Let’s Talk About Clinical Interruptions and How We Can Help

Let’s Talk About Clinical Interruptions and How We Can Help

Today’s acute care nurses are carrying a heavy burden, punctuated by an ever-increasing workload, high patient-to-staff ratios, not to mention the significant impact of the COVID-19 pandemic. This burden is compounded by longstanding challenges associated with distractions, stressful shifts, workplace hazards, and the physical demands of the job. It is easy to conclude that nurses need help!

Ransomware Underscores Value of Secure Messaging

Ransomware Underscores Value of Secure Messaging

In 2017, we ran the post below in response to a ransomware attack that hit Britain’s National Health System. Now in 2020, history has predictably repeated itself with a wave of attacks on several hospitals here in the U.S. from Ryuk, a group believed to be operating out of Russia and timed with both a surge in Covid-19 cases and the 2020 presidential election.

Secure Messaging Enhances Critical Value Alerts

Secure Messaging Enhances Critical Value Alerts

To enhance communication between their clinical providers and the laboratory, Geisinger implemented TigerConnect’s secure text messaging for their critical value notifications, automatically alerting the correct physician at the appropriate times. These automatic alerts reduce ineffective workflows, improve time management, and provide patients with critical values quickly and reliably.

What Is HIPAA Compliance and Where Is It Taking Health IT?

What Is HIPAA Compliance and Where Is It Taking Health IT?

Digital technology makes healthcare organizations more effective and efficient, reducing the potential for human error and speeding clinical communications. But it can also threaten patient privacy. Congress recognized this risk in the mid-90s — a decade before smartphones and nearly 15 years before required electronic health records (EHR) — and passed the Health Insurance Portability and Accountability Act of 1996 (HIPAA). This legislation sets national standards for patient privacy and, eventually, for healthcare data security as well.

End of content

End of content