BOARD CERTIFICATION EXAM STUDY GUIDES Lower Extremity Trauma
[Click on Image to Enlarge]
ME-P Free Advertising Consultation
The “Medical Executive-Post” is about connecting doctors, health care executives and modern consulting advisors. It’s about free-enterprise, business, practice, policy, personal financial planning and wealth building capitalism. We have an attitude that’s independent, outspoken, intelligent and so Next-Gen; often edgy, usually controversial. And, our consultants “got fly”, just like U. Read it! Write it! Post it! “Medical Executive-Post”. Call or email us for your FREE advertising and sales consultation TODAY [678.779.8597] Email: MarcinkoAdvisors@outlook.com
Medical & Surgical e-Consent Forms
ePodiatryConsentForms.com
iMBA Inc., OFFICES
Suite #5901 Wilbanks Drive, Norcross, Georgia, 30092 USA [1.678.779.8597]. Our location is real and we are now virtually enabled to assist new long distance clients and out-of-town colleagues.
ME-P Publishing
SEEKING INDUSTRY INFO PARTNERS?
If you want the opportunity to work with leading health care industry insiders, innovators and watchers, the “ME-P” may be right for you? We are unbiased and operate at the nexus of theoretical and applied R&D. Collaborate with us and you’ll put your brand in front of a smart & tightly focused demographic; one at the forefront of our emerging healthcare free marketplace of informed and professional “movers and shakers.” Our Ad Rate Card is available upon request [678-779-8597].
Classic Definition: Scientific research depends on the referencing and citing of other research.
Modern Circumstance: The Google Scholar Paradox is that research which gets cited most often is whatever shows up in the top results of Google Scholar searches; regardless of its contribution to the field.
Paradox Example: The Google Scholar effect is a phenomenon when some medical and healthcare researchers pick and cite works appearing in the top results on Google Scholar regardless of their contribution to the citing publication.
Paradoxically they automatically assume these works’ credibility and believe that editors, reviewers, and readers expect to see these citations.
Population health and public health are two interrelated disciplines that strive to enhance the health outcomes of communities. While they share a common mission—to reduce health disparities and promote wellness—their approaches, target populations, and operational frameworks differ significantly.
***
***
Public health is traditionally defined as the science and art of preventing disease, prolonging life, and promoting health through organized efforts and informed choices of society, organizations, public and private sectors, communities, and individuals. It focuses on the health of the general population and emphasizes broad interventions such as vaccination programs, sanitation, health education, and policy advocacy. Public health professionals often work in government agencies, nonprofit organizations, and academic institutions to implement community-wide initiatives that prevent disease and promote healthy behaviors.
***
***
In contrast, population health takes a more targeted approach. It refers to the health outcomes of a specific group of individuals, including the distribution of such outcomes within the group. This field is particularly concerned with the social determinants of health—factors like income, education, environment, and access to care—that influence health disparities. Population health strategies often involve data-driven interventions tailored to the needs of defined groups, such as rural communities, ethnic minorities, or patients with chronic conditions.
One key distinction lies in scope and granularity. Public health initiatives are typically designed for the entire population, aiming to create systemic change. For example, anti-smoking campaigns or water fluoridation programs benefit everyone regardless of individual risk. Population health, however, might focus on reducing diabetes rates among Hispanic adults in a specific urban area, using targeted outreach and culturally sensitive care models.
Another difference is in data utilization. Population health relies heavily on health informatics and analytics to identify trends, allocate resources, and evaluate outcomes. This evidence-based approach supports precision in addressing health inequities. Public health also uses data, but often at a broader level to guide policy and monitor general health indicators like life expectancy or disease prevalence.
Despite these differences, the two fields are complementary. Public health lays the foundation for healthy societies through preventive infrastructure, while population health builds on this by addressing nuanced needs within subgroups. Together, they form a holistic framework for improving health outcomes across diverse communities.
In today’s healthcare landscape, the integration of public and population health is increasingly vital. The COVID-19 pandemic underscored the importance of both approaches: public health measures like mask mandates and vaccination campaigns were essential, while population health efforts ensured vulnerable groups received targeted support.
In conclusion, while public health and population health differ in focus and methodology, they are united by a shared goal: to foster healthier communities. Understanding their distinctions enables more effective collaboration and innovation in health policy, care delivery, and community engagement.
SPEAKING: ME-P Editor Dr. David Edward Marcinko MBA MEd will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit an RFP for speaking engagements: CONTACT: Ann Miller RN MHA at MarcinkoAdvisors@outlook.com -OR-http://www.MarcinkoAssociates.com
Posted on September 27, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
A paradox is a statement that appears at first to be contradictory, but upon reflection then makes sense. This literary device is commonly used to engage a reader to discover an underlying logic in a seemingly self-contradictory statement or phrase. As a result, paradox allows readers to understand concepts in a different and even non-traditional
***
***
GOVERNMENT HEALTH INFORMATION IS TRUSTED?
Classic Definition: Despite the PP-ACA, there is ambivalence about the role of the US Government as a source of quality healthcare information.
Modern Circumstance: Of brands presented to respondents in a Consumer Reports (50 percent), and AARP (37 percent) survey, they outpolled the “US Government Healthcare Quality Reporting Website” (36 percent) and Medicare Website (32 percent).
Paradox Example: The focus groups expressed “mixed reactions and raised doubts about government involvement in quality ratings information. At least one participant in each group expressed skepticism about trusting ‘the government’ to compile information.”
Younger consumers especially questioned the relevance of Medicare measures to the non-elderly population. Yet participants gravitated to “.gov” websites over “.org” websites as a more authoritative source.
CITE: Williams, Jason: Health Affairs, December 28, 2016
[An Internet WIKI CROWD-SOURCED Curation Project]*
To keep up with the ever-changing healthcare industrial complex, we must learn new definitions and re-learn old terminology in order to correctly apply it to practice. By aggregating the most up-to-date abbreviations, acronyms, definitions and terms, the Health DictionarySeries offers a wealth of information to help understand the ever-changing terms-of-art in healthcare today.
Each 10,000 item handbook is essential for doctors, nurses, benefits managers and insurance agents, CPAs, and administrators; as well as graduate and under graduate students and professors. Our goal to for each dictionary to be designated as a Doody’s Core Title.
Dictionary of Health Insurance and Managed Care
With more than 8,000 definitions, 4,000 abbreviations and acronyms, and a 3,000 item oeuvre of resources, readings, and nomenclature derivatives, this dictionary covers the Medicare, managed care and Medicaid, private insurance, Veteran’s Administration and PP-ACA language of the entire health and long-term care insurance sector.
Dictionary of Health Economics and Finance
Health economics and finance is an integral component of the health care industrial complex. Its language is a diverse and broad-based concept covering many other industries: accounting, mathematics, the actuarial sciences, stochastics and statistics, salary reimbursements, physician payments, compensation and forecasting are all commingled arenas.
Dictionary of Health Information Technology Security
There is a myth that all healthcare stakeholders understand the meaning of information technology jargon. In truth, the vernacular of contemporary systems is unique, and often misused or misunderstood. Moreover, emerging Heath Information Technology (HIT) thru the HITECG initiatives; in the guise of terms, definitions, acronyms, abbreviations and standards; often puts the non-expert in a position of maximum uncertainty and minimum productivity.
*NOTE: A wiki website allows users to add or update content using their browser thru a hosted server created by the collaborative effort of site visitors. The Hawaiian term “wiki wiki” means “super fast.”
Although 97% of people aren’t yet millionaires, many could eventually meet that target if they start investing sooner rather than later; especially doctors [MD, DO, DPM, DDS or DMD].
A 20-year-old, for instance, needs to invest just $330 a month into an asset class that delivers a 7% to 8% annual return to reach $1.26 million by the time s/he turns 65 years old. The luxury of time significantly boosts your chances of becoming a millionaire.
This doesn’t mean it’s too late for middle-aged savers to reach that millionaire milestone, but it will take a significantly greater investment. If a 50-year-old doctor hasn’t started saving for retirement, s/he would need to invest $3,958 a month at a steady 7% return to reach $1.26 million by retirement.
However, according to one Goldman Sachs report, investors could expect the S&P 500 to deliver just 3% annualized nominal returns over the next 10 years.
After an average 13% yearly return for the past decade, a new strategy outside of the stock market may be needed for that level of outsized gain, especially if you’re late to investing.
SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit an RFP for speaking engagements: CONTACT: Ann Miller RN MHA at MarcinkoAdvisors@outlook.com -OR-http://www.MarcinkoAssociates.com
Posted on July 20, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
By A.I.
***
***
The GENIUS Act is the law of the Land
President Trump signed the bill into law Friday, setting up a framework for regulating stablecoins—digital currency pegged to traditional assets—that are linked to the US dollar. It’s a big win for the crypto industry, and Trump said it was a “giant step to cement American dominance of global finance and crypto technology.”
The law could help push stablecoins into the mainstream, and major companies like Walmart and Amazon have been said to be considering launching their own, according to Morning Brew.
Much has been written and much has been opined on the topic of health information technology, electronic health records and medical security liability for physicians and healthcare providers in this textbook. But occasionally, we all still get lost in a wide array of acronyms, jargon and terms that are constantly changing in this ecosystem. And so, this brief glossary serves as a ready reference for those who want to know about these definitions in a quick and ready fashion.
Access control: The process of controlling the access of a user
Access security: To allow computer or healthcare network entry using ID / password / secure socket layer (SSL) encryption / biometrics, etc; unique identification and password assignments are usually made to medical staff members for access to medical information on a need-to-know basis, and only upon written authority of the owner of the data.
Access level authorization: Establishes a procedure to determine the computer or network access level granted to individuals working on or near protected health information, medical data or secure health data.
Accredited standards committee: Organization that helps develop American National Standards (ANS) for computer and health information technology; accredited by ANSI for the development of American National Standards; ASC X12N develops medical electronic business exchange controls like 835-Health Care Claim Payment/Advice and 837-Health Care Claim.
Accountability: The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.
Accounting: Creating an historical record of who was authenticated, at what time, and how long they accessed the computer system.
Administrative simplification: The use of electronic standard code sets for health information exchange; Title II, Subtitle F of HIPAA gives HHS the authority to mandate the use of standards for the electronic exchange of health care data; to specify what medical and administrative code sets should be used within those standards; to require the use of national identification systems for health care patients, providers, payers (or plans), and employers (or sponsors); and to specify the types of measures required to protect the security and privacy of personally identifiable health care and medical information.
Alternative backup sites: Off-site locations that are used for transferring computer operations in the event of an emergency.
American Health Information Management Association: A large trade association of health information and medical data management professionals.
American Medical Informatics Association: An organization that promotes the use of electronic medical management and healthcare informatics for clinical and administrative endeavors.
American Telemedicine Association: Established in 1993 as a leading resource and advocate promoting access to medical care for patients and health professionals via telecommunications technology; membership open to individuals, companies, and other organizations with an interest in promoting the deployment of telemedicine throughout the world.
Anti-virus software: A software package or subscription service used to thwart malicious computer or network attacks, such as: Symantec®, McAfee®, Trend Micro®, Panda Software®, Sunbelt Software®, Computer Associates®, AVG® or MS-FF ®, etc.
ASC X12N: HIPAA transmission standards, specifications and implementation guides from the Washington Publishing Company; or the National Council of Prescription Drug Programs.
Assurance: Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or bypass.
Asymmetric cryptology: The use of two different but mathematically related electronic keys for secure health data and medical information storage, transmission and manipulation.
Asymmetric encryption: Encryption and decryption performed using two different keys, one of which is referred to as the public key and one of which is referred to as the private key; also known as public-key encryption.
Asymmetric key: A half of a key pair used in an asymmetric “public-key” encryption system with two important properties: (1) the key used for encryption is different from the one used for decryption, (2) neither key can feasibly be derived from the other.
Attack tree: An inverted tree diagram that provides a visual image of the attacks that may occur against an asset.
Audio teleconferencing: A multi-simultaneous dual voice communications between two parties at remote locations; two way communications between physician and patient at various locations.
Authentication: The process of verifying and confirming the identity of a user.
Availability: The security goal that generates the requirement for protection against – Intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data.
Back door: A means to access to a computer program that bypasses security mechanisms, sometimes installed by a programmer so that the program can be accessed for troubleshooting or other purposes.
Back door trojans or bots: Currently, the biggest threat to healthcare and all PC users worldwide according to the MSFT Corporation.®
Bandwidth: The amount of information that can be carried over a communications link.
Bar coding systems: Final FDA ruling issued in February 2004 that required bar codes on most prescription and non-prescription medications used in hospitals and dispensed based on a physician’s order; the bar code must contain at least the National Drug Code (NDC) number, which specifically identifies the drug; although hospitals are not required at this time to have a bar code reading system on the wards, this ruling has heightened the priority of implementing hospital-wide systems for patient-drug matching using bar codes.
Baud: A unit of digital transmission that indicates the speed of information flow. The rate indicates the number of events able to be processed in one second and is expressed as bits per second (bps). The baud rate is the standard unit of measure for data transmission capability; typical older rates were 1200, 2400, 9600, and 14,400 baud; the signaling rate of a telephone line in the number of transitions made in a second; 1/300 sec = 300 baud.
Beta test: The secondary or final stress examination of newly developed computer hardware, software or peripheral devices; site, etc.
Bibliographic database: Indexed computer or printed source of citations of journal articles and other reports in the literature; typically include author, title, source, abstract, and/or related information; MEDLINE® and EMBASE®.
Bioinformatics: The application of medical and biological science to the health information management field.
Biological Information technology: Cross industry alliance of the Microsoft Corporation to enhance the ability to use and share digital health and biomedical data.
Biometric: Personal security identity characteristics, such as a signature, fingerprints, voice, iris or retinal scan, hand or foot vein geometry, facial characteristics, hair analysis, eye, blood vessel or DNA; uses the unique human characteristics of a person as a means of authenticating.
Biometric identification: Secure identification using biometrics that identifies a human from a measurement of a physical feature or repeatable action of the individual (for example, hand geometry, retinal scan, iris scan, fingerprint patterns, facial characteristics, DNA sequence characteristics, voice prints, and hand written signature).
Biopassword: Start-up healthcare IT security pioneer of keyboarding patterns to boost online security through neural network patterns.
Bluetooth® device: Machines, like cell phone with headset, transmitting across communications channels 1 to 14, over time.
Bluetooth® technology: Wireless mobile technology standard built into millions of mobile phones, headsets, portable computers, desktops and notebooks; named after Harold Bluetooth, a 10th century Viking king; healthcare telemetry and rural data transmissions; the Bluetooth Special Interest Group (BSIG) advocates measures aimed at pushing healthcare interoperability for wireless devices and other computers designed for use in the medical field; other wireless stands include: Wi-Fi, ZigBe®, IrDA and RFID.
Buffer: A temporary storage area.
Buffer overflow: A security breach that occurs when a computer program attempts to stuff more data into a temporary storage area than it can hold
Business continuity plan: A plan that outlines the procedures to follow after a business experiences an attack on its security.
California Database Security Breach Act: A state act that requires disclosure to California residents if a breach of personal information has or is believed to have occurred.
Certification authority: An independent third-party organization that assigns digital certificates.
Chain of custody: A process that documents everyone who has had contact with or direct possession of the evidence.
Chain of trust: Suggestion that each and every covered entity and business associate share responsibility and accountability for confidential PHI.
Chain of trust agreement: Contract entered into by two business partners in which it is agreed to exchange data and that the first party will transmit information to the second party, where the data transmitted is agreed to be protected between the partners; sender and receiver depend upon each other to maintain the integrity and confidentiality of the transmitted information; multiple two-party contracts may be involved in moving information from the originator to the ultimate recipient; for example, a provider may contract with a clearing house to transmit claims to the clearing house; the clearing house, in turn, may contract with another clearing house or with a payer for the further transmittal of those same claims.
Children’s Online Privacy Protection Act: A federal act that requires operators of online services or Web sites directed at children under the age of 13 to obtain parental consent prior to the collection, use, disclosure, or display of a child’s personal information.
Cipher lock: A combination lock that uses buttons that must be pushed in the proper sequence in order to open the door.
Clearing house: HIPAA medical invoice, healthcare data transaction exchange and medical data implementation service center that that meets or exceeds Federally-mandated standardized Electronic Data Interchange (EDI) transaction requirements.
Clinger-Cohen Act: Public Law 104-106; Information Technology Management Reform Act (ITMRA) of 1996.
Clinical data: Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc; identifiable patient medical information.
Clinical data information systems: Automatic and securely connected system of integrated computers, central severs and the Internet that transmits Protected Health Information (PHI) from patient, physician, laboratory, clinic, hospital and/or payer, etc.
Clinical data repository: Electronic storehouse of encrypted patient medical information; clinical data storage.
Clinical informatics: The management of medical and clinical data; the use of computers, networks and IT for patient care and health administration.
Clinical information: All the related medical information about a patient; Protected Health Information (PHI) from patients, providers, laboratories, clinics, hospitals and/or payers or other stakeholders, etc.
Clinical information system: A computer network systems that supports patient care; relating exclusively to the information regarding the care of a patient, rather than administrative data, this hospital-based information system is designed to collect and organize data.
Clinical regional health information system: Electronic entity committed to securely share private patient health information among entities like medical providers, clinics, laboratories, hospitals, outpatient centers, hospice and other healthcare facilities; Community Health Management Information Systems (CHMIS), Enterprise Information Networks (EINs), Regional Health Information Networks (RHINs) and Health Information Networks (HINs).
Cold site: An alternative backup site that provides the basic computing infrastructure, such as wiring and ventilation, but very little equipment.
Compact disc – read only memory (CD-ROM): A computer drive that can read CD-R and CD-RW discs.
Compact disc – recordable (CD-R): An optical disc that contains up to 650 megabytes of data and cannot be changed once recorded.
Compact disc – rewriteable (CD-RW): An optical disc that can be used to record data, erase it, and re-record again.
Computer security: A computer or network that is free from threats against it.
Computerized Physician Order Entry System: Automatic medical provider electronic medical chart ordering system that usually includes seven features: medication analysis, system order clarity, increased work efficiency, point of care utilization, benchmarking and performance tracking, on-line alerts and regulatory reporting.
Confidential health information: Protected Health Information (PHI) that is prohibited from free-use and secured from unauthorized dissemination or use; patient specific medical data.
Counter signature: The ability to prove the order of application of signatures; analogous to the normal business practice of signing a document which has already been signed by another party (ASTM E 1762 -95); part of a digital signature.
Covered entity: 42 CFR § 164.504(e)(2)(i)(B). Any of three broadly defined entities that deal with protected health information (PHI): providers, individuals or group health plans, and clearinghouses.
Cracker: A person who breaks into or otherwise violates the system security with a malicious intent.
Cryptography: The science of transforming information so that it is secure while it is being transmitted or stored.
Cyber-terrorism: Attacks by a terrorist group using computer technology and the Internet to cripple or disable a nation’s electronic infrastructure.
Data backup: The process of copying data to another media and storing it in a secure location.
Data encryption standard: An older health or medical data private key cryptology federal protocol for secure information exchange; replaced by AES.
Data interchange standard: X12 HIPAA health data transmission standard format.
Data interchange standard association: The organization that provides X12 HIPAA transmission standards and formats.
Deadbolt lock: A lock that extends a solid metal bar into the door frame for extra security.
Decision support system: Computer tools or applications to assist physicians in clinical decisions by providing evidence-based knowledge in the context of patient-specific data; examples include drug interaction alerts at the time medication is prescribed and reminders for specific guideline-based interventions during the care of patients with chronic disease; information should be presented in a patient-centric view of individual care and also in a population or aggregate view to support population management and quality improvement.
Decryption: Changing an encrypted message back to its original form.
Definition files: Files that contain updated antivirus information.
De-identified health information: Protected health information that is no longer individually identifiable health information; a covered entity may determine that health information is not individually identifiable health information only if: (1) a person with appropriate knowledge of and experience with generally accepted statistical and scientific principles and methods for rendering information not individually identifiable determines that the risk is very small that the information could be used, alone or in combination with other available information, to identify an individual, and documents the methods and results of the analysis; or (2) the following identifiers of the individual, relatives, employers or household members of the individual are removed.
Denial of service: The prevention of authorized access to resources or the delaying of time critical operations.
Designated record set: Contains medical and billing records and any other records that a physician and/or medical practice utilizes for making decisions about a patient; a hospital, emerging healthcare organization, or other healthcare organization is to define which set of information comprises “protected health information” and which set does not; contains medical or mixed billing records, and any other information that a physician and/or medical practice utilizes for making decisions about a patient. It is up to the hospital, EHO, or healthcare organization to define which set of information comprises “protected health information” and which does not though logically this should not differ from locale to locale. The patient has the right to know who in the lengthy data chain has seen their PHI. This sets up an audit challenge for the medical organization, especially if the accountability is programmed, and other examiners view the document without cause.
Designated standard: HIPAA standard as assigned by the department of HHS
Device lock: A steel cable and a lock used to secure a notebook computer.
Digital certificate: A certificate that binds a specific person to a public key.
Digital imaging and communications in medicine: Technology broadband transmission imaging standards for X-rays, MRIs, CT and PET scans, etc; health IT standard transmissions platform aimed at enabling different computing platforms to share image data without compatibility problems; a set of protocols describing how radiology images are identified and formatted that is vendor-independent and developed by the American College of Radiology and the National Electronic Manufacturers Association.
Digital radiology: Medical digital imaging applied to x-rays, CT, PET scans and related non-invasive and invasive technology; broadband intensive imaging telemedicine.
Digital rights management: The control and protection of digital intellectual property.
Digital signature: Encrypted electronic authorization with verification and security protection; private and public key infrastructure; based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters so that the identity of the signer and the integrity of medical or other data can be verified.
Digital signature standard: Encryption technology to ensure electronic medical data transmission integrity and authentication of both sender and receiver; date and time stamps; public and private key infrastructure.
Digital versatile disc – recordable (DVD-R): An optical disc technology that can record once up to 3.95 gigabytes of data on a single-sided disc and 7.9 GB on a double-sided disc.
Digital versatile disc – rewriteable (DVD-RAM): An optical disc technology that can record, erase, and re-record data and has a capacity of 2.6 GB (single side) or 5.2 GB (double side).
Digital versatile disc (DVD): A technology that permits large amounts of data to be stored on an optical disc.
Disaster recovery plan: A process to restore vital health and/or critical healthcare technology systems in the event of a medical practice, clinic, hospital or healthcare business interruption from human, technical or natural causes; focuses mainly on technology systems, encompassing critical hardware, operating and application software, and any tertiary elements required to support the operating environment; must support the process requirements to restore vital company data inside the defined business requirements; does not take into consideration the overall operating environment; an emergency mode operation plan is still necessary.
