Current Issue

Cover Story
Leveraging Risk Management During Disaster Recovery
Although IT faces the brunt of the responsibility, risk managers also play a key role.

Featured Articles
• Redefined Sepsis Affects Coding, Documentation
• Subject to Review
• Scribes Etch a Spot in the Care Process

Web Exclusives (view archive)
• A Look at Post–ICD-10 Coding
• AHIMA Works to Build Tomorrow's Leaders

News (view archive)

• Personal Health Data Part of WikiLeaks Data Dumps

• McKesson Threatens to Pull Technology From Bankrupt Hospital

• CommonWell Members Enable Patient Access to Their Health Data

• A Look Inside Epic's EHR Design and Usability Teams

• Study: Hospital IT Anxious About Growing Mobile Security Threats

Blog Speak

My Ideal EHR

Coffee and Cyber Aid

Are Interoperability Efforts More Sizzle Than Steak?

Spotlight on Meaningful Use 

Upping the Ante on Meaningful Use Audits

A Life Without Meaningful Use

Beyond Words: Terminology's Role in Meaningful Use

By the Numbers

61

The Healthcare Edition of the 2016 Vormetric Data Threat Report found that the top IT security spending priority is meeting compliance requirements (this percentage). Preventing data breaches ranked much lower at 40%. However, 96% of HIT security professionals feel vulnerable to data threats, and 63% have experienced a past data breach. 

Quick Code

Is There a Code for Cupping?
Coding Guru Judy Sturgeon Weighs In

Twitter
Featured Jobs on AlliedHealthCareers.com