Insights

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Filter by Categories
Best Of
Blog
CISO Says
Clinical Workflow Optimization
Clinician Experience
Conferences
Consumer and Patient Experience
Cybersecurity
Growth and Sustainability
Information Technology
INFRAM+
Infrastructure
Interim Leadership
Investment and M&A
Managed Services
Medical Device Protection and Optimization
News
PACs and VNA Advisory
Patient Access Optimization
Strategy and Transformation
Telecom Expense Management
Telecommunications
Unified Communications

Nursing is the Ultimate STEM Training Program

by Daria Rosen | Senior Manager, Client Services Having been in the technology field since the great Y2K non-disaster (remember that?), it’s been a while and for a woman with degrees in business, how I ended up in health care technology is a story that needs telling.   It needs telling because in the United States,…

Read more

How is communication making nursing sick?

by Jennifer Unsworth | Senior Manager, Client Services According to LinkedIn, nursing is the fifth-most in-demand job in the country and the American Nurses Association reported that more RN jobs would be available than any other job in the US in 2022. So why is the country amid a nursing staff crisis? A new report…

Read more

Diversifying Healthcare Leadership, We’re Not Done Yet

by Barbara Casey, CRO A study came out a while back showing that those group brainstorming sessions in front of the whiteboard weren’t always the best way to encourage new ideas. According to the study, peer pressure, long a relic of high school classrooms, was still abundant in the professional ranks. People simply feared speaking…

Read more

What to do about Amazon

by Barbara Casey, CRO On the heels of its quasi-national holiday, Prime Days, Amazon announced on Tuesday, July 26 that it is buying One Medical, a membership-based primary care practice with over 200 locations, for nearly $4 billion. Amazon, who has been flirting with healthcare for some time, is now making its presence felt with…

Read more

Ask for More from Your IT Managed Services Provider

by Red Smith, President, baytechIT As all health systems know, providing for your organization’s IT needs is critical to not only running your business, but also caring for your patients. But most Managed Service Providers (MSPs) take a one-size-fits-all approach that doesn’t take into account the unique needs of your clinical environment. An IT support…

Read more

Healthcare Organizations Can Realize Millions in Savings Through Telecom Expense Management

by David Will Healthcare providers across the country are looking for ways to reduce expenses across the enterprise. Budget pressures are increasing on several fronts including the growing requirements for cybersecurity protection and rising energy utility costs. Decreased staffing levels add to the financial strain, driving overtime expenses to support overworked staff and the need…

Read more

Meet the “Most Influential Women in Health IT” Webinar Recap

On Thursday, June 16th, the Most Influential Women in Health IT Award recipients shared their insights, experiences, and advice on driving transformational change in Health IT in a HIMSS-hosted webinar. Pixel Health’s own Barbara W. Casey, CRO, shared her career journey, how she found her voice as a leader, her thoughts on encouraging more women…

Read more

Ensuring HIT Enables Clinical Workflow

by Kathleen Harmon, MS, RN As a former ED nurse, I often reflect on my direct care delivery experience and recall the feeling of being forced to work in a certain way when new technology was pushed into my workflow that often didn’t make sense. Technology often acted as a barrier, not an enabler for…

Read more

INFRAM Assessments Target Outdated Medical Technology, Processes

Healthcare continues to rapidly transform digitally, increasing the demand for new and better technologies to support clinician and patient workflows. To advance your health system’s digital transformation, it’s critical to first understand the information technology infrastructure supporting day-to-day operations, and then create a go-forward plan for advancement. But devising a comprehensive, sustainable infrastructure strategy can…

Read more

Protecting Your Medical Device Fleet

Healthcare delivery organizations (HDOs) are increasingly the target of cyberattacks, with security breaches resulting in the theft of PHI and data corruption. Of the HDOs hit by ransomware in 2020, only 31% had their data fully restored. In 2021, 79% of all reported attacks targeted HDOs, a 45% increase over the prior year, more than…

Read more

Defending Your Health System Against Cyberattack: People & Process First

Healthcare delivery organizations already know that cyberattack risks continue to escalate. Articles about ransomware attacks, data breaches, and phishing attacks on health systems continue to be in the news with increasing frequency, underscoring the critical need for healthcare delivery organizations to tighten cybersecurity. On March 17th the Office for Civil Rights (OCR) published its first-quarter…

Read more

Renewable & Onsite Energy

Renewable energy is key to the health of our planet and the communities that healthcare delivery organizations serve. The healthcare sector is responsible for an estimated 8.5% of America’s total greenhouse gas emissions according to MedPage Today. On average, hospitals use 31KWH of electricity and 103,600 BTUS of natural gas per square foot per year;…

Read more

Top 10 Healthcare IT Influencers to Follow in 2022

Each year Pixel Health analyzes the top 10 healthcare news sources across the web. This year we were particularly focused on the range of articles each site had not only on the medicine side of healthcare but the patient experience side as well. These are the sites that made the cut. Dr. Kevin Pho Kevin…

Read more

Top 10 Healthcare Blogs for 2022

Each year Pixel Health analyzes the top 10 healthcare news sources across the web. This year we were particularly focused on the range of articles each site had not only on the medicine side of healthcare but the patient experience side as well. These are the sites that made the cut. 33 Charts An expert…

Read more

IoMT: A Medical Blessing and a Security Curse

When your smart thermostat fails, your home may get a little overheated. The breach of a security camera might result in a break in or a stolen package off the front porch. But failure of an Internet-connected heart monitor or the hacking of a device configured to remind an elderly patient to take their hypertension…

Read more

Top 5 Trends in Telehealth

Tele-what? Telemedicine, telehealth—what do they actually refer to, and which one should you use? Both terms describe the remote delivery of healthcare services using telecommunications technology. Often used interchangeably, telemedicine tends to mean the delivery of remote care between provider and patient, whereas telehealth is a bit broader, encompassing a variety of digital technologies and methods for…

Read more

Going Beyond the Technology

You learn a lot by watching. Nectar’s Director of Client Services, Teresa DeLappe, did a lot of observing and learning during the 15 years she spent working across the healthcare continuum at Harborview Medical Center (HMC) in Seattle, Washington.  She was fascinated by the growing technology dependence of healthcare organizations yet at the same time,…

Read more

CISO Says: Cyber Insurance and the Hunt for Affordable Coverage

“People who live in glass houses should take out insurance” and right now, the winds are blowing at hurricane strength.   Between two years of COVID and the seemingly daily headlines of breaches and ransomware attacks, healthcare organizations are reeling. According to a report from Comparitech, attacks in 2020 were double those in 2019, impacting…

Read more

The Digital Transformational Project Manager

Why is it that the words “digital transformation” and “failure” are so often tied together in the same sentence? Why did McKinsey come out with a report that said 70% of digital transformation projects are bound to fail? A recent Forbes article put the number at 84%. Digital transformation can be an exhausting, seemingly never-ending…

Read more

So, You Want to be an IT Executive

In a post-COVID world, IT executives are no longer worker bees, they’re driving the organization’s financial future Another noteworthy consideration is that while most corporations prefer executives to have an MBA or similar degree, it’s not unheard of for a company to put a promising leader who doesn’t have an MBA on the track to…

Read more

INFRAM+: A CIO’s Best Friend (Part 3 of a 3-part series)

INFRAM and INFRAM+ puts IT in the center of the strategic financial decision-making process  It garners invaluable input and support from clinicians, executives, and administrators  Proprietary strategic mapping correlates INFRAM results with clinical goals and provides an IT roadmap for budget and leadership consensus building INFRAM+: More Than Just Another Assessment  In part three of our series, we look at how INFRAM+, a proprietary…

Read more

INFRAM+: It’s All About Process (Part 2 of a 3-part series)

An INFRAM assessment is primarily tactical. INFRAM+ ties directly to clinical strategic initiatives A three-to-four day on site analysis involves IT and primary department, executive, and clinical stakeholders Proprietary strategic mapping ties specific technologies to specific clinical goals INFRAM+: Taking INFRAM from Tactics to Strategy  Not seeing the forest through the trees is a common mistake in the IT business. In part one of our…

Read more

INFRAM+: From Tactical Evaluation to Strategic Initiative

INFRAM+: Tactics vs Strategy  In part 1 of our three–part series, we look at the HIMSS Analytics Infrastructure Adoption Model (INFRAM) as a foundational building block. INFRAM is fast becoming the healthcare industry standard for evaluating a hospital or health system’s infrastructure stability and manageability in five key areas. Mobility  Security  Collaboration  Transport  Data Center  The resulting Baseline Achievement Report is just that, a baseline. INFRAM scores don’t provide a…

Read more

And now for a public service announcement…

T-Mobile recently confirmed that a threat actor stole the full names and driver’s license information for 40 million people last week.  While AT&T is currently denying it, another Threat Actor claims to have stolen the names, phone numbers, physical addresses, email addresses, and Social Security numbers for 70 million of their customers.   Ransomware makes…

Read more

Can You Count to TEM?

If you’re like me, you probably learned to count to ten in kindergarten.  But when it comes to a company’s telecommunications infrastructure, you’d be surprised how many corporate executives have trouble with simple addition. As a company grows, telco, like other IT investments, often gets treated as the necessary evil.  “The new guy needs a…

Read more

HIMSS21: Headlines from a Largely Empty Room

The good and beleaguered folks from the Healthcare Information and Management Systems Society (HIMSS) threw their annual party in Las Vegas with less than half of the usual pre-COVID crowd in attendance. But while the crowds were small and many of the major vendors were absent from the exhibition floor, HIMSS put the spotlight on…

Read more

HIMSS21: The Change is Now

Las Vegas is set to roll out the silicon carpet for HIMSS21, the healthcare technology party of the year. The Healthcare Information and Management Systems Society has selected “Be The Change” as the theme for this year’s conference.  We asked our Pixel Health team going to HIMSS 2021 to expand on what this year’s conference,…

Read more

M&A Due Diligence: Technology is Not an Afterthought

It’s a given in this day and age that technology is the root of a lot of how Healthcare gets done. You’ll often hear doctors say “we are run by the IT department.” In many instances, that’s true.   So why are the IT experts the last people invited to the party when evaluating a…

Read more

Healthcare M&A: Improving Your Odds

If we’re to believe the pundits, 2021 looks to be a rebound year for merger and acquisition activity in the healthcare industry. And not a moment too soon. COVID-19 hit the Mergers & Acquisition business big time in 2020. According to Bain and Company, overall healthcare disclosed deal value decreased by a whopping 37%  (-$339B)…

Read more

Healthcare Innovation: We Need Leadership to Keep it Going

The pandemic was good for something. COVID-19 prompted expanded government reimbursement and the lifting of some regulations, resulting in an enormous amount of money flowing into digital health applications and start-ups. According to the Digital Health Funding report from venture capital firm Rock Health, COVID-19 “created what felt like a fast forward button for digital…

Read more

Darkside: Why is this time different from last time?

During the Jewish holiday of Passover, it’s traditional for the youngest child to ask the four questions, seeking to understand the symbolism behind the story of the exodus from Egypt. “Ma Nishtana” they ask in Hebrew. Why is this night different from all other nights?   That phrase popped into my head as the Colonial…

Read more

Enterprise Imaging. The silos are coming down.

