In response to concerns raised by healthcare leaders that the absence of adjustment for socioeconomic status (SES) and race characteristics in patient populations impedes the fair comparison of hospitals on risk-standardized 30-day unplanned readmission rates, Truven Health AnalyticsTM evaluated the extent to which risk-adjusted readmission rates for acute myocardial infarction, heart failure, and pneumonia are affected by adjustments for community-level SES factors through its Community Need Index (CNI) and patient race. The study shows there is, indeed, a statistically significant effect. For more, visit truvenhealth.com/wp/readmissionpenalties.
The Truven Health 15 Top Health Systems study annually identifies those health system leadership teams that have most effectively aligned outstanding performance across their organizations, and achieved more reliable outcomes in every member hospital. Truven Health Analytics measures U.S. health systems based on a balanced scorecard across a range of performance factors: care quality, patient safety, use of evidence-based medicine, operational efficiency, and customer perception of care.
Medicare spend per beneficiary (MSPB) information is a Centers for Medicare & Medicaid Services metric that reflects the average cost of an episode of care for Medicare patients. This measure is important to consider as part of a hospital’s national balanced scorecard, as it reflects executives’ efforts to transform the healthcare delivery system and manage the full continuum of care, including the prominent shift from inpatient to outpatient utilization.
The Truven Health Analytics 50 Top Cardiovascular Hospitals study identifies hospitals that achieve the best performance on a scorecard of performance measures. This year, based on comparisons between the winners and a peer group of similar high-volume hospitals that were not winners, the study found that if all cardiovascular providers performed at the level of this year’s winners, approximately 9,500 additional patients could survive, more than $1 billion could be saved, and almost 3,000 additional bypass and angioplasty patients could be complication-free. This is based on an analysis of Medicare patients; if the same standards were applied to all inpatients, the impact would be even greater.
The Truven Health Analytics 50 Top Cardiovascular Hospitals study identifies U.S. hospitals that have achieved the best performance on a balanced scorecard of performance measures. Based on comparisons between study winners and a peer group of similar hospitals that were not winners, winners are achieving better outcomes while operating more efficiently and at a lower cost. If all cardiovascular providers performed at the same level of this year’s winners, almost 8,000 additional lives could be saved; nearly 3,500 heart patients could be complication free; and more than $1.3 billion could be saved.
This Fact File examines trends in the detection and treatment of acute myocardial infarctions, or heart attacks, in two distinct groups:
STEMI—ST segment elevation myocardial infarction, with the ST segment referring to a specific part of an electrocardiogram tracing. In STEMI, the coronary artery is completely blocked and cardiac muscle dies.
NSTEMI—Non-ST segment elevation myocardial infarction. In NSTEMI, a coronary artery is partially blocked.
The shift from inpatient to outpatient care is increasing as hospitals transition from volume to value. A specific shift is seen in interventional cardiology treatment (cardiac catheterization, intracoronary stents, and percutaneous transluminal coronary angioplasties [PTCA]), which is moving from an inpatient hospital to outpatient hospital setting. Preliminary data show that most interventional cardiology procedures will soon be performed in the hospital outpatient setting. It will be important for hospitals to consider future demand and volume for interventional cardiology services; capacity for an increase in hospital outpatient volume; and staffing and operational implications.
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors.
HERE can provide an additional layer of security and safeguard your company's reputation.
As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. Establishing a trusted infrastructure through PKI will help businesses take smart risks, evolve quickly and manage relationships with customers, partners, vendors and employees more effectively.
Certificate management is a crucial part of a robust PKI implementation, ensuring visibility and adherence to policy throughout the certificate lifecycle: from identity vetting, to issuance, to renewal to revocation. As Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things”
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Advanced key and certificate management enables the use of digital credentials even in the most demanding of security environments. Such solutions enable users, regardless of whether they are internal or external to their network, to benefit from both basic and enhanced capabilities in a consistent and secure manner.
This document was created to assist organizations in the selection of the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed. This is not intended to be an exhaustive list. It is meant as a starting place to assist you in your review process.
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Published By: Riskified
Published Date: Aug 06, 2019
In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. But many are seeing their hardearned revenue fall victim to costly credit card chargebacks.
Revised Payment Services Directive (PSD2) is the European Commission (EC) and the European Banking Authority’s (EBA) newest regulatory directive to ensure customer security in the payments space, is upon us. In order to comply with these new regulations, you first need to ensure you have a good understanding of what they are, why they exist and how they will affect your organization’s business strategy moving forward.
Don’t let the potential business impact of PSD2 hang over your head. PSD2 can actually be a catalyst for your digital= transformation. With the right solution, you can provide a more secure, better user experience for your customers. If you are able to capitalize on PSD2 and implement a forward-thinking strategy, you can ultimately differentiate your brand from emerging competition — like neobanks, fintechs and wallet providers — and retain customer trust and loyalty.
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance.
Included in the SSL/TLS Best Practices Guide:
Certificates and Private Keys
Enhanced Server Security
Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Consolidate SSL providers and processes, without interruption, using Entrust SSL management and monitoring services
This whitepaper provides a blueprint for migrating to Entrust SSL certificates and related services. It’s based on experiences that help many customers, in a wide variety of environments, bring their SSL certificate management under centralized administration.
Your business is changing. As a finance leader, you know that accounting is a labour-intensive, costly process where
systems often don’t allow for expedient exception handling and many days are fraught with difficulty in matching
invoices to other databases for reconciliation. Like most companies, you know where you want to go but may not have
infrastructure or internal expertise to handle electronic fund transfers, credit card payments or cheque processing— all
the pieces required to make your vision for an efficient, integrated operation a reality.
The end of SHA-1 SSL certificates is here – ahead of schedule. An upgrade to SHA-2 SSL certificates is necessary to maintain proper security, but do you know how to deploy this upgrade? Entrust’s SHA-2 migration guide will help you plan and execute a successful SHA-2 migration to avoid extra costs, eliminate service disruptions and ensure compliance.
Every enterprise is aware of the need for digital transformation. A 2015 study conducted by KPMG found that their top four concerns moving forward were: (1) new entrants disrupting existing business models; (2) the ability to keep current with technology; (3) competitors leveraging digital business models to take share; and (4) products and services remaining relevant as the digital future unfolds.