Protect the Kingdom

Protecting the Fortress

6 tools and tactics that safeguard enterprise assets

“We will bankrupt ourselves in the vain search for absolute security.” ~Dwight D. Eisenhower A hacked database containing thousands of medical records…cyber espionage…power outages…critical systems knocked out of commission by a new firewall configuration…a laptop containing confidential information left in … more

Image_Let Them Eat KPI

Let Them Eat KPI

An integrated approach to KPI and MDM in healthcare

The spotlight on IT in the healthcare industry has never been more blinding. Healthcare reform (e.g., Meaningful Use, ICD-10 conversion) has mandated IT investment in the name of improved clinical/quality outcomes, reduced medical errors and standardized care. Even without these … more

DatabytheBook_Image

Data By The Book

You don’t know what you’ve got till it’s gone

Big data, with all of its vastness and mystery – and confusion – is actually a remarkably straightforward concept: store everything for later analysis. Because once it’s gone, you can’t get it back. The end. Ok…so there’s more to the … more

Page 1 of 3