Disclosure: Release of PHI outside a covered entity or business agreement space, under HIPAA; the release, transfer, provision of access to or divulging of medical information outside the entity holding the information.
Disc – rewriteable (DVD-RW): An optical disc technology that allows data to be recorded, erased, and re-recorded.
Due care: Managers and their organizations have a duty to provide for information security to ensure that the type of control, the cost of control, and the deployment of control are appropriate for the system being managed.
e-health: Emerging field in the intersection of medical informatics, public health and business, referring to health services and information delivered or enhanced through the Internet and related technologies; characterizes not only a technical development, but also a state-of-mind, attitude, and a commitment for networked, global thinking, to improve health care worldwide by using information and communication technology.
Electronic data interchange: Inter healthcare organization computer-to-computer transmission of business or health information in a standard format; direct transmission from the originating application program to the receiving, or processing, application program; an EDI transmission consists only of business or health data, not any accompanying verbiage or free-form messages; a standard format is one that is approved by a national or international standards organization, as opposed to formats developed by health industry groups, medical practices, clinics or companies; the electronic transmission of secure medical and financial data in the healthcare industrial complex; X12 and similar variable-length formats for the electronic exchange of structured health data. The Centers for Medicare and Medicaid Services (CMS) regulates security and Electronic Data Interchange (EDI).
Electronic data interchange standards: The American National Standards Institute (ANSI) set of EDI standards known as the X12 standards. These standards have been developed by private sector standards development organizations (SDOs) and are maintained by the Accredited Standards Committee (ASC) X12. ANSI ASC X12N standards, Version 4010, were chosen for all of the transactions except retail pharmacy transactions, which continue to use the standard maintained by the National Council for Prescription Drug Programs (NCPDP) because it is already in widespread use. The NCPDP Telecommunications Standard Format Version 5.1 and equivalent NCPDP Batch Standard Version 1.0 have been adopted in this rule (health plans will be required to support one of these two NCPDP formats). The standards are designed to work across industry and company boundaries. Changes and updates to the standards are made by consensus, reflecting the needs of the entire base of standards users, rather than those of a single organization or business sector. Specifically, the following nine healthcare transactions were required to use X12N standard electronic claim formats by October 16, 2003.
Electronic health record: A real-time patient health record with access to evidence-based decision support tools that can be used to aid clinicians in decision-making; the EHR can automate and streamline a clinician’s workflow, ensuring that all clinical information is communicated; prevents delays in response that result in gaps in care; can also support the collection of data for uses other than clinical care, such as billing, quality management, outcome reporting, and public health disease surveillance and reporting; electronic medical record.
Electronic medication administrative record: Electrical file keeping computerized system for tracking clinical medication dispensation and use; integrated with TPAs, PBMs, robotic dispensing devices and CPOEs, etc.
Electronic medical (media) claims: Usually refers to a flat file format used to transmit or transport medical claims, such as the 192-byte UB-92 Institutional EMC format and the 320-byte Professional EMC-NSF.
Electronic prescribing: A type of computer technology whereby physicians use handheld or personal computer devices to review drug and formulary coverage and to transmit prescriptions to a printer or to a local pharmacy; e-prescribing software can be integrated into existing clinical information systems to allow physician access to patient-specific information to screen for drug interactions and allergies.
Electronic preventive services selector: A digital tool for primary care clinicians to use when recommending preventive services for their patients unveiled by the Department of Health and Human Services’ Agency for Healthcare Research and Quality (AHRQ), in November 2006; designed for use on a personal digital assistant (PDA) or desktop computer to allow clinicians to access the latest recommendations from the AHRQ-sponsored U.S. Preventive Services Task Force; designed to serve as an aid to clinical decision-making at the point of care and contains 110 recommendations for specific populations covering 59 separate preventive services topics; a real time search function allows a clinician to input a patient’s age, gender, and selected behavioral risk factors, such as whether or not they smoke, in the appropriate fields, while the software cross-references the patient characteristics entered with the applicable Task Force recommendations and generates a report specifically tailored for that patient.
Electronic signature: Various date and time stamped electronic security verification systems, such as passwords, encryption, ID numbers, biometrics identifiers, etc; electrical transmission and authentication of real signatories; signatory attribute that is affixed to an electronic health document to bind it to a particular entity; an electronic signature process secures the user authentication (proof of claimed health identity, such as by biometrics (fingerprints, retinal scans, hand written signature verification, etc.), tokens or passwords) at the time the signature is generated; creates the logical manifestation of signature (including the possibility for multiple parties to sign a medical document and have the order of application recognized and proven) and supplies additional information such as time stamp and signature purpose specific to that user; and ensures the integrity of the signed document to enable transportability, interoperability, independent verifiability, and continuity of signature capability; verifying a signature on a document verifies the integrity of the document and associated attributes and verifies the identity of the signer; there are several technologies available for user authentication, including passwords, cryptography, and biometrics (ASTM 1762-95).
Encryption: Changing the original text to a secret message.
Gigabytes (GB): Billions of bytes of data.
Gramm-Leach-Bliley Act: A federal act that requires private data be protected by banks and financial institutions.
Hacker: A person who possesses advanced computer skills and is adept at exploring computers and networks in order to break into them.
HEALTH 1.0: This is the dying healthcare system of yesterday and today. Information is communicated from doctors to patients. It is a basic B2C [business-to-consumer] website as the internet became one big encyclopedia by aggregating knowledge silos. Some doctors maintain websites, others do not. Nevertheless, Health 1.0 has a command and control hierarchy; doctors on top of the pyramid, patients on the bottom.
HEALTH 2.0:According to Matthew Holt [personal communication] Healthcare 2.0 may be defined as: “The foundation of healthcare 2.0 is information exchange plus technology. It employs user-generated content, social networks and decision support tools to address the problems of inaccessible, fragmentary or unusable health care information. Healthcare 2.0 connects users to new kinds of information, fundamentally changing the consumer experience (e.g., buying insurance or deciding on/managing treatment), clinical decision-making (e.g., risk identification or use of best practices) and business processes (e.g., supply-chain management or business analytics)”.
And so, if Health 1.0 was a static book, Health 2.0 is a dynamic discussion
Example: The power of the internet is illustrated in the phenomenon of “crowd-sourcing.” In this context, the term means to harvest the reach of social networking [wisdom of crowds] to solve a problem. A knowledge seeker asks a question and participants respond. For example, readers can participate on the www.MedicalExecutivePost.com or www.BusinessofMedicalPractice.com sites to improve the administration of any medical practice. And, www.PodiatryPrep.com is an example of how podiatrists connect for global board certification assistance.
***
***
HEALTH 2.0 Plus:The Dictionary of Health Insurance and Managed Care defines this emerging hybrid as a bridge uniting the philosophy of contemporary Health 2.0 with futuristic Health 3.0 technologies. Cisco System’s HealthPresence is one example developed in 2010, by Dr. T. Warner Hudson. Using the network as a platform, HealthPresence combines video, audio and information to create an environment similar to what patients experience when they visit their own doctor.
HEALTH 3.0: Soon, patients will not only be seeking information; but actionable intelligence – whether it is artificial or real. Patients will communicate almost as with another patient or doctor. The internet won’t just blindly do what we tell it to do – it will think and represent some amazing opportunities. For example, imagine your toilet running a SMAC 20 and then being instantly notified of the results by your smart phone? Or; use your iPhone to send pictures and streaming videos of conditions for a second opinion www.KnockingLive.com
Health information technology: The application of information processing involving both computer hardware and software that deals with the storage, retrieval, sharing, and use of health care information, medical data, and knowledge for communication and decision making.
Health information technology auditor: An expert who evaluate a health organization’s computer systems to ensure the proper safeguards are in place to protect and maintain the integrity of the firm’s data; While the position has existed since the mid-1960s, companies that previously employed just a handful of HIT auditors are now significantly adding to their ranks, sometimes doubling, tripling or quadrupling current staff levels; much current demand is due to the Sarbanes-Oxley Act and other legislation aimed at improving corporate governance in the wake of major accounting scandals earlier in the decade; publicly traded hospital systems require the expertise of HIT auditors to meet ongoing compliance requirements; the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act (HIPAA), among other regulations, also are fueling the need for HIT auditors. Health IT auditors must have a general understanding of accounting principles and the strategic vision to ensure a health organization’s HIT systems allow it to achieve its short- and long-term objectives. Many hospitals promote from within for this role. Health facilities who look outside the organization for these professionals usually seek candidates with experience, knowledge of healthcare of emerging technologies and issues, and increasingly, certifications such as the certified information systems auditor (CISA) designation.
Health information technology promotion act: Legislation to accelerate the adoption of interoperable electronic health records by ensuring uniform standards, championed by Rep. Nancy Johnson, R-Conn, (H.R. 4157) which would: codify the Office of the National Coordinator for Health Information Technology in statute and delineate its ongoing responsibilities; create exceptions to the fraud and abuse statutes to allow certain providers to fund health information technology equipment and services for other providers; and provide for a study of federal and state health privacy policies.
Health Insurance Portability and Accountability Act (HIPAA): A federal act that requires enterprises in the health sector to guard protected health information and implement policies and procedures to safeguard it.
Health level seven: An international community of healthcare subject matter experts and information technology physicians and scientists collaborating to create standards for the exchange, management and integration of protected electronic healthcare information; the Ann Arbor, Mich.-based Health Level Seven (HL7) standards developing organization has evolved Version 3 of its standard, which includes the Reference Information Model (RIM) and Data Type Specification (both ANSI standards); HL7 Version 3 is the only standard that specifically deals with creation of semantically interoperable healthcare information, essential to building the national infrastructure; HL7 promotes the use of standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare delivery for the benefit of all patient, payers, and third parties; uses an Open System Interconnection (OSI) and high level seven healthcare electronic communication protocol that is unique in the medical information management technology space and modeled after the International Standards Organization (ISO) and American National Standards Institute (ANSI); each has a particular healthcare domain such as pharmacy, medical devices, imaging or insurance (claims processing) transactions. Health Level Seven’s domain is clinical and administrative data.
Hot site: An alternative backup site that contains the same equipment as found in the organization’s actual IT center.
Human firewall: An employee who practices good security techniques to prevent any security attacks from passing through them.
Incident response team: An employee team charged with gathering and handling the digital evidence of an attack.
Individually identifiable health information: Medical information that is created or received by a covered entity; relates to the physical or mental health condition of an individual, provision of health care or the payment for the provision of health care; identifies the individual or there is reasonable belief that the information can be used to identify the individual.
Information security: A computer or network that is free from threats against it.
Integrity: The security goal that generates the requirement for protection against either intentional or accidental attempts to violate data integrity (the property that data has when it has not been altered in an unauthorized manner) or system integrity (the quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation).
Intellectual property: Works created by others such as books, music, plays, paintings, and photographs.
IT-related risk: The net mission impact considering (1) the probability that a particular threat-source will exercise (accidentally trigger or intentionally exploit) system vulnerability and (2) the resulting impact if this should occur. IT-related risks arise from legal liability or mission loss due to:
* Unauthorized (malicious or accidental) disclosure, modification, or destruction of information
* Unintentional errors and omissions
* IT disruptions due to natural or man-made disasters
* Failure to exercise due care and diligence in the implementation and operation of the IT system.
Key-in-knob lock: A basic lock that has the lock mechanism embedded in the knob or handle.
Keystroke logger: A type of hardware spyware that captures keystrokes as they are typed.
Logic bombs: A computer program that lies dormant until it is triggered by a specific event.
Lossless: To compress electronic digital data.
Malicious code: Programs that are intentionally created to break into secure computers or to create havoc after the computers are accessed.
Master patient index: Healthcare facility composite that links and assists in tracking patient, person, or member activity within an organization (or health enterprise) and across patient care settings; hardcopy or electronic identification of all patients treated in a facility or enterprise and lists the medical record or identification number associated with the name; can be maintained manually or as part of a computerized system; typically, those for healthcare facilities are retained permanently, while those for insurers, registries, or others may have different retention periods; a database of all the patients ever registered (within reason) at a facility; name, demographics, insurance, next of kin, spouse, etc.
Medically unbelievablE event: Implemented on Jan. 1, 2007, the CMS blockage of payments for medical services that make no sense based on “anatomic considerations” or medical reasonableness when the same patient, date of service, HCPCS code or provider is involved; unlike other National Correct Coding Initiative (NCCI) edits, MUEs can’t be overridden by a modifier because there will never be a scenario where the physician had a good reason to submit a claim for removing a second appendix from the same person; etc.
Megabytes (MB): Millions of bytes of storage.
Memory stick: USB flash or non-volatile storage device; Sony CompactFlash®, pen or mini-drive; flash card, smart media, slang terms.
Mesh: Medical Subject Headings, the controlled vocabulary of about 16,000 terms used for MEDLINE and certain other MEDLARS databases.
Minimum necessary: The amount of protected health information shared among internal or external parties determined to me the smallest amount needed to accomplish its purpose for Use or Disclosure; the amount of health information or medical data needed to accomplish a purpose varies by job title, CE or job classification.
Minimum necessary rule: HIPAA regulation that suggests any PHI used to identify a patient, such as a social security number, home address or phone number; divulge only essential elements for use in transferring information from patient record to anyone else that requires the information; especially important with financial information; changes the way software is written and vendor access is provided. The “Minimum Necessary” Rule states the minimum use of PHI that can be used to identify a person, such as a social security number, home address or phone number. Only the essential elements are to be used in transferring information from the patient record to anyone else that needs this information. This is especially important when financial information is being addressed. Only the minimum codes necessary to determine the cost should be provided to the financial department. No other information should be accessed by that department. Many institutions have systems where a registration or accounting clerk can pull up as much information as a doctor or nurse, but this is now against HIPAA policy and subject to penalties. The “minimum necessary” rule is also changing the way software is set up and vendor access is provided.
Mirror site: A secondary location identical to the primary IT site that constantly receives a copy of data from the primary site.
National health information network: The technologies, standards, laws, policies, programs and practices that enable health information to be shared among health decision makers, including consumers and patients, to promote improvements in health and healthcare; vision for the NHII began more than a decade ago with publication of an Institute of Medicine report, The Computer-Based Patient Record. The path to a national network of healthcare information is through the successful establishment of Regional Health Information Organizations (RHIO).
National provider identifier: Originally was an eight-digit alphanumeric identifier. However, the healthcare industry widely criticized this format, claiming that major information systems incompatibilities would make it too expensive and difficult to implement. DHHS therefore revised its recommendation, instead specifying a 10-position numeric identifier with a check digit in the last position to help detect keying errors. The NPI carries no intelligence; in other words, its characters will not in themselves provide information about the provider. More recently, CMS announced that HIPAA-covered entities such as providers completing electronic transactions, healthcare clearinghouses, and large health plans, must use only the NPI to identify covered healthcare providers in standard transactions by May 23, 2007. Small health plans must use only the NPI by May 23, 2008. The proposal for a Standard Unique National Health Plan (Payer) Identifier was withdrawn on February, 2006. (According to CMS, “withdrawn” simply means that there is not a specific publication date at this time. Development of the rule has been delayed; however, when the exact date is determined, the rule will be put back on the agenda.)
Network: A group of interconnected computers.
Notebook safe: A special safe secured to a wall or the trunk of a car used for storing a notebook computer.
Operating system hardening: Steps that can be taken to make a personal computer operating system more secure.
Optical disc: A disc that uses laser technology to record data.
Password: A secret combination of words or numbers that authenticates or identifies the user.
Patch: A software update to correct a problem.
Patch management: Tools, utilities, and processes for keeping computers up to date with new software updates that are developed after a software product is released.
Pharmacy information system: Drug tracking and dispensation related health management information system for hospitals and healthcare organizations.
PhisHing: An attempt to fraudulent gather confidential information by masquerading as a trustworthy entity, person or business in an apparently official email, text message or website; carding or spoofing; video vishing; phish-tank; vish-tank; slang terms.
Physical security: The process of protecting the computer itself.
Port scanning: Sending a flood of information to all of the possible network connections on a computer.
Ports: The network connections on a computer.
Preset lock: A basic lock that has the lock mechanism embedded in the knob or handle.
Privacy: The quality or state of being hidden, encrypted, obscure, or undisclosed; especially medical data or PHI.
Privacy act: Federal legislature of 1974 which required giving patient some control over their PHI.
Privacy enhanced mail: Email message standard protocol for enhanced medical, health data or other security.
Privacy officer: A medical entity’s protected client information and security officer; required by each covered entity, to be responsible for “the development and implementation of the policies and procedures” necessary for compliance.
Privacy rule: The Federal privacy regulations promulgated under the Health Insurance Portability and Accountability Act (HIPAA) of 1996 that created national standards to protect medical records and other protected health information. The Office of Civil Rights (OCR) within the Department of Health and Human Services (DHHS) regulates the privacy rules.
Privacy standards: Any protocol to ensure the confidentiality of PHI.
Private key system: A means of cryptography where the same key is used to both encrypt and decrypt a message.
Public key system: A means of cryptography where two keys are used.
* Psychotherapy notes recorded (in any medium) by a health care provider who is a mental health professional documenting or analyzing the contents of conversation during a private counseling session or a group, joint, or family counseling session and that are separated from the rest of the individual’s medical record; excludes medication prescription and monitoring, counseling session start and stop times, the modalities and frequencies of treatment furnished, results of clinical tests, and any summary of the following items: diagnosis, functional status, the treatment plan, symptoms, prognosis, and progress to date.
* Public health authority means an agency or authority of the United States, a State, a territory, a political subdivision of a State or territory, or an Indian tribe, or a person or entity acting under a grant of authority from or contract with such public agency, including the employees or agents of such public agency or its contractors or persons or entities to whom it has granted authority, that is responsible for public health matters as part of its official mandate.
* Required by law means a mandate contained in law that compels a covered entity to make a use or disclosure of protected health information and that is enforceable in a court of law; includes but is not limited to, court orders and court-ordered warrants; subpoenas or summons issued by a court, grand jury, a governmental or tribal inspector general, or an administrative body authorized to require the production of information; a civil or an authorized investigative demand; Medicare conditions of participation with respect to health care providers participating in the program; and statutes or regulations that require the production of information, including statutes or regulations that require such information if payment is sought under a government program providing public benefits.
Regional health information organization: A multi-stakeholder organization that enables the exchange and use of health information, in a secure manner, for the purpose of promoting the improvement of health quality, safety and efficiency; the U.S. Department of Health and Human Services see RHIOs as the building blocks for the national health information network (NHIN) that will provide universal access to electronic health records; other experts maintain that RHIOs will help eliminate some administrative costs associated with paper-based patient records, provide quick access to automated test results and offer a consolidated view of a patient’s history.
Risk assessment: The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.
Risk management: The total process of identifying, controlling, and mitigating information system–related risks. It includes risk assessment; cost-benefit analysis; and the selection, implementation, test, and security evaluation of safeguards. This overall system security review considers both effectiveness and efficiency, including impact on the mission and constraints due to policy, regulations, and laws.
Royalties: Payment to the owner or creator of intellectual property for their work.
Sarbanes-Oxley Act (Sarbox): A federal act that enforces reporting requirements and internal controls on electronic financial reporting systems.
Scanning: Locating a computer that can be broken into.
Script kiddies: Younger and less sophisticated users who break into a computer with malicious intent.
Secure virtual private network: Cryptographic tunneling protocols to provide the necessary health data confidentiality (preventing snooping), sender authentication (preventing identity spoofing), and message integrity (preventing message alteration) to achieve the medical privacy intended. When properly chosen, implemented, and used, such techniques can provide secure communications over unsecured networks.
Security: A set of healthcare information technology system characteristic and mechanisms which span the system both logically and physically; electronic access control against unauthorized intervention, both friendly or malicious; encompasses all of the safeguards in an information system, including hardware, software, personnel policies, information practice policies, disaster preparedness, and the oversight of all these areas; the purpose of health information security is to protect both the system and the information it contains from unauthorized access from without and from misuse from within; through various security measures, a health information system can shield confidential information from unauthorized access, disclosure and misuse, thus protecting privacy of the individuals who are the subjects of the stored data; security life cycle.
Security administration: The physical and electrical protection features of an IT health system needed to be managed in order to meet the needs of a specific installation and to account for changes in the healthcare entities operational environment.
Security compromise: Physical or electronic data, file, program or transmission error due to malicious miscreants or software interventions; health data confidentiality breach.
Security configuration: Measures, practices, and procedures for the safety of information systems that must be coordinated and integrated with each other and other methods, practices, and procedures of the organization established in order to credential safekeeping policy; provides written security plans, rules, procedures, and instructions concerning all components of a healthcare entity’s security; procedures must give instructions on how to report breaches and how those breaches are to be handled within the organization.
Security configuration management: The measurement of practices and procedures for the security of information systems that is coordinated and integrated with each other and other measures, practices and procedures of the organization so as to create a coherent system of health data security (NIST Pub 800-14).
Security domain: A set of subjects, their information objects, and a common security policy; foundation for IT security is the concept of security domains and enforcement of data and process flow restrictions within and between these domains.
Security goals: The five security goals are integrity, availability, confidentiality, accountability, and assurance.
Security information system: security is a system characteristic and a set of mechanisms that span the system both logically and physically.
Security policy: A formal written policy that outlines the importance of security to the organization and establishes how the security program is organized.
Share: An object that is shared with others over a computer network.
Signature files: Files that contain updated antivirus information.
Smart card: A device that contains a chip that stores the user’s private key, login information, and public key digital certificate.
Sniffing: Listening to the traffic on a computer network and then analyzing it.
Social engineering: Relying on trickery and deceit to break security and gain access to computers.
Spam: Unsolicited e-mail messages.
Spy: A person who has been hired to break into a computer and steal data.
Spyware: Hardware or software that “spies” on what the user is doing and captures that activity without their knowledge.
Stealth signal transmitter: Software installed on a notebook computer that sends a signal that can be traced.
Threat analysis: The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.
Threat modeling: A process of constructing scenarios of the types of threats that assets face.
Threat: The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
Threat-source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability.
Token: A security device used to authenticate the user by having the appropriate permission (like a password) embedded into the device.
USA Patriot Act: A federal act designed to broaden the surveillance of law enforcement agencies to enhance the detection and suppression of terrorism.
Username: A unique identifier of a person used to access a computer system.
Virus: A program that secretly attaches itself to other programs and when executed causes harm to a computer.
Vulnerability: A flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy.
Vulnerability assessment: A process to determine what vulnerabilities exist in the current system against these attacks.
Vulnerability assessment managed services: Agencies that use scanning devices connected to probe an organization’s security to look for vulnerabilities.
War driving: A technique used to locate wireless local area networks (WLANs).
WiMax: A more powerful version of Wi-Fi that can provide wireless Internet access over wider geographic location such as a city; an acronym that stands for Worldwide Interoperability for Microwave Access, and is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. IEEE 802.16 is working group number 16 of IEEE 802, specializing in point-to-multipoint broadband wireless access.
Wireless hot spot: Specific geographic location in which an access point provides public wireless broadband network services; security is risky for PHI; hotspot.
Wireless local area networks: A computer network that uses radio waves instead of wires to connect computers.
Worm: A program that does not attach itself to other programs or need user intervention to execute.
Posted on May 20, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Coinbase under investigation – Hit with ransom attack
Coinbase’s wild week got much wilder when the New York Times reported that the SEC has been looking into whether the crypto exchange misstated the size of its user base in securities filings. Per the New York Times, the investigation started under President Biden and has continued under President Trump.
The subject of the investigation appears to be Coinbase’s claim in past disclosures and marketing materials that it has 100 million “verified users.” A company spokesperson said it no longer reports that metric and the investigation should not continue.
The report came days after Coinbase joined the S&P 500, and just hours after it said it could lose $400 million following a recent hack by “rogue overseas” agents looking to steal customer data.
Virtual chronic care provider Omada Health has filed to go public in the United States, the latest in a string of healthcare listings expected this year. Omada did not disclose the details as to how much it plans to raise from its IPO.
The San Francisco, California-based company, which last raised $192 million in a Series E funding round in 2022, reported a 38% increase in revenue to $169.8 million for 2024, according to its IPO paperwork. For the first quarter of 2025, the company posted a 56.6% year-on-year jump in revenue to $55 million. Omada has applied to list its common stock on the NASDAQ under the symbol “OMDA”.
Healthcare IPOs on U.S. exchanges have fetched $7.1 billion in 2024, compared with $2.8 billion a year earlier, according to data compiled by LSEG.
Posted on April 30, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
FUNDAMENTAL INDUSTRY CHANGES
By Staff Reporters
***
***
Index Funds
An index mutual fund or ETF (exchange-traded fund) tracks the performance of a specific market benchmark—or “index,” like the popular S&P 500 Index—as closely as possible. That’s why you may hear people refer to indexing as a “passive” investment strategy.
Instead of hand-selecting which stocks or bonds the fund will hold, the fund’s manager buys all (or a representative sample) of the stocks or bonds in the index it tracks.
***
Quantum Computing
Unlike traditional computers that use bits, quantum computers utilize qubits. These qubits are capable of being in a state of superposition, where they can represent both 0 and 1 simultaneously, enabling the processing of multiple calculations at once. This could allow quantum computers to outperform classical computers in solving certain complex problems. However, the field is still overcoming challenges such as qubit stability and decoherence; especially in these three areas:
Quantum computing could fundamentally alter healthcare by accelerating drug discovery and improving individualized medicine. Rapid analysis of enormous volumes of biological data allows quantum computers to find trends that might guide the creation of more potent treatments. In addition to accelerating drug development, this will enable customized treatments tailored to unique genetic profiles.
Faster and more accurate financial models produced by quantum computing will transform the banking sector. Through real-time analysis of intricate financial systems, it can help investors to control risk and make better decisions. More precise market forecasts will help maximize portfolio management and trading strategies.
Through greatly enhanced medical diagnosis and patient care, quantum computing can transform the healthcare industry. Quantum computers can remarkably accurately find trends and possible health hazards by analyzing enormous volumes of medical data in a fraction of the time. Early diagnosis and more customized treatment alternatives follow from this.
B–QTUM Index Fund
Index Description: The BlueStar® Machine Learning and Quantum Computing Index (BQTUM) tracks liquid companies in the global quantum computing and machine learning industries, including products and services related to quantum computing or machine learning, such as the development or use of quantum computers or computing chips, superconducting materials, applications built on quantum computers, embedded artificial intelligence chips, or software specializing in the perception, collection, visualization, or management of big data.
In 2015, the Federal Trade Commission (FTC) released a staff report entitled Internet of Things: Privacy & Security in a Connected World, in which it recommend that Internet of Things (IoT) style devices, which of course include medical and clinical devices, need to maintain a good security posture. It’s worth noting that the FDA, FTC, and other government regulators are centering on a few key guidelines. The following recommendations come directly from the FTC report.
Companies should build security into their devices at the outset, rather than as an afterthought. As part of the security by design process, companies should consider:
Conducting a privacy or security risk assessment
Minimizing the data they collect and retain
Testing their security measures before launching their products
Companies should train all employees about good security, and ensure that security issues are addressed at the appropriate level of responsibility within the organization
Companies should retain service providers that are capable of maintaining reasonable security and provide reasonable oversight for these service providers.
When companies identify significant risks within their systems, they should implement a defense-in-depth approach, in which they consider implementing security measures at several levels.
Companies should consider implementing reasonable access control measures to limit the ability of an unauthorized person to access a consumer’s device, data, or even the consumer’s network.
Companies should continue to monitor products throughout the life cycle and, to the extent feasible, patch known vulnerabilities
According to colleague Shahid N. Shah MS, the FTC report and FDA guidelines are remarkably consistent. When thinking of cybersecurity and data privacy, engineers tend to think about authentication, authorization, and encryption. Those are the relatively easy topics. For safety-critical devices, however, things are much more difficult and need to encompass a larger surface of questions, including but not limited to:
Asset Inventory: Is the device discoverable, and can it associate itself with standard IT inventory systems so that revision management, software updates, and monitoring can be automated?
Cyber Insurance: Does the device have enough security documentation to allow it to be insured by standard cyber insurance riders?
Patching: How is the firmware, operating system (OS), or application going to be patched by IT staff within hospitals (or the home for remote devices)?
Internal Threats: Has the device been designed to circumvent insider (hospital staff, network participants, etc.) threats?
External Threats: Has the device been designed to lock down the device from external threats?
Embedded OS Security: Is the device sufficiently hardened at the operating system level, such that no extraneous software components, which increase the attack surface, are present?
Firmware and Hardware Security: Are the firmware and hardware components sourced from reputable suppliers and free of state-sponsored spying?
Application Security: Is the Microsoft Security Development Lifecycle (SDL) or similar software security assurance process integrated into the engineering process?
Network Security: Have all network protocols not in use by the device been turned off so that they are not broadcasting?
Data Privacy: What data segmentation, logging, and auditing is being done to ensure appropriate data privacy?
HIPAA Compliance: Have proper steps been followed to ensure Health Insurance Portability and Accountability Act (HIPAA) compliance?
FISMA Compliance: If you’re selling to the federal government, have proper steps, such as use of Federal Information Processing Standard (FIPS) certified encryption, been followed to ensure Federal Information Security Management Act (FISMA) compliance?
Data Loss Prevention (DLP): Is there monitoring in place to ensure data leakage outside of the device doesn’t occur?
Vulnerabilities: Have common vulnerabilities such as the Open Web Application Security Project (OWASP) Top 10 been reviewed?
Data Sharing: Are proper data sharing agreements in place to allow sharing of data across devices and networks?
Password Management: Are passwords hardcoded into the device or made configurable?
Configuration Protection: Are configuration files properly check-summed and protected against malicious changes?
ASSESSMENT
It is vital to perform a security assessment on a healthcare practice to understand the environment, identify risks and perform risk mitigation. A one-time security assessment with risk mitigation is not sufficient in 2025. This is a continuous process that needs to be performed religiously to maintain a secure and compliant practice.
The genetic testing company 23andMe went from biotech superstar to the brink of collapse. And, its most valuable asset might be its controversial customer DNA data trove.
Now, 23andMe filed for bankruptcy late Sunday night and announced the resignation of its chief executive officer Anne Wojcicki who is stepping down from her position but remains on the board of directors.
Wojcicki has so far tried unsuccessfully to rescue the business by buying it back and capping a precipitous fall for the DNA-testing company.
Posted on March 2, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
What is Honeypot?
A Honeypot is a network-attached system used as a trap for cyber-attackers to detect and study the tricks and types of attacks used by hackers. It acts as a potential target on the internet and informs the defenders about any unauthorized attempt at the information system.
Honeypots are mostly used by large companies and organizations involved in cybersecurity. It helps cybersecurity researchers to learn about the different types of attacks used by attackers. It is suspected that even cyber criminals use these honeypots to decoy researchers and spread wrong information. The cost of a honeypot is generally high because it requires specialized skills and resources to implement a system such that it appears to provide an organization’s resources while still preventing attacks at the back end and access to any production system.
Advantages of Honeypot
Acts as a rich source of information and helps collect real-time data.
Identifies malicious activity even if encryption is used.
Wastes hackers’ time and resources.
Improves security.
Disadvantages of Honeypot
Being distinguishable from production systems, it can be easily identified by experienced attackers.
Having a narrow field of view, it can only identify direct attacks.
A honeypot once attacked can be used to attack other systems.
Fingerprinting(an attacker can identify the true identity of a honeypot ).
What is Honeynet?
A honeynet is made up of two or more honeypots connected via a network. Having a linked network of honeypots can be beneficial. It allows organizations to trace how an attacker interacts with a single resource or network point while also monitoring how a hacker moves between network points and interacts with numerous points at the same time.
The goal is to induce hackers to believe that they have successfully breached the network. Having more false network destinations makes the arrangement appear more realistic.
Posted on February 27, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
VIRAL AUDIO DEBATES
By Staff Reporters
***
***
Auditory Illusions are like magic tricks for your ears. They make you hear things that aren’t there or misinterpret sounds. Think of the famous “Yanny or Laurel” debate – two people hear completely different words from the same audio clip.
NOTE: Yanny or Laurel is an auditory illusion that became popular in May 2018, in which a short audio recording of speech can be heard as one of two words. 53 percent of over 500,000 respondents to a Twitter poll reported hearing a man saying the word “Laurel”, while 47 percent of people reported hearing a voice saying the name “Yanny”. Analysis of the sound frequencies has confirmed that both sets of sounds are present in the mixed recording, but some users focus on the higher-frequency sounds in “Yanny” and cannot seem to hear the lower sounds of the word “Laurel”. When the audio clip is slowed to lower frequencies, the word “Yanny” is heard by more listeners, while faster playback loudens “Laurel.”
According to colleague Dan Ariely PhD, our brains love patterns, sometimes too much, leading us to hear phantom sounds or misinterpret music lyrics. It’s a reminder that our senses are easily fooled, so don’t believe everything you hear.
While health care is not “do-it-yourself,” an informed patient can be an asset. A poorly informed patient, on the other hand, clearly complicates treatment. Assume the responsibility of being the primary information source and educator for your patient. To help deal with a self-diagnosing patient, consider the following as suggested by: David B. Troxel, MD, Medical Consultant to The Doctors Company:
Encourage patients to always check with you about the accuracy of information obtained from external sources. Use the intake time to find out what Internet information the patient has found.
Directly discuss what the patient has read, even if the patient’s external source is a good one in your professional opinion. The exchange enhances your relationship with the patient and can increase treatment compliance. Welcome questions, and help put the patient’s information in the appropriate context.
Provide your patient with a list of Web sites that provide accurate information, such as the Centers for Disease Control and Prevention (www.cdc.gov). Make sure the patient understands the limitations of the Internet.
Document in the patient’s chart your diagnosis, your treatment management plan, and medication prescribed, as well as the reasons behind your decisions.
SPEAKING: Dr. Marcinko will be speaking and lecturing, signing and opining, teaching and preaching, storming and performing at many locations throughout the USA this year! His tour of witty and serious pontifications may be scheduled on a planned or ad-hoc basis; for public or private meetings and gatherings; formally, informally, or over lunch or dinner. All medical societies, financial advisory firms or Broker-Dealers are encouraged to submit a RFP for speaking engagements: MarcinkoAdvisors@outlook.com
Posted on February 17, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
MSFT-HUG Update
By Dr. David Edward Marcinko; MBA MEd
***
***
MSHUG: Microsoft Healthcare Users Group (MS-HUG) unified with the Healthcare Information and Management Systems Society (HIMSS) as part of the HIMSS Users Group Alliance Program in October 2003.
Today, the unification strengthens the commitment of HIMSS and MS-HUG to better serve their members and the industry through a shared strategic vision to provide leadership and healthcare information technology solutions that improve the delivery of patient care.
Posted on January 4, 2025 by Dr. David Edward Marcinko MBA MEd CMP™
MEDICAL EXECUTIVE-POST–TODAY’SNEWSLETTERBRIEFING
***
Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants
“Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily“
A Partner of the Institute of Medical Business Advisors , Inc.
Nvidia stock (NVDA) led gains among the “Magnificent Seven” tech stocks to start the new year after a group-wide sell-off in the last days of 2024. Shares of the AI chip-maker rose 4.5% Friday after gaining roughly 3% the prior day.
Quote: “If your credit card gets compromised, your bank will alert you, cancel it and send you get a new one. But your medical records have a long lifespan. They can be misused without detection for long periods of time, because it’s harder to identify malicious activity. That makes them very valuable.”—Geetha Thamilarasu, associate professor at the University of Washington Bothell, on why hackers want healthcare information (the Wall Street Journal)
That upswing followed a 4% dip between Christmas Eve and New Year’s Eve as megacap tech stocks dropped across the board in the absence of a “Santa Claus” rally, where the stock market typically enjoys a surge between December 24th and January 2nd. Tesla (TSLA) stock plunged nearly 13% over that time frame, while Amazon (AMZN) and Microsoft (MSFT) dropped more than 4%. Meanwhile, Meta (META) and Google (GOOG) fell just under 4%, and Apple (AAPL) dropped 3%.
Even with its December decline, Nvidia shares still ended 2024 up more than 150%. Wall Street analysts have remained bullish on the stock, estimating shares will rise to roughly $173 over the next year from their current level of $138, according to Yahoo Finance data.
Posted on September 18, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
On the Crucial Online Presence
[By John Deutsch]
A strong online presence is crucial to running a successful business, and healthcare is no exception.
However with constant change, especially in the past two years, many businesses are experiencing underperforming campaigns and struggling to figure out where to spend their marketing dollars. Should you invest heavily in pay-per-click (PPC) advertising, focus your efforts on search engine optimization (SEO) or hit the ground running with social media?
The answer is that you should never focus solely on one marketing channel, as it could take months or even years to recover when changes in the marketing industry occur – and they inevitably will occur. Another reason to diversify your efforts is that the success of some channels depends on the success of others – for example, social media influences your search rankings and display advertising heavily influences your brand recognition.
As a healthcare marketing company with over ten years of experience in internet marketing, we have seen the industry get flipped upside down more than once and have seen it affect organizations that have weak marketing campaigns with little to no diversification. A good mix of tactics is the best way to reach your target audience while allowing you to adapt quickly in the face of changes.
Three Elements Crucial to Any Marketing Campaign
Search marketing, direct marketing and social media are three components that healthcare organizations should incorporate for a healthy marketing campaign. Here’s what you need to know about these marketing elements, including the changes each channel has gone through in the last few years and what we could expect to see in the future.
Search Marketing
Search marketing typically refers to PPC and SEO, the paid and unpaid efforts used to increase online visibility in search engine results. Early marketers were able to easily leverage SEO to gain top search engine rankings and also invest minimally in PPC for quick leads, but the search marketing landscape has changed significantly in the last three to four years, altering the online marketing game.
We might say it all started when Google modified its PageRank algorithm in 2011 and then again in 2012 (the update often referred to as “the death of SEO”), causing many organizations’ rankings to plummet. Marketers were forced to rethink their organic SEO efforts to stay in Google’s good graces. Instead of relying heavily on getting backlinks (even from low-quality websites) and stuffing content with keywords, the focus switched to creating quality content in order to get real clicks and page views.
Meanwhile, companies like Google started trying harder than ever to monetize their services. The highly saturated market contributed to driving advertising costs up – and beyond that, the actual efficacy of online ads went down. In some of our own campaigns, we have seen over 30% inflation in ad prices per year and a loss of efficacy (decreased traffic and leads) despite increasing ad spend to match inflation – and this isn’t just a result of market saturation. It also has to do with the fact that consumers are less and less receptive to online advertising due to the over publicizing of ads.
As a result of this, organizations have to constantly innovate so that their ads are seen among all the online advertising noise. This, in addition to rising ad prices means that a return on investment can be difficult to realize. Working with a true PPC expert who knows your industry well is the only way to make your budget go a long way.
The bottom line: SEO and PPC are still the number one ways to draw leads online, but they have both seen significant change in the past years and are likely to keep changing, so your marketing strategy should not depend on either channel alone.
Direct Marketing
With SEO having lost some importance and PPC advertising requiring a skill set that many health organizations lack, we are seeing trends shifting towards a more direct form of marketing. This is evident by the number of lead generation companies that have cropped up in the last few years, such as Healthgrades and Vitals, which allow providers to attract more patients and referrals, often for a nominal fee. Similarly, in the medical software industry, SoftwareAdvice dominates the SEO/PPC channels.
Organizations are also increasingly employing alternative marketing channels like email newsletters and direct email marketing to reach out to clients and potential opportunities. This starts with a simply crafted email addressing a very specific issue to a specific audience. It is an extremely effective and budget-friendly tactic to diversify a marketing strategy.
Social Media
Just like other marketing channels, social media is constantly evolving and also increasing in price. This is due, in large part, to major social media companies becoming publicly traded companies in recent years (i.e. Facebook in 2012 and Twitter in 2013), but also to market saturation.
According to a LinkedIn study, 81 percent of small- and medium-sized businesses are using social media and, of those, 94 percent do so for marketing purposes. While networks like Facebook and Twitter remain free to use, they have started trying to capitalize on their popularity by pushing paid advertisement, often to the point of risking the integrity of their sites.
Whereas prior to companies like Facebook and Twitter having gone public, a well-crafted social media post (text, video or image) could go “viral” naturally, we are now seeing this happen less and less, often requiring an initial advertising spend to get the ball rolling. Facebook is a good example of this. In December 2013, Facebook changed the algorithm that determines what stories and updates users see in their News Feeds. This resulted in business pages losing viewership of their posts, as Facebook decided that brands would have to “pay to play.”
Assessment
While we don’t recommend social media being the focal point of any healthcare organization’s marketing campaign, much less the only element, it is an integral component – and definitely one you should stay on top of if you want to remain competitive. Social media is also a major factor in Google’s algorithm for organic search engine rankings, so there is some added value to having a strong social media presence.
John is the President and CEO of Medical Web Experts, developer of Bridge Patient Portal, the leading 2014 ONC certified solution for patient engagement and improved practice profitability. A vital component in the exponential growth of numerous healthcare IT and Internet companies over the last ten years, John has benefited immensely from a unique mix of professional experiences, boasting a strong background in both marketing and technology.
Channel Surfing the ME-P Have you visited our other topic channels? Established to facilitate idea exchange and link our community together, the value of these topics is dependent upon your input. Please take a minute to visit. And, to prevent that annoying spam, we ask that you register. It is fast, free and secure.
Conclusion
Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.
Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com
OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:
Posted on September 10, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Recently, the FBI warned the American Dental Association in May of the potential danger to providers from hackers. In May 2023, hackers attackedDelta Dental of California in a breach exposing the information of around 7 million patients.
And, in April 2023, Aspen Dental—a chain with more than 1,000 dentists’ offices across the country—suffered a ransomware hack that exposed user data, including health insurance information and Social Security numbers.
Posted on September 7, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Cyberattacks are causing issues across all sorts of industries, from Microsoft to AT&T to Ascension. But it looks like the healthcare industry is getting hit the hardest—financially, at least.
The 2024 Cost of a Data BreachReport from IBM and think tank Ponemon Institute found that the global average cost of a data breach rose 10% between March 2023 and February 2024, reaching a total average cost of $4.88 million in that period. Costs for disruptions to business processes and post-breach customer support and remediation were the largest drivers behind the increase.
However, of the 17 industries studied, healthcare had the most expensive data breaches, with an average cost of $9.77 million during that same period. In fact, healthcare has held the No. 1 spot for costliest breaches since 2011, according to the study.
For comparison, the next highest average cost was in finance, at $6.08 million.
Posted on July 30, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
BREAKING NEWS
Story by Andrew Griffin • 4h ago
By Staff Reporters
***
***
Microsoft’s online service have been hit by another outage, days after an IT meltdown that brought much of the world to a halt. The company said it was investigating reports of user problems accessing its services, with some reporting being unable to access email and other functions.
An alert on the technology giant’s service status website said it was looking into a “network infrastructure” issue that was impacting access to Microsoft services.
The incident comes less than two weeks after a major global IT outage knocked global infrastructure including transportation and healthcare services offline because of a flawed software update from cybersecurity firm CrowdStrike affected Microsoft devices.
Posted on July 30, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
A.I. and Computers
By Staff Reporters
***
***
***
***
Google revealed its answer to ChatGPT: an “experimental conversational AI service” called Bard that’s currently in testing mode.
Microsoft (which invested in ChatGPT) announced its own surprise event scheduled for later today in order to “share some progress on a few exciting projects.”
Chinese tech giant Baidu confirmed it’s on track to introduce its AI chatbot, known as “Ernie Bot” in English, in March.
Posted on July 16, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
According to Fierce Healthcare, 60% of patients say they are willing to switch doctors for a better communications experience, according to a survey. Patients want more of a “human touch” when texting their providers, like conversational message exchanges.
“…small businesses with fewer than 1,000 employees are four times more likely to be impacted by attackers than medium and large businesses.” That’s us, Doc. (You might not get this kind of news from the American Dental Association).
EDITOR’S NOTE: I first met Rich in B-school, when I was a student, back in the day. He was the Founder and CEO of Superior Consultant Holdings Corp. Rich graciously wrote the Foreword to one of my first textbooks on financial planning for physicians and healthcare professionals. Today, Rich is a successful entrepreneur in the technology, health and finance space.
Posted on July 8, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
Bad things can happen in paperless practices, Doc
By Darrell Pruitt DDS
***
***
“Illinois Hospital First To Shut Down Completely After Ransomware Attack”
-By Karl Bode for Techdirt, Jun 16th 2023.
“Such attacks can have a chain reaction on already broken hospitals and health care systems. Health care workers are sometimes forced to resort to pen and paper for patient charts and prescriptions, increasing the risk of potentially fatal error. Delays in care can also prove fatal. And ransomware is only one of the problems that plague dated medical IT systems whose repair is being made increasingly costly and difficult by medical health care system manufacturers keen on monopolizing repair.”
Remember the MCNA (Managed Care of North America) data breach that was reported by Bill Toulas in Bleeping Computer on May 29th? There have been new developments.
