{"id":4937,"date":"2017-05-15T16:40:00","date_gmt":"2017-05-15T20:40:00","guid":{"rendered":"https:\/\/armchairarcade.com\/perspectives\/?p=4937"},"modified":"2018-09-28T16:23:03","modified_gmt":"2018-09-28T20:23:03","slug":"infographic-protecting-patient-information-age-breaches","status":"publish","type":"post","link":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/","title":{"rendered":"Infographic: Protecting Patient Information in the Age of Breaches"},"content":{"rendered":"<p>In recent times, over 1,000 health care organizations have experienced network breaches causing overwhelming amounts of protected health data to be compromised. Infiltrating the networks of health care facilities is an alarming trend among hackers, <a href=\"https:\/\/www.centrify.com\/solutions\/privileged-access-management\/\">although companies are working hard to prevent their access<\/a>, but what is the allure? Health care facilities carry some of the most sensitive reserves of data files across the board, supplying hackers with the kind of sensitive information that has limitless potential to not only effect the health care organization that they have infiltrated, but also the patients involved in the breach.<\/p>\n<p>To learn more about protecting patient information, check out the infographic below created by the University of Illinois at Chicago\u2019s <a href=\"http:\/\/healthinformatics.uic.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">online programs in Health Informatics and Health Information Management<\/a>.<\/p>\n<p><a href=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4943 size-full\" src=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg?resize=800%2C3647\" alt=\"\" width=\"800\" height=\"3647\" srcset=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg?w=800&amp;ssl=1 800w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg?resize=33%2C150&amp;ssl=1 33w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg?resize=66%2C300&amp;ssl=1 66w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/Protecting-Patient-Info-R1.jpg?resize=768%2C3501&amp;ssl=1 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/healthinformatics.uic.edu\/resources\/infographics\/protecting-patient-information\/\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent times, over 1,000 health care organizations have experienced network breaches causing overwhelming amounts of protected health data to be compromised. Infiltrating the networks of health care facilities is an alarming trend among hackers, although companies are working hard to prevent their access, but what is the allure? Health [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Infographic: Protecting Patient Information in the Age of Breaches #HIPAA #databreach #health #healthcare","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[678],"tags":[1240,1180,1184,1239,604],"class_list":["post-4937","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infographic","tag-data-breach","tag-health","tag-healthcare","tag-hipaa","tag-medical"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade\" \/>\n<meta property=\"og:description\" content=\"In recent times, over 1,000 health care organizations have experienced network breaches causing overwhelming amounts of protected health data to be compromised. Infiltrating the networks of health care facilities is an alarming trend among hackers, although companies are working hard to prevent their access, but what is the allure? Health [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Armchair Arcade\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007\" \/>\n<meta property=\"article:author\" content=\"http:\/\/www.facebook.com\/profile.php?id=1073711687&amp;ref=name\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T20:40:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-09-28T20:23:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"930\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Loguidice\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/billloguidice\" \/>\n<meta name=\"twitter:site\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Loguidice\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/\"},\"author\":{\"name\":\"Bill Loguidice\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/bae714a369574316943170bcaf9bc436\"},\"headline\":\"Infographic: Protecting Patient Information in the Age of Breaches\",\"datePublished\":\"2017-05-15T20:40:00+00:00\",\"dateModified\":\"2018-09-28T20:23:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/\"},\"wordCount\":136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/ScreenClip-3.png?fit=930%2C451&ssl=1\",\"keywords\":[\"data breach\",\"health\",\"healthcare\",\"HIPAA\",\"medical\"],\"articleSection\":[\"Infographic\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/\",\"name\":\"Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/ScreenClip-3.png?fit=930%2C451&ssl=1\",\"datePublished\":\"2017-05-15T20:40:00+00:00\",\"dateModified\":\"2018-09-28T20:23:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/ScreenClip-3.png?fit=930%2C451&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/ScreenClip-3.png?fit=930%2C451&ssl=1\",\"width\":930,\"height\":451,\"caption\":\"Infographic: Protecting Patient Information in the Age of Breaches\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2017\\\/05\\\/15\\\/infographic-protecting-patient-information-age-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infographic: Protecting Patient Information in the Age of Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"name\":\"Armchair Arcade\",\"description\":\"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"alternateName\":\"AA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\",\"name\":\"Armchair Arcade\",\"alternateName\":\"AA\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"width\":250,\"height\":250,\"caption\":\"Armchair Arcade\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Armchair-Arcade\\\/141237783007\",\"https:\\\/\\\/x.com\\\/armchairarcade\",\"https:\\\/\\\/instagram.com\\\/bill_loguidice\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"https:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/armchair-arcade\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/bae714a369574316943170bcaf9bc436\",\"name\":\"Bill Loguidice\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2014\\\/10\\\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2014\\\/10\\\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2014\\\/10\\\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1\",\"caption\":\"Bill Loguidice\"},\"description\":\"Bill Loguidice is a Founder and Managing Director for Armchair Arcade, as well as a critically acclaimed technology author and journalist.