TechMagic/Blog/
Anna Solovei

“Writing is probably the one legitimate way to speak to an imaginary audience and get paid for it”.

Anna Solovei

Anna Solovei

Content Writer. Master’s in Journalism, second degree in translating Tech to Human. 7+ years in content writing and content marketing

Anna is a Content Writer at TechMagic with a Master’s degree in Journalism and more than seven years of experience in content writing and marketing. Anna helps TechMagic tell stories in a clear, human way that connects with readers. Her work mostly focuses on Healthcare, Cybersecurity, AI, ML, and Hospitality. These are the industries where technology truly impacts people’s lives. With a background in journalism, Anna brings curiosity, empathy, and attention to detail to every project. She often collaborates with and interviews technical experts, both at TechMagic and beyond, to create content that’s accurate, insightful, and grounded in real experience. Outside of writing, Anna is a proud cat lover and an avid reader who believes that a good book (and a purring cat) can spark just as much inspiration as a great idea.

HealthTech

How to Create a GDPR-compliant EMR Without Slowing Down Development?

Every 24 hours, a hospital somewhere in Europe faces a data breach. Healthcare is the single most targeted industry for cyberattacks globally, and EMR systems sit right at the center of that bullseye, holding the most sensitive data a person can have.

Alexandr Pihtovnicov
Anna Solovei
ByAlexandr Pihtovnicov, Anna Solovei

14 April 2026 · 13 min read

Read post
How to Create a GDPR-compliant EMR Without Slowing Down Development?
Hospitality

Best Booking Engines for Hotels in 2026: Comparison, Pros & Real-World Use Cases

Over 80% of online travel bookings are abandoned if the process feels too long or confusing. At the same time, many hotels still rely heavily on online travel agencies (OTAs) and other distribution channels, losing 15–25% of every booking to commissions.

Bohdana Muzyka
Anna Solovei
ByBohdana Muzyka, Anna Solovei

13 April 2026 · 15 min read

Read post
Best Booking Engines for Hotels in 2026: Comparison, Pros & Real-World Use Cases
HealthTech

What Are the Biggest Mistakes Founders Make When Building EMR?

Sometimes, custom EMR projects can become expensive, slow, and difficult to adopt, even when the goal is clear from the start. Scope gaps and late security decisions often create bigger problems than missing features. But we know how to fix it.

Alexandr Pihtovnicov
Anna Solovei
ByAlexandr Pihtovnicov, Anna Solovei

9 April 2026 · 11 min read

Read post
What Are the Biggest Mistakes Founders Make When Building EMR?
Security

Cloud Security Compliance: What Security and Risk Leaders Need to Know

Most enterprises run across two or more cloud providers. Each new service speeds up delivery, and it also adds another set of identities, configurations, and audit trails to manage. For security and risk leaders, that growth brings a hard question: How to prove our controls work at any moment, not only during an audit?

Victoria Shutenko
Anna Solovei
ByVictoria Shutenko, Anna Solovei

3 April 2026 · 14 min read

Read post
Cloud Security Compliance: What Security and Risk Leaders Need to Know
HealthTech

How to Use Medplum as an Integration Layer for Healthcare Systems

The average hospital works with dozens of external systems. Large health systems may manage hundreds of interfaces at once. Industry reports estimate that health IT teams spend up to 30-40% of their time maintaining existing integrations instead of delivering new capabilities. And interoperability gaps remain one of the top barriers to digital transformation.

Alexandr Pihtovnicov
Anna Solovei
ByAlexandr Pihtovnicov, Anna Solovei

2 April 2026 · 13 min read

Read post
How to Use Medplum as an Integration Layer for Healthcare Systems
AI

Shadow AI: Security Risks and Practical Ways to Manage Them (+Expert Advice)

In February 2025, researchers showed that data from 20,000+ GitHub repositories that were later made private could still be surfaced via Copilot. This impacted 16,000+ organizations. That incident is a clean example of the shadow AI problem: employees adopt powerful AI tools fast, but security teams often can’t see what’s being used in the browser or what data is flowing into it. 

Ihor Sasovets
Anna Solovei
ByIhor Sasovets, Anna Solovei

31 March 2026

Read post
Shadow AI: Security Risks and Practical Ways to Manage Them (+Expert Advice)

Cost-Effective AWS Security Best Practices

Is your AWS environment as secure and cost-effective as it could be? Watch our webinar where AWS security experts will dive into strategies that can help you get the most out of your security investment while minimizing risks.

Cost-Effective AWS Security Best Practices
cookie

We use cookies to personalize content and ads, to provide social media features and to analyze our traffic. Check our privacy policy to learn more about how we process your personal data.