PACS is so turn of the century. When we used to talk about Picture Archiving and Communications Systems (PACS), it tended to be a very siloed discussion. The conversation centered around medical imaging technology used for storing, retrieving, presenting, and sharing images, but Cardiology had their own and Pathology, Radiology, the ED, and other surgical…

Read more

To Outsource or Not Outsource…that is the question

“Do what you do best and outsource the rest,” says Peter Drucker, one of the great management consultants of the 20th century. But it’s not always so simple. When it comes to deciding whether a medical practice should maintain its own IT staff, I often answer with a quote of my own:  “It’s complicated.”  …

Read more

Beware The No Name Hacker

Kevin Mitnick, Adrian Lamo, Albert Gonzalez, Mathew Bevan, and Richard Pryce.  Are these guys household names in your household? These five (and dozens of others), are among the most notorious hackers on the planet, people who spark fear into the hearts and minds of the most sophisticated technology organizations on the planet. These online villains…

Read more

Is it Time to Rid Healthcare of Email?

I know, I might be accused of heresy for even bringing it up. But the statistics are so alarming these days, it’s a discussion that needs to be held at the very highest level of every healthcare organization in America.   For security’s sake, isn’t it time to get rid of email? There, I’ve said…

Read more

The Times They Are A Changin’

While technology is often the catalyst for change, we need to recognize that it is only one of the many tools and influences built into the human aspect of delivering healthcare. The healthcare sector is not moving fast enough to embrace cloud computing, AI, big data, and new technologies and processes to improve outcomes for…

Read more

Burning Down the House

After a week of dealing with attacks on Microsoft Exchange servers,  I got in my car,  turned on the radio, and heard that classic song by the Talking Heads. David Byrne says he wasn’t really singing about a house on fire but instead, about breaking free from whatever was holding you back. And I thought……

Read more

Don’t Just Phish

Recently, a fellow CISO asked a group of us if we “punished employees who consistently failed to recognize phishing emails.” This created a great discussion with most folks agreeing that punishment rarely works and often has negative effects (including potential for legal action). After all, hackers take advantage of people’s willingness to be helpful or…

Read more

Protect Yourself by Protecting Your Smartphone

Talk to any Chief Information Security Officer and they’ll tell you that the weakest link in their organization is always the individual. Take smartphones for example. They’re designed with security in mind but that protection is compromised each and every day. 70 million smartphones are lost each year, with only 7 percent recovered Users are…

Read more

Be Cautious Using Google Search

The “bad guys” constantly look for ways to trick users into giving up information or download malicious software that will steal information.  One of the easiest ways for them to do this is to get you to click on links that show up using a search engine.  Given the popularity of Google search, bad actors…

Read more

Vishing, Smishing, and Phishing. It’s more than Alphabet Soup!

I’ve talked a number of times about Phishing and we’ve talked about Smishing.   Today, I want to touch on the subject of Vishing.  Vishing is Phishing using voice.  This isn’t new.  You’ve all either received or know of folks who’ve received, phone calls from folks pretending to be from “Microsoft Support” or “Visa”.  You may…

Read more

SMiShing

No, this isn’t a typo. SMiShing is the SMS version of phishing scams but instead of a bad email, you get a bad text message on your smartphone.  While smishing has been around for years, its use has increased significantly since March, all thanks to the Coronavirus.  According to the FTC, 52,500 Americans have filed…

Read more

Qbot: Using the Election as Bait

Yes, we are talking about Phishing… again!  The complex methods used by Threat Actors today makes me long for the days when malicious emails were comprised of either very poor English, or someone telling me that I was being gifted $1,000,000 by some person I never heard of in some far away country! The current…

Read more

Multifactor Authentication: What I Know + What I Have

Multifactor authentication (MFA) or Two-Factor authentication (2FA) works on the principle of “something you know” plus “something you have (or are).” “Something you know” is your username and password. “Something you have” can be a smartphone, USB security key, your fingerprint or face, or other physical object in your possession that can be used to…

Read more

EMOTET: This Trick is No Treat

October is Cybersecurity month, so there’s no better time to talk about the scary reality of constant hacker attacks and threat actor tricks. While one should always be vigilant, every day, every email, this month you need to be especially diligent. The cybercommunity has seen a significant increase in the last few weeks of the…

Read more