Making Healthcare Data Consumer Friendly: Chatting with Andrew Miller of Cambia Health Solutions

Making Healthcare Data Consumer Friendly: Chatting with Andrew Miller of Cambia Health Solutions

One of the best things about our profession is the opportunity to meet and collaborate with so many talented and interesting people at our clients and in the community. This blog series introduces some of the executives with whom we work and spotlights the ways they are leading and making their mark, both personally and professionally.…

Read More
Data Governance Guiding Principles

Data Governance Guiding Principles

Some form of data governance is necessary for all organizations, regardless of industry or size. Data governance accomplishes many goals, from meeting regulatory requirements to fueling strategic initiatives that depend on data. While most organizations recognize the importance of data governance, they have trouble keeping momentum after starting. One issue is that data governance models are...

Read More
A Complex Industry Demands Complex Technology Investment

A Complex Industry Demands Complex Technology Investment

Fueled by legislative and regulatory changes, hospital IT budgets – and specifically EHR investments – spiked over the last decade, outpacing overall healthcare expenditure growth.    As health systems enter the post-EHR era, leadership must weigh market forces with the following options: Cut IT spending Continue to invest in new IT solutions Address accumulated technology debt from other...

Read More
Why I Decided to Find a New Doctor

Why I Decided to Find a New Doctor

As I sat in my dermatologist’s office for the third time in a month, I couldn’t help but think about my dissatisfaction at being there. Was it the long wait time? The boring, sterile waiting room? Or was it the unfriendly staff who clearly couldn’t care less about me? There had to be some research that explained my frustration, especially as I realized I needed to search for a new doctor’s...

Read More
Off the Chain – Blockchain is Hot but Still Unproven

Off the Chain – Blockchain is Hot but Still Unproven

We are about 24 months into the hype cycle on Blockchain, measured by the volume of news that has started trickling out from institutional investors and software companies, as well as the recent surge of interest in Crypto Currency trading.  We are potentially looking at another 24 months from starting to see a real presence in the marketplace, so now seems like a good time to address where...

Read More
5 Thoughts on the CVS-Aetna Deal – From a Technology Integration Perspective

5 Thoughts on the CVS-Aetna Deal – From a Technology Integration Perspective

On Monday, pharmacy retailer CVS announced it is acquiring the health payer Aetna in a $69 billion deal. The unorthodox merger is raising many questions in the healthcare industry and M&A circles. Since every day West Monroe’s M&A practice helps merging companies understand their technology “to-do list” pre- and post-merger, we have several thoughts on what lies ahead for the new...

Read More
Revolutionizing healthcare through technology: Talking with Cathy Johnson of Providence Health & Services

Revolutionizing healthcare through technology: Talking with Cathy Johnson of Providence Health & Services

One of the best things about our profession is the opportunity to meet and collaborate with so many talented and interesting people at our clients and in the community. This blog series introduces some of the executives with whom we work and spotlights the ways they are leading and making their mark, both personally and professionally.…

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Top 6 Ways to Combat Change Fatigue

Top 6 Ways to Combat Change Fatigue

When I read Bill’s blog “Where’s the Snooze Button on Change?” I was inspired to write my own perspective on managing change. And then I hit my own snooze button a few times in the last few months due to some competing priorities. Change fatigue is real – and something I observe often at clients.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons