Palliative Care Physician Q&A: Care & Support With Terminal Illness

CANDYL EYSTER | November 8, 2016

article image
November is National Hospice and Palliative Care Month: Know Your Options. Palliative care is the medical specialty focused on the relief of symptoms associated with serious illness and hospice care is palliative care applied to patients nearing the end of life. One of the most significant differences between hospice and palliative care is palliative care can be utilized in conjunction with curative treatment.

Spotlight

RCCH HealthCare Partners

Based in Brentwood, Tennessee, RCCH HealthCare Partners is made up of 17 regional health systems located in 13 states. We have more than 14,000 employees and 2,000 affiliated physicians and mid-level providers.

OTHER ARTICLES

Interoperability and the clinically connected healthcare operations platform

Article | February 27, 2020

One off implementation services often take additional time to build, are more brittle and susceptible to failure, are less performant, and can impede realizing full value from your ERP investment. Productized integration means that there is ongoing coordination of the ERP application, the interface design, and the EHR, and that the interfaces are optimized for performance and tested prior to release. Productized integration delivers value faster and more reliably than one off implementations. For example, Infor Clinical Bridge is a product and subject to the exacting product design and testing process required for product release.

Read More

What is the need for SOC in Healthcare?

Article | June 3, 2021

With data security becoming a pressing issue in the healthcare industry, having a robust security operations center is the cybersecurity solution. Over the past few years, US Department of Health and Human Services (HHS) data breaches have been at an all-time high. Moreover, in the United States alone, cyber-attacks on the healthcare systems result in a loss of US$6.2 billion every year. Thus, making the use of SOC in healthcare very crucial.

Read More

Healthcare Providers Remain Targets for Ransomware Attacks in the Midst of COVID-19 Pandemic

Article | April 1, 2020

Although it was widely reported that several ransomware threat actor groups have pledged to not target healthcare providers until the COVID-19 pandemic is over, BakerHostetler’s Digital Assets and Data Management Practice Group and Healthcare Privacy and Compliance team continue to see ransomware attacks launched against healthcare providers. In order to combat the COVID-19 pandemic, healthcare providers have had to radically change their normal business processes, which could make them more vulnerable to ransomware attacks. The response to the COVID-19 pandemic has required healthcare providers to make difficult choices related to workforce staffing. Some healthcare providers have been forced to furlough or lay off nonessential workforce members. Healthcare providers also are permitting some workforce members to work remotely. As previously reported by the Data Privacy Monitor, having a reduced workforce and a remote workforce could put healthcare providers more at risk for cybercrime, including ransomware attacks.

Read More

How Blockchain Technology Will Improve Mobile Healthcare

Article | March 27, 2020

The key concerns of healthcare management today are data processing and data security. Patients don’t have full ownership of their medical records, and are unable to control how their information is updated. There isn’t enough transparency to the process. There are also significant concerns related to data security, especially in the areas of personalized medicine and the rise of wearables. Patients and medical staff need secure and straightforward ways to record data, send it over networks, and receive advice without security concerns. Blockchain technology can help solve these problems. Introduced in 2008 as a means of recording cryptocurrency transactions, blockchain is a distributed cloud-based ledger that offers the ability to verify the origin of data and prevent breaches. When a user wants to make a transaction, they issue a request signed with their private key. The network verifies its authenticity by using a public key. If the verification is successful, the transaction is broadcast to the network and included in a block. The network of “miners” solves the block to get a reward, and once the block is revealed, it is added to the blockchain, making it permanent. It’s impossible to introduce new information in a block unnoticed, because that would change the structure of the entire chain. This feature makes the system safe and transparent.

Read More

Spotlight

RCCH HealthCare Partners

Based in Brentwood, Tennessee, RCCH HealthCare Partners is made up of 17 regional health systems located in 13 states. We have more than 14,000 employees and 2,000 affiliated physicians and mid-level providers.

Events