\u00a0 He is also the co-founder of creative services firm, Armchair Creative Services, and a noted videogame and computer historian and subject matter expert. See full bio\",\"sameAs\":[\"http:\\\/\\\/armchairarcade.com\\\/perspectives\\\/team\\\/bill-loguidice\\\/\",\"http:\\\/\\\/www.facebook.com\\\/profile.php?id=1073711687&ref=name\",\"http:\\\/\\\/instagram.com\\\/bill_loguidice\",\"http:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"http:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/billloguidice\",\"http:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\",\"http:\\\/\\\/billloguidice.tumblr.com\\\/\"],\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/author\\\/bill-loguidice\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade","og_description":"In recent times, over 1,000 health care organizations have experienced network breaches causing overwhelming amounts of protected health data to be compromised. Infiltrating the networks of health care facilities is an alarming trend among hackers, although companies are working hard to prevent their access, but what is the allure? Health [&hellip;]","og_url":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/","og_site_name":"Armchair Arcade","article_publisher":"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","article_author":"http:\/\/www.facebook.com\/profile.php?id=1073711687&ref=name","article_published_time":"2017-05-15T20:40:00+00:00","article_modified_time":"2018-09-28T20:23:03+00:00","og_image":[{"width":930,"height":451,"url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","type":"image\/png"}],"author":"Bill Loguidice","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/billloguidice","twitter_site":"@armchairarcade","twitter_misc":{"Written by":"Bill Loguidice","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#article","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/"},"author":{"name":"Bill Loguidice","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/bae714a369574316943170bcaf9bc436"},"headline":"Infographic: Protecting Patient Information in the Age of Breaches","datePublished":"2017-05-15T20:40:00+00:00","dateModified":"2018-09-28T20:23:03+00:00","mainEntityOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/"},"wordCount":136,"commentCount":0,"publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","keywords":["data breach","health","healthcare","HIPAA","medical"],"articleSection":["Infographic"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/","url":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/","name":"Infographic: Protecting Patient Information in the Age of Breaches - Armchair Arcade","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#primaryimage"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","datePublished":"2017-05-15T20:40:00+00:00","dateModified":"2018-09-28T20:23:03+00:00","breadcrumb":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#primaryimage","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","width":930,"height":451,"caption":"Infographic: Protecting Patient Information in the Age of Breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-protecting-patient-information-age-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/armchairarcade.com\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Infographic: Protecting Patient Information in the Age of Breaches"}]},{"@type":"WebSite","@id":"https:\/\/armchairarcade.com\/perspectives\/#website","url":"https:\/\/armchairarcade.com\/perspectives\/","name":"Armchair Arcade","description":"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003","publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"alternateName":"AA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/armchairarcade.com\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/armchairarcade.com\/perspectives\/#organization","name":"Armchair Arcade","alternateName":"AA","url":"https:\/\/armchairarcade.com\/perspectives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","width":250,"height":250,"caption":"Armchair Arcade"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","https:\/\/x.com\/armchairarcade","https:\/\/instagram.com\/bill_loguidice\/","https:\/\/www.linkedin.com\/in\/billloguidice","https:\/\/www.pinterest.com\/billloguidice\/armchair-arcade\/","https:\/\/www.youtube.com\/user\/BillLoguidice\/"]},{"@type":"Person","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/bae714a369574316943170bcaf9bc436","name":"Bill Loguidice","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2014\/10\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2014\/10\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2014\/10\/Bill-Loguidice-October-2025-1-1_small.jpg?fit=96%2C96&ssl=1","caption":"Bill Loguidice"},"description":"Bill Loguidice is a Founder and Managing Director for Armchair Arcade, as well as a critically acclaimed technology author and journalist.\u00a0 He is also the co-founder of creative services firm, Armchair Creative Services, and a noted videogame and computer historian and subject matter expert. See full bio","sameAs":["https:\/\/armchairarcade.com\/perspectives\/team\/bill-loguidice\/","http:\/\/www.facebook.com\/profile.php?id=1073711687&ref=name","http:\/\/instagram.com\/bill_loguidice","http:\/\/www.linkedin.com\/in\/billloguidice","http:\/\/www.pinterest.com\/billloguidice\/","https:\/\/x.com\/https:\/\/twitter.com\/billloguidice","http:\/\/www.youtube.com\/user\/BillLoguidice","http:\/\/billloguidice.tumblr.com\/"],"url":"https:\/\/armchairarcade.com\/perspectives\/author\/bill-loguidice\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-3.png?fit=930%2C451&ssl=1","jetpack-related-posts":[{"id":5139,"url":"https:\/\/armchairarcade.com\/perspectives\/2017\/06\/14\/infographic-making-predictive-analytics-routine-part-patient-care-hospitals\/","url_meta":{"origin":4937,"position":0},"title":"Infographic: Making Predictive Analytics a Routine Part of Patient Care in Hospitals","author":"Bill Loguidice","date":"June 14, 2017","format":false,"excerpt":"Today, 96% of hospitals have converted to electronic health records (EHR). Since 83% of adults and 92 percent of children visit a doctor every year, health care systems manage an