Summary of 2 Articles and 2 Implementation of article

User Generated

uneqvx42852000

Writing

operation security

Description

Table of Content

Introduction

Articles Summary: (2 pages on each article)

Article 1: “1.4 million patient records breached in UnityPoint health phishing attack”

Article 2: “LifeBridge Health revels breach that compromised health data of 500,000 patients”

Implementations Issues: (1.5 Page discuss issue and 1 paragraph solution)

  • Policy Change
  • Issues with (EHR) Electronic Health Records

Conclusion:

References:

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. Thank you.

Outline

Introduction
Body
Conclusion
References


Running head: SUMMARY OF TWO ARTICLES AND IMPLEMENTATION

Summary of Two Articles and Implementation
Student’s Name
Institutional Affiliation

1

SUMMARY OF TWO ARTICLES AND IMPLEMENTATION

2

Table of Contents
Introduction ..................................................................................................................................... 3
Articles Summary: (2 pages on each article) .................................................................................. 3
Article 1: “1.4 million patient records breached in UnityPoint Health phishing attack” ............ 3
Article 2: “breach that compromised health data of 500,000 patients” ...................................... 5
Implementations Issues: .................................................................................................................. 7
Policy Change .......................................................................................................................... 7
Issues with (EHR) Electronic Health Records ........................................................................ 7
Solution.................................................................................................................................... 8
Conclusion ...................................................................................................................................... 9
References ..................................................................................................................................... 10

SUMMARY OF TWO ARTICLES AND IMPLEMENTATION

3

Introduction
The healthcare systems are facing the challenge of EHR implementation in the modern
world. One significant problem or issue associated with EHR implementation is cyber-attacks,
among other issues, like cost-effectiveness, buy-in challenge and technical ability. This essay
covers summaries of two articles, and the problems associated with EHR implementation and the
applicable solution.
Articles Summary
Article 1: “1.4 million patient records breached in UnityPoint Health phishing attack”
In his article, “1.4 million patient records breached in UnityPoint Health phishing attack”
Davis (2018) brings out a story of UnityPoint HealthCare data breach which occurred in 2018.
Davis starts by stating that the facility has had two breach incidents, with this being the most
significant health data breach in the United States this year. In addition to that, he looks at some
examples of other huge healthcare facilities that have suffered data breaches this year. In his
article, he highlights the measures UnityPoint Healthcare took following the attack, including
resetting passwords and training their employees. The author finds data breach as a major topic
that ought to be addressed at an expert level.
According to Davis the healthcare facility had had another phishing attack in April, that
involved the email accounts of the sta...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags