ITUpdate for February 2015

Share this content:

» An updated federal health information technology plan announced in December aims to expand health information technology adoption and use efforts across the care continuum, emphasizing assistance for healthcare providers serving long-term care. The plan also focuses on efforts to promote the use of interoperable information by healthcare providers and public health entities to improve healthcare and reduce costs.

» Technophobia may keep seniors from using apps to manage diabetes, finds a University of Waterloo study. Although 92% of study participants owned a computer or had daily Internet access, just 18% used applications on this technology to help manage their diabetes. And while almost half owned smartphones, only 5% used them to manage their disease. Findings appear in the Journal of Diabetes Science and Technology. 

» A new Plymouth University study published in the journal Computer Fraud and Security suggests that many major websites could be doing more to promote improved password security. Researchers examined the password security controls in place among 10 of the world's most visited websites, finding that very few of them gave detailed guidance about the importance of providing secure passwords, either when users were creating or updating accounts. The majority also provided little or no information about why password protection is important and didn't enforce best practices such as alphanumerical inclusion or offer password strength meters.

» William Shatner launched
a Kickstarter project in November to release his new book, “Catch Me Up.” The book features interviews between Shatner and adults age 50 and older who redefined themselves by embracing new technology and accepting new challenges later in life.

» Spam goes to more people and spreads faster when being propagated by hacked email accounts rather than legitimate accounts, according to researchers at Carnegie Mellon University. Spammers often rely on hacked accounts, they said. Results were published in the International Journal of Security and Networks.


Next Article in News