emerging healthcare IT solutions, patients can once again speak with their physicians and even have a face-to-face consultation right from the comfort of their own homes. But that’s only the beginning.

What is telehealth?
According to the American Telemedicine Association, telehealth encompasses a range of services, from health monitoring and patient consultation to the transmission of medical records. It’s more broadly defined as any electronic exchange of health information. A growing number of healthcare organizations have embraced telehealth because of the benefits it provides to patients and clinicians.

(more…)

Best Practices for Preventing Healthcare Cybersecurity Breaches – Campus Safety

Best Practices for Preventing Healthcare Cybersecurity Breaches – Campus Safety

Healthcare cybersecurity breaches can be devastating, but there are resources available to help you prevent cybersecurity attacks and develop best practices.  Is your healthcare organization using all of the cybersecurity resources at its disposal to prevent a breach?Hospital officials know the importance of preparing for healthcare cybersecurity breaches, not just for HIPAA compliance but also to avoid the costly disruptions and damage that can be caused by cyberattacks. 

(more…)

Artificial intelligence and cybersecurity: The real deal | CSO Online

Artificial intelligence and cybersecurity: The real deal | CSO Online

If you want to understand what’s happening with artificial intelligence (AI) and cybersecurity, look no further than this week’s news.

On Monday, Palo Alto Networks introduced Magnifier, a behavioral analytics solution that uses structured and unstructured machine learning to model network behavior and improve threat detection. Additionally, Google’s parent company, Alphabet, announced Chronicle, a cybersecurity intelligence platform that throws massive amounts of storage, processing power, and advanced analytics at cybersecurity data to accelerate the search and discovery of needles in a rapidly growing haystack.

(more…)

Cybersecurity M&A deal flow: List of 200 transactions in 2017 | CSO Online

Cybersecurity M&A deal flow: List of 200 transactions in 2017 | CSO Online

The cybersecurity market is expected to ring up sales of $1 trillion cumulatively between 2017 and 2021.  In 2017, more than 200 cybersecurity startups received venture funding. With a flurry of new entrants looking to grab a slice of the spending, there’s an equal amount of market consolidation.
Over the past year, the cybersecurity market saw more than 200 mergers and acquisitions. The deal flow, tracked quarterly by the Cybersecurity Ventures M&A Report, has been compiled into an annual recap for CSO readers.

(more…)

ICYMI | Identity Theft – The CPA Journal

ICYMI | Identity Theft – The CPA Journal

Identity theft continues to be a serious issue for individuals and businesses. According to Javelin Research’s 2016 Identity Theft Study, $15 billion was stolen from 13.1 million individuals in 2015 (Al Pascual, Kyle Marchini, and Sarah Miller, “2016 Identity Fraud: Fraud Hits an Inflection Point,” Feb. 2, 2016, http://bit.ly/2fWJgco). For businesses, data breaches can compromise customers, clients, and employees; furthermore, it has been estimated that 90% of data breaches impact small businesses (“Small Businesses: The Cost of a Data Breach is Higher than You Think,” First Data Market Corporation, http://bit.ly/2gQCl1Z). In light of these statistics, it is essential for CPAs to address the financial and tax issues related to individual identity theft as well as compromised business data that can translate into identity theft for customers, clients, and employees.