Researchers can now easily gather EHR patient data, patient-generated health data from mobile devices, and claims and billing information for use in clinical trials and observational studies via the MyStudies app introduced by the FDA. "Better capture of real-world data, collected from a variety of sources, has the potential to make our new drug development process more efficient, improve safety and help lower the cost of product development," said FDA Commissioner Dr. Scott Gottlieb.
Thirty-seven percent of all ransomware attacks in the third quarter of 2018 were attributed to health care data breaches, a report from Beazley found. The top five causes of health care breaches were accidental disclosure, hack or malware, an insider, physical loss or nonelectronic record, and portable devices, according to the report.
Three men who suffered severe spine injuries and lost their ability to walk have regained mobility after receiving an experimental pacemaker-like implant, and there is some indication that the implant has spurred nerve regrowth, researchers reported in Nature. In previous studies, non-human primates regained function through the use of brain implants, and continuous stimulation through the spinal cord not only restored rats' ability to move their hind legs and run but also stimulated the formation of new connections from the motor cortex to brain stem, said Gregoire Courtine, senior author of the new study.
Researchers at Propeller Insights polled 400 health care clinical engineers and health IT decision-makers in the US and found that 41% don't have the budget for connected medical device security, but 87% still expressed confidence in their organization's ability to protect devices against cyberattacks, down from 90% in last year's survey. Although 85% of clinical/biomedical engineers were confident about having a precise connected-devices inventory, almost two-thirds use manual inventory processes, such as room-to-room audits and static asset management.
Deer antlers comprise a complex matrix of rapidly growing bone, tissue and nerve endings, and two genes that work in tandem to drive annual antler regrowth in fallow deer also occur in humans, according to a study published in the Journal of Stem Cell Research & Therapy that also involved mice. The finding could help scientists develop treatments for bone diseases like osteoporosis.
Researchers studying the genes of 81 species of roundworms and flatworms are discovering how worms manipulate the human immune system and cause diseases such as river blindness, schistosomiasis and hookworm disease in a billion people worldwide. The researchers identified many new potential treatment targets and studied existing drugs to identify those that could be repurposed to kill parasitic worms.
The NIH recently issued a final policy for retiring chimpanzees that have played a vital role in biomedical research for decades to a sanctuary in Louisiana, with their care funded by the federal government and private donations. The policy leaves some core philosophical and practical issues unresolved, such as what setting and care practices are best for the well-being of the chimps, including those that are elderly, frail and longtime members of stable social groups, writes Allyson Bennett.
The imminent arrival of "fourth revolution technology," such as 5G, biosensors, genetic manipulation, robotics and neural networking, will prompt health CIOs to learn advancements at a quicker pace than before, CHIME President and CEO Russell Branzell said. Health CIOs and other health IT leaders should communicate and collaborate to keep up with new advancements in health care, Branzell said.
SamSam ransomware attacked a total of 67 organizations across various sectors so far this year, 56 of which were in the US and one-quarter of which affected health care organizations, according to a blog post by security firm Symantec. The firm advises organizations to back up their data and warns against paying ransom because this "does not always work" and cyberattackers "may not send a decryption key, could poorly implement the decryption process and damage files, and may deliver a larger ransom demand after receiving the initial payment."