Tuesday, February 9, 2016
This is the third article in a series on cybersecurity related to the healthcare industry. The first two articles dealt with the incidence and impact of cybersecurity breaches and the responsibilities of each individual case manager in preventing breaches. This article will discuss the incidence and significance of "Phishing" and what you can do to make sure you are not caught in a phishing attack.
Tuesday, January 12, 2016
Learn more about the prevalent threat of cyberattacks and what can be done to counteract this trend in Pat Stricker’s latest article.
Thursday, January 7, 2016
As we reflect on 2015 and embark on the journey that is 2016, it is safe to say that technology and change will continue to be fundamental themes in healthcare, with consumerism becoming a major driver.
Monday, December 21, 2015
Many case managers are now tracking how U.S. health care reform efforts are promoting information technology (IT) system integration to improve patient care, clinical outcomes, business efficiencies, and medical savings. In addition, it is no secret that procuring and successfully implementing such IT systems can be a formidable undertaking. Keeping up with expanding synergetic interfaces between technology and care management workflow processes is essential in order to offer effective medical management programs.
Wednesday, May 20, 2015
Although assessing the impact of a particular care management software application is important, it can also be a complicated endeavor. The classic, and often unanswered, question is this: What is the return on investment (ROI) from a financial and clinical perspective?

Pages