“Patients of a Florida-based dental insurance provider brought a proposed class action lawsuit alleging negligence over a ransomware data breach that leaked the private information of more than 8.9 million people on the dark web, saying they face a lifetime risk of having their identities stolen.”
–David Minsky for Law 360
[June 16th, 2023]
If you are still using paper records, don’t change now.
Posted on June 29, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
The healthcare industry has tried for years—but to little avail—to figure out how artificial intelligence (AI) can be used to make work easier and improve patient care.
Despite the middling success healthcare has had with AI, Andreessen Horowitz (a16z), the largest venture capital firm in the US, has bet big on healthcare AI startups in the past year. The firm has invested in at least four startups and co-led three funding rounds totaling $328 million.
Investment partner Daisy Wolf and general partner Vijay Pande at a16z wrote in an August blog post that the VC firm is aware that “the AI hype cycle has hit healthcare before.” But, the two partners wrote, “we’re excited by today’s overlap of data availability, public foundation models, and widespread interest.”
Venture capital funding in the digital health space cooled a bit in 2022 following a red-hot 2021. Overall, digital health companies raised $15.3 billion last year, down from the $29.1 billion raised in 2021—but still above the $14.1 billion raised in 2020, according to Rock Health a seed fund that supports digital health startups.
Nevertheless, analysts predict VC investors and IBs will still put a good amount of money into digital health in 2024 and 2025, especially in alternative care, drug development, health information technology, artificial intelligence, EMRs and software that reduces physician workload.
Of course. an essential first part of attracting VC interest and IB money is the crafting and presentation of your formal business plan [“pitch”] ; as well as the needed technical and managerial experience. This is crucial for success and exactly where we can assist.
Posted on June 17, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
MEDICAL EXECUTIVE-POST–TODAY’SNEWSLETTERBRIEFING
***
Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants
“Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily“
A Partner of the Institute of Medical Business Advisors , Inc.
The NASDAQ nabbed its fifth-straight record close last week, and the S&P 500 snapped its four-day streak. Both were up for the week as investors digested data that showed inflation cooling. Adobe became the latest company to soar thanks to AI, spiking after delivering better-than-expected earnings and forecasts.
Those who rely on ADHD medication got some bad news last week when the CDC issued a health advisory alerting patients that there may be possible “increased risks for injury and overdose,” after two executives at Done Global, a telehealth company, were arrested for fraud linked to allegedly selling Adderall over the internet. The CDC warned that as many as 30,000 to 50,000 adult patients could be affected. https://tinyurl.com/3rf5py6c
Posted on June 11, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
MEDICAL EXECUTIVE-POST–TODAY’SNEWSLETTERBRIEFING
***
Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants
“Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily“
A Partner of the Institute of Medical Business Advisors , Inc.
The end has come for the Covid-19-era federal Affordable Connectivity Program, which some critics say will make telehealth access challenging for millions in rural and tribal areas. (NPR/KFF Health News)
Here’s where the major benchmarks ended yesterday:
The S&P 500 index rose 13.80 points (0.3%) to 5,360.79; the Dow Jones Industrial Average® ($DJI) gained 69.05 points (0.2%) to 38,868.04; the NASDAQ Composite added 59.40 points (0.4%) to 17,192.53.
The 10-year Treasury note yield (TNX) rose almost 4 basis points to 4.467%.
The CBOE Volatility Index® (VIX) rose 0.52 to 12.74.
What’s up
Diamond Offshore Drilling rose 10.91% after fellow offshore drilling company NobleCorp. announced it would acquire Diamond in a cash and stock deal worth $1.6 billion total. Noble shares rose 6.08% on the news as well.
Crowdstrike, GoDaddy, and KKR will be added to the S&P 500 when the index rebalances at the end of the quarter. Crowdstrike rose 7.29%, GoDaddy rose 1.94%, and KKR was up 11.22% on the news.
Texas Pacific Land Corporation shares also rose 24.57% on the news that the company will be inducted into the S&P MidCap 400.
GameStop shares fell 12.04% today, after plummeting about 40% last Friday when the company announced earnings early and hundreds of thousands of people watched Roaring Kitty ramble about the stock.
French stocks sagged today on the news that pressure from the far-right opposition party have forced a snap national parliamentary election on June 30. Societe Generale fell 7.46%, and BNP Paribas fell 4.76%.
Stat: 42. That’s how many healthcare industry companies were named on the latest Fortune 500, which lists the largest corporations in the US based on revenue for fiscal year 2023. (Advisory Board)
A new report from the Google-owned cybersecurity firm Mandiant suggests several reasons for the increase in attacks. “First, there has been a resetting of the cybe rcriminal ecosystem after a tumultuous year in 2022, an influx of new actors conducting attacks, new partnerships between existing groups, and members of disrupted, prolific ransomware groups such as Conti starting up their own RaaS operations. While the attacks in 2023 largely followed the same patterns as the previous year, there were some notable changes with several groups trialing new tactics, techniques, and procedures.
For example, to increase the pressure on victims to pay, attacks on healthcare providers saw extortion demands issued to patients whose data were stolen, threatening to publish their medical data if they did not personally pay a ransom. The ALPHV group created a searchable database to make stolen data more accessible, and threats were issued to report attacks on publicly traded companies to the Securities and Exchange Commission (SEC).”
Imagine how ransomware would affect your practice if the extortion scheme bypassed you to directly threaten your patients – and blamed you for not paying the “reasonable” ransom demand.
Posted on June 6, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
Seven [plus one] predictions for healthcare technology trends?
In the wake of a pandemic, shifting care delivery models, and a surge of clinical content, Wolters Kluwer healthcare experts have identified seven healthcare technology trends going forward.
1. Building trust in an age of digital information overload 2. Telemedicine becomes a fixture of the healthcare landscape 3. Resilience is key to retaining the nursing workforce 4. Unstructured health data helps researchers build health equity 5. AI reduces healthcare-associated infections (HAIs) 6. Quality improvement accelerates evidence to implementation 7. Virtual simulation and technology transforms nursing education
Posted on June 4, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
MEDICAL EXECUTIVE-POST–TODAY’SNEWSLETTERBRIEFING
***
Essays, Opinions and Curated News in Health Economics, Investing, Business, Management and Financial Planning for Physician Entrepreneurs and their Savvy Advisors and Consultants
“Serving Almost One Million Doctors, Financial Advisors and Medical Management Consultants Daily“
A Partner of the Institute of Medical Business Advisors , Inc.
Dollar General has ended a pilot program with mobile care provider DocGo, becoming the latest retailer to wind down primary care operations, spokespeople from both companies confirmed to Healthcare Brew on May 31st. The retail giant—the largest in the US by number of stores—began the healthcare partnership in 2023 after announcing ambitions to establish itself as a “health destination” two years prior. DocGo and Dollar General offered mobile health clinics with basic, preventive, and urgent care services at three stores in Tennessee. Dollar General executives previously said in a June 2023 press release that they would expand the DocGo pilot program to more stores.
The S&P 500® index (SPX) rose 5.89 points (0.1%) to 5,283.40; the Dow Jones Industrial Average® ($DJI) lost 115.29 points (0.3%) to 38,571.03; the NASDAQ Composite® ($COMP) advanced 93.65 points (0.6%) to 16,828.67.
The 10-year Treasury note yield (TNX) declined more than 11 basis points to 4.40%, near a two-week low.
The CBOE Volatility Index® (VIX) rose 0.19 to 13.11.
🟢 What’s up?
GameStop shares rose 21% after Roaring Kitty revealed his position in the stock. Fellow meme stocks popped in tandem, including AMC Holdings rising by 11.43%.
Bio-Path Holdings soared 56.80% after announcing strong phase 2 trial results for its new acute myeloid leukemia treatment.
Coherent shares popped 22.98% after the company announced it had poached Jim Anderson, the extremely competent CEO of Lattice Semiconductor—whose shares plummeted 15.49%.
What’s down?
GSK dropped 8.65% on the news that a Delaware court will allow scientific evidence to be heard in a series of lawsuits regarding the discontinued heartburn drug Zantac.
Boston Beer fell 3.25% after shareholders decided to take their winnings and run following Friday’s big pop after news of its apparent acquisition by Suntory.
Tractor Supply shares toppled 6.21%, likely on poor manufacturing news from the ISM Index, while Halliburton shares fell 5.34%, likely on poor oil news from OPEC+.
Dozens of Mexican stocks and ETFs tumbled today on the election of a new president. The steepest decline was seen by Grupo Financiero Banorte, SAB, which fell 11.38%.
Cyberattacks around the country are wreaking havoc on the ground at targeted hospitals, but a new study shows that security breaches hurt surrounding providers, too. The research published in JAMA on May 29 found that cyberattacks led to a decrease in emergency department (ED) visits at attacked hospitals and an increase in ED patients at nearby hospitals.
Posted on April 26, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Microsoft is looking at a broader AI future than just OpenAI
Microsoft has been at the forefront of the AI revolution through its $13 billion stake in the ChatGPT-maker, but recently it showed it’s also making other Artificial Intelligence bets, announcing it will pursue several partnerships and is investing $2.1 billion in French startup Mistral AI. Mistral’s tech will be available to Microsoft Azure users.
And then Microsoft President Brad Smithtold Axios that OpenAI CEO Sam Altman is “brilliant”, but …… Read Axios Story.
Perhaps even to counter Mark Zuckerbergs META Platform.
Posted on April 26, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Big Artificial Intelligence Spending Boosts Meta’s Cost Structure!
Meta [Facebook, FB] reported record Q1 revenue yesterday, but it was overshadowed by the billions the company is spending in its efforts to win the AI race and to try to make the metaverse happen. Investors were displeased with the company’s forecast that its spending will rise by $10 billion to support AI development, sending Meta’s stock price down 15% after hours.
Now, the metaverse is a vision of a virtual reality where people can socialize, work, play, and explore in immersive digital spaces.
But CEO Mark Zuckerberg urged them to keep the faith, saying, “We’ve historically seen a lot of volatility in our stock during this phase of our product playbook.”
Posted on April 17, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
DEFINITION: The Office of the National Coordinator for Health Information Technology (ONC) is a staff division of the Office of the Secretary, within the U.S. Department of Health and Human Services. ONC leads national health IT efforts, charged as the principal federal entity to coordinate nationwide efforts to implement and use the most advanced health information technology [HIT] and the electronic exchange of health information.
Posted on April 6, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Intel revealed that its semiconductor-making unit lost $7 billion last year. The news sent the company’s stock down.
And, Amazon is laying off hundreds of employees from its cloud computing division, including the team overseeing its cashierless tech (and not just the Just Walk Out feature it’s pulling from stores), as well as people sales and marketing roles.
Posted on April 2, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
The Designated Medical Record Set [DMRS]: Contains medical and billing records and any other records that a physician, hospital, clinic and/or medical practice utilizes for making decisions about a patient; a hospital, emerging healthcare organization, or other healthcare organization. It serves to define which set of information comprises “protected health information” and which set does not; or contains medical or mixed billing records, and any other information that a physician and/or medical practice utilizes for making decisions about a patient.
It is up to the hospital or healthcare organization to define which set of information comprises “protected health information” and which does not though logically this should not differ from locale to locale. The patient has the right to know who in the lengthy data chain has seen their Protected Health Information. This sets up an audit challenge for the medical organization, especially if the accountability is programmed, and other examiners view the document without cause.
Posted on April 2, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
What’s Your Back-up Plan – Doctor?
As per a recent study, 32% of data is lost by human errors. However hardware, software, hacks and smack-downs are responsible for remaining 68% data loss.
Data protection gains major importance in data loss. It can be achieved by implementing data management successfully.
Your thoughts and comments on this ME-P are appreciated. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, subscribe to the ME-P. It is fast, free and secure.
Speaker: If you need a moderator or speaker for an upcoming event, Dr. David E. Marcinko; MBA – Publisher-in-Chief of the Medical Executive-Post – is available for seminar or speaking engagements. Contact: MarcinkoAdvisors@msn.com
OUR OTHER PRINT BOOKS AND RELATED INFORMATION SOURCES:
Posted on March 1, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Cyber villains have struck again, and they’re going after the US health system. Pharmacies and hospitals nationwide are coping with a debilitating cyberattack against the prescription processor Change Healthcare, owned by America’s biggest health insurer, UnitedHealth.
The health tech company noticed the breach last week and rushed to disconnect its systems, throwing a wrench into pharmacies’ ability to dispense pills. Change Healthcare said some of its services were still on pause, and it’s unclear if any patient info was stolen.
Posted on March 1, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
The Bumble dating app said this week that it plans to lay off 30% of its staff (about 350 employees) after a Q4 earnings report highlighted that profits are ghosting the company and Gen Z considers dating apps a turnoff. Bumble CEO Lidiane Jones, who took over in November when founder Whitney Wolfe Herd stepped down, said the cuts would save the company around $55 million. The company plans to invest in relaunching the app next quarter with new safety and AI features to entice all those looking for love.
The S&P 500 index rose 26.51 points (0.5%) to 5,096.27, up 5.2% for the month; the Dow Jones Industrial Average® (DJI) added 47.37 points (0.1%) to 38,996.39, up 2.2% for the month; the NASDAQ Composite gained 144.18 points (0.9%) to 16,091.92, up 6.1% for the month.
The 10-year Treasury note yield (TNX) fell about 3 basis points to 4.244%.
The CBOE Volatility Index® (VIX) dropped 0.44 to 13.40.
Chipmaker shares were among the strongest performers Thursday, helping lift the Philadelphia Semiconductor Index (SOX) 2.7% to a record high close. Banks and food and beverage industries were also firm. Small-cap stocks also extended a recent upswing. The Russell 2000® Index (RUT) erased much of an initial surge to a 22-month high but still finished with a 0.7% advance, gaining 5.5% for the month.
***
***
Hackers that allegedly caused the UnitedHealth Group cyberattack reportedly posted on the dark web that they stole personal data and the records of “millions” of patients.
In a now-deleted post, the Blackcat ransomware group – also known as ALPHV or Noberus – said it stole several terabytes of data from UnitedHealth, which includes medical insurance and health data, Reuters reported, citing screenshots of the post.
Posted on February 12, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
ByStaff Reporters
***
***
Viamedis did not state how many people were affected by the breach, but it did confirm that it manages third-party payments for 84 complementary health insurance companies which when combined, service 20 million people. As soon as the data breach was spotted, Viamedis disconnected its third-party payment management platform.
“Beneficiaries will be able to continue to use their carte vitale and their third-party payment card, the temporary disconnection from the Viamedis platform will only have an impact on certain health professionals, in particular opticians and audio-prosthetists,” it said.
Speaking to Agence France-Presse (AFP), Viamedis General Director, Christophe Cande, said the attack wasn’t ransomware, but rather a successful phishing attack against one of the company’s employees.
“To date, we do not have the number of insured individuals impacted; we are still in the process of investigation,” Cande said.
Viamedis filed a complaint with the public prosecutor, and notified other relevant authorities. For healthcare professionals, it said it would notify them on the details of exposed data later.
Posted on January 24, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
Theranos founder and ex-CEO Elizabeth Holmes was just banned from US federal health care programs for nine decades, according to the US the health department. Holmes was sentenced in November 2022 to 11 years in prison following a trial that determined she knew her blood-testing startup, which was founded in 2003 and which claimed to be able to test for a range of diseases and risks with one finger prick, produced inaccurate and faulty results. Before government probes, Theranos raised hundreds of millions of dollars, named prominent former U.S. officials to its board, and explored a partnership with the U.S. military to use its tests on the battlefield.
So, just what is a Federal Health Care Program?
Federal Health Care Program means any plan or program that provides health benefits, whether directly, through insurance, or otherwise, which is funded directly, in whole or in part, by the United States Government, including, but not limited to, Medicare, Medicaid/MediCal, managed Medicare/Medicaid/MediCal, TriCare/VA/CHAMPUS, SCHIP, Federal Employees Health Benefit Plan, Indian Health Services, Health Services for Peace Corp Volunteers, Railroad Retirement Benefits Black Lung Program, Services Provided to Federal Prisoners, and Pre- Existing Condition Insurance Plans (PCIPs).
Posted on January 14, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
Chat-Bots
By Staff Reporters
***
***
Microsoft just unseated Apple yesterday as the world’s most valuable publicly traded company…and then gave the throne right back. The AI-fueled stock rally that Microsoft has enjoyed for months finally buoyed the software company’s market capitalization to $2.9 trillion Thursday-Firday morning, briefly edging past Apple’s $2.89 trillion. Apple had been the most valuable company in the world for a year and a half, and on-and-off for more than a decade.
Apple was back on top by midday, but Microsoft’s momentary reign—the fourth time it’s briefly overtaken Apple since 2018—indicates that the tables may be turning between these longtime rivals.
Employees in its streaming divisions, Google cut about a thousand roles across its Assistant and core engineering teams, The Verge reported. The company is also reportedly removing 17 “underutilized” features from its voice-activated Google Assistant software, which launched in 2016 to compete with Apple’s Siri and Amazon’s Alexa. Google announced last year that it would integrate its generative AI chatbot, Bard, into Assistant.
DEFINITION: According to the Food and Drug Administration [FDA], the broad scope of digital health includes categories such as mobile health (mHealth), health information technology (IT), wearable devices, tele-health and tele-medicine, and personalized medicine. From mobile medical apps and software that support the clinical decisions doctors make every day to artificial intelligence and machine learning, digital technology has been driving a revolution in health care. Digital health tools have the vast potential to improve our ability to accurately diagnose and treat disease and to enhance the delivery of health care for the individual. Digital health technologies use computing platforms, connectivity, software, and sensors for health care and related uses. These technologies span a wide range of uses, from applications in general wellness to applications as a medical device. They include technologies intended for use as a medical product, in a medical product, as companion diagnostics, or as an adjunct to other medical products (devices, drugs, and biologics). They may also be used to develop or study medical products.
As many investors predicted, digital health funding took a dive in 2023, according to Rock Health’s year-end funding report. Startups got creative to stay afloat but many digital health founders will have to “face the music” in 2024, the VC firm’s analysts say.
Editor’s Note: I am on the Advisory Board of Medblob™a start-up based in Boston, MA. The digital mission of Medblob™ is to improve community and national health by allowing patients to better manage their health, providers to better treat their patients, and researchers to have the best information to discover cures to the most prevalent and pernicious diseases.
Posted on January 10, 2024 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
The S&P 500® index (SPX) was down 7.04 points (0.2%) at 4,756.50; the Dow Jones Industrial Average® (DJI) was down 157.85 points (0.4%) at 37,525.16; the NASDAQ Composite was up 13.94 points (0.1%) at 14,857.71.
The 10-year Treasury note yield (TNX)was up about 2 basis points at 4.019%.
The CBOE® Volatility Index (VIX) was down 0.32 at 12.76.
Energy shares were among the market’s weakest performers Tuesday despite a rally of nearly 2% in crude oil futures. The Philadelphia Oil Service Index (OSX) sank 2.4% to a four-week low. Banking and materials were also notably soft. Small-cap stocks remained under pressure, sending the Russell 2000® Index (RUT) down 1.1%.
Despite the market’s weak start to the year, excessively bullish sentiment “remains a risk” to the recent rally, according to Kevin Gordon, senior investment strategist at Schwab. But he also noted that market “breadth,” the number of advancing shares versus declining shares, is “healthier” than it was for much of 2023. Sentiment “is still quite stretched, which means that the market remains vulnerable to a correction,” Gordon said. “However, the backdrop—whether it’s the number of stocks trading above their 200-day moving average, outperforming their respective benchmark, or in an uptrend—is relatively healthy. That keeps the broader uptrend in place, albeit not perfectly or smoothly.”
Posted on December 16, 2023 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
***
***
In a significant breach of privacy, hackers gained access to the DNA relatives data of 6.9 million users on 23andMe, posing serious questions about the security measures in place for our most personal data.
Meanwhile, Neuralink, the brain-computer interface company, faced disturbing reports about its clinical trials. Allegedly, up to a dozen monkeys suffered severe adverse effects, including brain swelling and partial paralysis, after being implanted with the Neuralink device.
Neuralink Corp. is an American company that is developing brain computer interfaces (BCIs) as of 2022. Founded by Elon Musk and a team of seven scientists and engineers, Neuralink was launched in 2016 and was first publicly reported in March 2017.
Kentucky-based healthcare provider NortonHealthcare has confirmed that it has suffered a significant ransomware attack that may have put the data of millions of its patients at risk. In a filing to the Maine Attorney General on December 8th, the healthcare giant said that 2.5 million individuals had been affected by the breach.
***
***
Meanwhile, the nation’s largest pharmacy chains have handed over Americans’ prescription records to police and government investigators without a warrant, a congressional investigation found, raising concerns about threats to medical privacy. Though some of the chains require their lawyers to review law enforcement requests, three of the largest — CVS Health, Kroger and Rite Aid, with a combined 60,000 locations nationwide — said they allow pharmacy staff members to hand over customers’ medical records in the store.
The policy was revealed in a letter sent to Xavier Becerra, the secretary of the Department of Health and Human Services, by Sen. Ron Wyden (D-Ore.) and Reps. Pramila Jayapal (D-Wash.) and Sara Jacobs (D-Calif.).
HIPAA anyone?
***
Here’s where the major benchmarks ended:
The S&P 500 index was up 21.26 points (0.5%) at 4,643.70; the Dow Jones Industrial Average®(DJI) was up 173.01 points (0.5%) at 36,577.94; the NASDAQ Composite® (COMP) was up 100.91 points (0.7%) at 14,533.40.
The 10-year Treasury note yield (TNX) was down about 3 basis points at 4.206%.
The CBOE® Volatility Index (VIX) was down 0.56 at 12.07.
Technology shares were among Tuesday’s strongest performers despite a 12% drop in Oracle (ORCL), which plunged after reporting lighter-than-expected quarterly revenue late Monday. The Philadelphia Semiconductor Index (SOX) posted its highest close since January 2022.
Financial shares were also firm. Energy shares were under pressure because WTI Crude Oil futures (/CL) extended a slump below $70 per barrel and settled at its lowest price since late June.
Posted on October 15, 2023 by Dr. David Edward Marcinko MBA MEd CMP™
By Staff Reporters
More than 7 million 23andMe customers were the victims of a data breach, with the hackers specifically targeting users of Ashkenazi Jewish ancestry. The data includes users’ names, profile photos, genetic ancestry results, date of birth, and geographical location. The hackers are attempting to sell the data, asking for between $1 and $10 per account, depending on how many accounts a buyer wants to purchase.
How’d they do it? By “credential stuffing”—acquiring the login credentials from one site and using them on other sites in order to gain access to sensitive information. 23andMe reported the incident to law enforcement and is asking all customers to change their passwords and use two-factor authentication.