Security

A Primer on Healthcare Cloud Computing

by Trevor Strome January 29, 2015






The following article is a brief summary of an article that I wrote for SearchHealthIT. The National Institute for Standards and Technology defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and […]






Read the full article →

The HIPAA Basics that Healthcare Analytics Professionals and Data Scientists Must Know

by Trevor Strome September 26, 2014






Healthcare analytics professionals and data scientists access and use healthcare data on a near-constant basis. Whether it is for designing dashboards or building predictive models, the use of sensitive information is a necessity in efforts to leverage analytics to improve healthcare. Also essential, however, is keeping the private health information that we access and use […]






Read the full article →

Why your “secure” password isn’t any good, and what to do about it.

by Trevor Strome May 7, 2014






While doing research on information security relating to healthcare analytics, I came across an interesting article by Melanie Pinola about how common tricks we use to “secure” our passwords aren’t fooling the bad guys any more. In her article, she lists four strategies for creating and using more secure passwords: Avoid predictable password formulas (hint: passwords like […]






Read the full article →

Healthcare Information Security At Risk

by Trevor Strome January 2, 2013






Taking information security seriously As a healthcare analytics professional, I work with the private health information of people every day. Typically, when used for driving performance dashboards, developing predictive models, and supporting quality and performance improvement efforts, this information is entirely stripped of identifiable information. On occasion, I work with data that is NOT anonymized, […]






Read the full article →