extraordinarily growing amount of data every year. While hospitals are beginning to apply big data techniques to predict individual outcomes\u2026","rel":"","context":"In &quot;Infographic&quot;","block_context":{"text":"Infographic","link":"https:\/\/armchairarcade.com\/perspectives\/category\/infographic\/"},"img":{"alt_text":"Infographic: Making Predictive Analytics a Routine Part of Patient Care in Hospitals","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/06\/header.png?fit=800%2C445&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/06\/header.png?fit=800%2C445&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/06\/header.png?fit=800%2C445&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/06\/header.png?fit=800%2C445&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":4932,"url":"https:\/\/armchairarcade.com\/perspectives\/2017\/05\/15\/infographic-assessing-mitigating-risks-electronic-health-records\/","url_meta":{"origin":4937,"position":1},"title":"Infographic: Assessing and Mitigating Risks for Electronic Health Records","author":"Bill Loguidice","date":"May 15, 2017","format":false,"excerpt":"Electronic Health Records (EHR) have become common in the US with nine out of every 10 physicians surveyed saying that they have adopted the technology. In fact, EHR adoption and usage has more than doubled from 42% in 2008 to 87% in 2016. What\u2019s more, up to 90% of hospitals\u2026","rel":"","context":"In &quot;Infographic&quot;","block_context":{"text":"Infographic","link":"https:\/\/armchairarcade.com\/perspectives\/category\/infographic\/"},"img":{"alt_text":"Infographic: Assessing and Mitigating Risks for Electronic Health Records","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-2.png?fit=684%2C276&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-2.png?fit=684%2C276&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2017\/05\/ScreenClip-2.png?fit=684%2C276&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":187591,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/09\/24\/aspects-of-custom-healthcare-software-development-in-2024\/","url_meta":{"origin":4937,"position":2},"title":"Aspects of Custom Healthcare Software Development in 2024","author":"Jane Smith","date":"September 24, 2024","format":false,"excerpt":"his guide will explore the key aspects of custom healthcare software development in 2024, including trends, benefits, challenges, and best practices for successful implementation.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"doctor conducting a telemedicine appointment with a person sick in bed - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/09\/doctor-conducting-a-telemedicine-appointment-with-a-person-sick-in-bed.png?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/09\/doctor-conducting-a-telemedicine-appointment-with-a-person-sick-in-bed.png?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/09\/doctor-conducting-a-telemedicine-appointment-with-a-person-sick-in-bed.png?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/09\/doctor-conducting-a-telemedicine-appointment-with-a-person-sick-in-bed.png?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":189284,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","url_meta":{"origin":4937,"position":3},"title":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data","author":"Jonathan Adams","date":"May 31, 2025","format":false,"excerpt":"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"teal LED panel","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":188289,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/01\/16\/protecting-your-belongings-how-science-is-improving-self-storage-security-systems\/","url_meta":{"origin":4937,"position":4},"title":"Protecting Your Belongings: How Science Is Improving Self-Storage Security Systems","author":"Jane Smith","date":"January 16, 2025","format":false,"excerpt":"Explore how self-storage systems are evolving with advanced security features to meet the growing needs of both physical and digital asset protection.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Close-up of a Blue Eye","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/01\/Close-up-of-a-Blue-Eye.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/01\/Close-up-of-a-Blue-Eye.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/01\/Close-up-of-a-Blue-Eye.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/01\/Close-up-of-a-Blue-Eye.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/01\/Close-up-of-a-Blue-Eye.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4249,"url":"https:\/\/armchairarcade.com\/perspectives\/2016\/09\/29\/infographic-future-technology-films\/","url_meta":{"origin":4937,"position":5},"title":"Infographic: Future Technology from Films","author":"Bill Loguidice","date":"September 29, 2016","format":false,"excerpt":"The following information and infographic is courtesy of James Sanders and vouchercloud: Whether it be a hoverboard from Back to the Future, some top of the range memory loss tools from MIB or, of course, a lightsaber from Star Wars, all of us have watched a movie and truly wished\u2026","rel":"","context":"In &quot;Infographic&quot;","block_context":{"text":"Infographic","link":"https:\/\/armchairarcade.com\/perspectives\/category\/infographic\/"},"img":{"alt_text":"Future Technology from Films","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/09\/Future_Technology_Expected_From_Films2-e1475158964819.png?fit=837%2C487&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/09\/Future_Technology_Expected_From_Films2-e1475158964819.png?fit=837%2C487&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/09\/Future_Technology_Expected_From_Films2-e1475158964819.png?fit=837%2C487&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/09\/Future_Technology_Expected_From_Films2-e1475158964819.png?fit=837%2C487&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p5dH5R-1hD","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/4937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/comments?post=4937"}],"version-history":[{"count":0,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/4937\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media\/4941"}],"wp:attachment":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media?parent=4937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/categories?post=4937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/tags?post=4937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}