Stream of Consciousness (SOC) — Entry #1

Stream of Consciousness – Entry #1

Something I’m trying to start.

Whenever I feel like it.

So, today I introduce the Stream of Consciousness segment of my blog. A night where I am reading up on an issue and reading some papers and articles and I’m really just writing about them and discussing the research, findings and what not. So tonight, my preferred websites are this, and this. So tonight, March 9th, 2016, will be my first entry in what I hope can be a continuous or at least a frequent form of discussion and pushing not only myself on maintaining this blog but also pushing forward issues that I believe are important. So here goes… Entry #1.

entry 1, hospitals, SOC, infographic

From Locatible, this is what I consider one of the most important graphics that can help with the development and cost containment of medical technology, costs, and big pharma and their unrealistic adminsitrative overhead. A cute infographic that tries to push for change and policy effects that can help not only keep track of physical equipment and records on a digital platform and web app/applet. But with improved medical technology, not only can help improve patient outcomes, but it can also help the entire industry itself with standardization, interoperability, and managerial functions. Medical technology can be developed and improved to help with real-time monitoring, real-time data on dashboards and a variety of other things. They mention that “nobody wants to be waiting” but unfortunately with how things are with exorbitant medical expenditures and limited resources, rationing has become a thing in order to maintain cost efficiency and stability.


A quick aside.

In simple terms, an applet runs under the control of a browser, whereas an application runs stand-alone, with the support of a virtual machine. As such, an applet is subjected to more stringent security restrictions in terms of file and network access, whereas an application can have free reign over these resources.

Applets are great for creating dynamic and interactive web applications, but the true power of Java lies in writing full blown applications. With the limitation of disk and network access, it would be difficult to write commercial applications (though through the user of server-based file systems, not impossible). However, a Java application has full network and local file system access, and its potential is limited only by the creativity of its developers. Applets are designed just for handling the client site problems. while the java applications are designed to work with the client as well as server. Applications are designed to exists in a secure area. while the applets are typically used.


 

healthcare data breach entry #1 SOC infographic

Another infographic that I want to point out has to do with healthcare security. As many people learn, healthcare is a VERY difficult to manage and secure because availability is the opportunity cost to security. Especially with the ever increasing technological capabilities and cloud technologies, patients are demanding access and better technological implementation without realizing the possible security drawbacks. It is a delicate balance of healthcare availability and security and more often than not, security is sacrificed at the terms of money, patient satisfaction and customer referrals and support. A plurality of data breaches in the US are health-care related, and 19/20 organizations had at least one breach within the last two years… like what? That’s terrible, but why is it that we hear very little? Because people don’t want mass panic to erupt when they find out that their supposed protected health information (PHI) is floating somewhere on the web in someone’s hands? These data breaches happen in two ways, for the most part, actual criminal attacks of user negligence in unintentional actions or lost and stolen devices that were not encrypted properly to company standards and policies. “Bring Your Own Device” can actually backfire terribly.

It’s not safe.

Many trust our healthcare providers with personal information, but in most cases it is not always safe. Of all the industries, health care is probably the weakest when it comes to cybersecurity. In addition with malware, ransomware, crimeware etc. have all been terrible and allows people to really take advantage of resources and advantage of breached companies. The cyber criminals, just like their counterparts who rob banks or break into houses, are looking for money. Their targets might start in the birthing wards. Hacking isn’t about brute forcing your way and shoutin “Hoorah”, but it’s about finding the weakest link and manipulating him for personal benefit, technology is also properly training people.

Cybercriminals don’t need to target CEO, they just need to find the weakest link like their secretaries, or nurses etc.

 

Article by Sir. Lappleton III

I'm a happy-go-lucky college student that started a blog as a way to not only document my education and my experiences, but also to share it with whoever stumbles upon my site! Hopefully I can keep you guys entertained as well as learn about a few things from IT as well as from my time and experiences as I plunge deeper and deeper into healthcare! A couple of my areas of focus is data management, system security (cyber security), as well as information technology policy.