Current Issue

Cover Story
Don't Sleep on Z Codes
Organizations that capture social determinants are likely to enhance their population health and value-based care efforts.

Featured Articles
CDS Systems: Common Malfunctions, Practical Solutions
Is Texting Physician Orders 2G2BT?
Double Down Efforts to Thwart Duplicate Patient Records

Web Exclusives (view archive)
• How to Improve EHR Usability: First, Listen to the Clinician
• Profession in Health Care Lies Dormant, Not Dead

News (view archive)

• Health Care Is Facing a Security Staffing Crisis, HHS Says

• How Erie County Medical Center Got Hacked

• IBM Research, Sutter Health Collaborate to Train Research Models That Could Be Used for Identifying Heart Failure Earlier

• EHNAC Executive Director Issues Statement on Ransomware Attack

• Smartphones in the ED Can Help Discharge Patients Faster

Blog Speak

Let's Generalize EHR Findings

Pros and Cons of Messaging Patients Through the EHR

Why Value-Based Care Is Doomed

Spotlight on Release of Information

How to Outsmart ROI Challenges

Digitization Complicates the ROI Process

The 411 on Subpoenas

By the Numbers

30

Between January and August 2016, at least this percentage of all breaches reported to Health and Human Services' public breach tool can be traced back to business associates and third-party vendors, and 35% of breached records were caused by third-party breaches, according to a report from Protenus and DataBreaches.net.

Quick Code

Questions about lab orders, child status, and moderate sedation find answers.

Twitter
Featured Jobs on AlliedHealthCareers.com