Closing the SDOH Gap with AI, ML, and Data Analysis
Read how incorporating AI & ML technologies as part of a data analysis strategy can better patient needs, care management, and coordination of SDOH resources.
How Healthcare is Going Google
In today’s age of Digital Transformation, healthcare organizations are increasingly looking to move their data to the cloud. It wasn’t always this way – pre-pandemic,
How to Strengthen Your Cybersecurity Posture in Healthcare
To keep patient and business data safe, it’s vital for healthcare organizations to strengthen their cybersecurity posture. This overall security status and strength of defense
The Top 5 M&A IT Challenges and How to Overcome Them
There are many reasons healthcare organizations undertake mergers and acquisitions (M&A), from consolidating and diversifying service offerings, increasing market share, and even earning economic gains.
Divurgent Tech Team Responds to Latest FBI Warnings of Ransomware Attacks: Top 3 Things to Do Now
Application Rationalization: A Roadmap for IT Security and Efficiency
Application rationalization is a rigorous process that occurs organization-wide in the IT space to identify which applications should be kept, replaced, retired, or consolidated toward that same goal of identifying risks and increasing efficiencies.
Cybersecurity Organizational Structure & Governance
We will examine two popular frameworks and how they can be leveraged to optimize an information security organizational and governance structure.
The Anatomy, Physiology, and Psychology of Healthcare Cyberattacks
by Colin Konschak and Shane Danaher Cyberattacks can impact anyone in any organization or market sector these days, but healthcare organizations and the people
Medjacking: A Life or Death Issue for Leaders in Connected Healthcare
In this whitepaper we look at the risks of medjacking and identify key elements of management strategies to help mitigate those risks.
Preparing Your Cybersecurity Breach Response
by Colin Konschak and Shane Danaher If you’re in healthcare, your organization is an especially attractive cybercrime target because of the value of the
Cybersecurity
We were engaged to review, research, and collaboratively implement a customized Security Transformation Program to establish governance and foundation.
Mitigating Cybersecurity Risk: Is Cyber Insurance the Answer?
by Colin Konschak and Shane Danaher Until recently, healthcare executives tended to ignore the need for cybersecurity, as it was perceived to only be