Search Results

The default setting for search results displays All Content. If you prefer to see recent content only, please adjust the date filter.

11 Results Found

The Critical Link Between Cost, Quality, and Outcomes (CQO) and Unique Device Identification (UDI) White Paper

White Papers
In an effort to capture broader insights on UDI adoption from across the health care field, AHRMM, with participation by the FDA, held LUC Data Quality Workshops during four conferences in 201

Getting Ready for Post-Quantum Cryptography

William Barker Dakota Consulting Gaithersburg, MD William Polk Applied Cybersecurity Division Information Technology Laboratory

Preparing Supply Chain to Meet Meaningful Use

White Papers
This paper will define the regulation and explore how a supply chain department can support their organization in meeting this aspect of the regulations.

Implementing RFID in the Medical Device Supply Chain: The Journey at BJC HealthCare

White Papers
The lack of end-to-end supply chain visibility in the medical device channel contributes to an estimated five billion dollars ($5B) of inventory waste for the U.S.

Concord Hospital Supply Chain Management’s Journey to ISO 9001 Certification

White Papers
This paper will share Concord Hospital’s journey to ISO 9001 certification, define the quality management system (QMS), the six key policies of the QMS and outline the key components of each of tho
Member

Theft of Intellectual Property: Threats to Medical Research and Innovation

In this members-only white paper by the AHA Center for Health Innovation, John Riggi, senior adviser for cybersecurity and risk at the AHA, and Edward You, supervisory special agent for weapons of mass destruction at the FBI, outline growing concern among the FBI, Congress and some health care leaders about the theft of U.S. medical research intellectual property by foreign governments. Recently the Senate Finance Committee held a hearing on foreign threats to taxpayer-funded research.
Public

FBI Alert: TPL White: Increased Number of Emotet Command and Control IP Addresses Identified

In early June 2019, Emotet, an advanced modular banking Trojan, attempted to communicate with 214 command and control (C2) IP addresses for initial instructions, indicating cyber actors recently made modifications or updates to Emotet malware or infrastructure. Immediately following, the Emotet malware ceased communication with the previously known C2 IP addresses.
Public

DejaBlue-High Risk Windows Vulnerability Whitepaper

As a follow-up to our June 6, 2019 white paper on BlueKeep, this report documents a recent alert from Microsoft concerning two similar remote desktop protocol (RDP) vulnerabilities, entitled BlueKeep 2 and BlueKeep 3, together dubbed “DejaBlue.”

Rethinking Risk

White Papers
By Lee Ann Jarousse, Senior Editor, H&HN

Information Governance for Hospitals

White Papers
Health care organizations live or die based on the quality of the data their leaders use to make strategic, business and clinical decisions.