Risk Management
According to researchers at the University of Michigan, the more a hospital relies on its ICU to treat heart patients, the worse their results are, especially when it comes to 30-day morbidity.
A Ukrainian hacker said he has stolen over 105,000 internal documents from Central Ohio Urology Group, based in Gahanna, Ohio. The Urology Group is touted to be the second-largest health system in the state with 24 locations.
The money comes as the number of Zika-infected patients in Miami passed 10, the Centers for Disease Control and Prevention issued a travel warning to the area, and many people are blaming Congress for not acting earlier to fund Zika work.
Georgia-based Athens Orthopedic Clinic is investigating a recent data breach in which as many as 397,000 current or former patients' information was compromised, potentially including personal medical information.
Health officials believe these are the first cases of local Zika virus transmission by mosquitoes in the continental United States.
Their findings are important because, under the health law, services that the task force assigns an "A" or "B" grade must generally be covered by health plans, including Medicare, without charging consumers anything out of pocket.
After two dozen infections were reported in French and Dutch hospitals, the company alerted European customers in January 2013 that a scope it manufactured could become contaminated.
The threat of ransomware attacks on health care facilities is greater than ever as cybercriminals see the opportunity to make money by encrypting health data in EHRs and demanding payment to unlock it.
The hacker broke into organizations on the HL7 network, the security firm has found, and has since put those records up for sale on the dark web. The security firm also said TheDarkOverlord is actively looking for more servers to hack in healthcare.
The U.S. Department of Health and Human Services Office for Civil Rights has released its guidance to help healthcare organizations handle ransomware attacks, including prevention methods, a detailed description of ransomware and advice on how to respond to a ransomware threat.