Blog Listing

Congrats to OhioHealth’s Jim Lowder on making the InfoWorld CTO 25
Congrats to OhioHealth’s Jim Lowder on making the InfoWorld CTO 25
Just a quick post to congratulate OhioHealth's CTO Jim Lowder on being named to
Study Finds Security and Privacy is Low Priority for Health Care Organizations
Study Finds Security and Privacy is Low Priority for Health Care Organizations
The recent Ponemon Institute benchmark study on patient data privacy and security practices sheds some much-needed light on the practice of data protection within our nation’s hospitals. According to the study, today’s hospitals have little confidence in their ability to secure patient records, revealing just how vulnerable they are to data breaches – a concern for all patients. Highlighted are some of the key findings...
Guest Post: The New Need for Auditing: Privacy and Breach Notification Mandates
Guest Post: The New Need for Auditing: Privacy and Breach Notification Mandates
The HITECH Act, HIPAA, as well as mandates from State regulations (e.g. Massachusetts 201 CMR 17.00), are raising the minimal requirements that organizations such as healthcare-covered entities and business associates must implement to prevent unauthorized access. Further, the Connecticut Attorney General’s lawsuit against Health Net of Connecticut for failing to secure approximately 446,000 enrollees’ Protected Health Information (PHI), and to notify State authorities and enrollees of a security breach, is a reminder that breaches are not just a risk to information, but a risk to the organization.
EMR Survey Finds Best Value Resides in Secondary Uses, but what about Data Security?
EMR Survey Finds Best Value Resides in Secondary Uses, but what about Data Security?
I read a good article on FierceEMR recently surrounding a PricewaterhouseCoopers survey on electronic medical records (EMRs) that indicated that the secondary use of this information may be an organization’s greatest asset over the next five years. An overwhelming 76 percent of respondents agreed, and pointed to the abilities for mined data to decrease healthcare costs, predict public health trends and improve patient care. EMRs, with vendors such as Allscripts, NextGen and QuadraMed blazing the trail, have been a huge focal point of healthcare payers and providers, pharmaceutical companies and the general public with healthcare reform a primary platform of the Administration.
Five Things to do in Identity Management this Summer
Five Things to do in Identity Management this Summer
Theoretically, as employees go on vacation during the summer months, there will be fewer demands on your IT team. Realistically, we know that’s not true and it seems like there is actually more to do. However, summer can provide the opportunity to step back and evaluate the state of your identity and authentication management infrastructure and policies. Here are five things that are easy to overlook throughout the year that you should consider doing this summer:
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
ASIS 2008 in Atlanta: Where Physical/Logical Convergence Happens
I just came back from the ASIS 2008 Show in Atlanta and boy, do my feet hurt. Over 15,000 attendees, participation in 6 booths including our own, 3 days of constant conversation will do that to a person. This security show is the top venue for those wanting to be educated on the latest in security...from state of the art manhole covers to new IP video and access control systems.
MUSE Musings
MUSE Musings
Having spent last week at the 2008 International MUSE (Medical Users Software Exchange) Conference in Grapevine Texas - the 25th annual gathering of clinical and technical users of Meditech software - I was delighted to see SSO is such a hot topic among this group. There were five customer presentations related to SSO and Strong Authentication, and all of them were filled to capacity.
VMworld 2011: From the Show Floor Part 1
VMworld 2011: From the Show Floor Part 1
I’m extremely excited about our participation in this year’s show particularly the opportunity to demonstrate the results of our collaboration and integration with some of our partners. Imprivata is working in conjunction with VMware, Teradici, Dell, and VCE to showcase our joint solutions, which showcase VMware View serving up virtual desktops,
Imprivata Professional Services Announces New Services Offerings Portfolio
Imprivata Professional Services Announces New Services Offerings Portfolio
Professional Services are not something that should only be considered during the initial implementation of Imprivata OneSign. As our customer base has grown through the years, we’ve seen their personnel come and go, departments change, infrastructure develop and new technology appear. What doesn’t change is the need to provide simple secure access even though regulations get more rigorous and security threats become greater.
Imprivata Zeroes in on VMworld 2011
Imprivata Zeroes in on VMworld 2011
Head over to the Imprivata booth #1070 to take a look at the tech preview of the joint development between Teradici and Imprivata. And just in case it’s too busy to get close, you can also see it at the VMware, Teradici, Dell and VCE stands. Yes, it’s that cool. While you’re there, ask Michelle for some sonic rocks – I hear they’re kind of fun...
From  Imprivata Booth 118 at Siemens Innovations – Las Vegas
From Imprivata Booth 118 at Siemens Innovations – Las Vegas
The Siemens show has been fantastic. What a great group of people, from Siemens and their customers, as well as all the other great Siemens partners that are participating. What are we hearing? Signing on to desktops and applications is extremely painful! Remembering all the different passwords, trying to type them in while a patient is waiting for you, the time it takes for the applications to load… We need to simplify access to EMR and hospital IT systems for our clinicians! For those that know Imprivata, and for those that have been introduced to us this week, the response has been consistent; We can simplify access saving clinicians 15 minutes per day and help drive EMR adoption.
2,246 Eligible Professionals and 100 Hospitals Successfully Attest to Meaningful Use
2,246 Eligible Professionals and 100 Hospitals Successfully Attest to Meaningful Use
The Meaningful Use Analysis presented at the recent HIT Policy Committee Meeting indicates that 2,246 Eligible Professionals and 100 Hospitals have attested successfully. That’s a good start to EHR Adoption; with Stage 2 potentially delayed for these earlier adopters it will be interesting to see how many more attest to Meaningful Use in 2011.
Wanted:  A cure for medical data breaches.
Wanted: A cure for medical data breaches.
Data breaches in healthcare are certainly not new. Most data breaches today occur when electronic patient information (known as "protected health information" or PHI in the HIPAA regulation) is stored unencrypted on a device that is lost or stolen. All of the data breach laws in effect today state that as long as the data or device are encrypted, there is no data breach and therefore no liability or legal remedy. So if it's that easy, why do the number of breaches in healthcare continue to grow at alarming rates?
Radiologists adopt single sign-on for fast access to applications
Radiologists adopt single sign-on for fast access to applications
As leaders in technology adoption, Radiologists are starting to look to biometrics to help provide No Click Access to the various systems and places they nee
Who is impacted by the move of Stage 2 Meaningful Use?
Who is impacted by the move of Stage 2 Meaningful Use?
On November 30, 2011 HHS announced that they approve of the proposed push of Stage 2 Meaningful Use from 2013 to 2014 that has been talked about since July of this year. But who does this decision really impact?
Ponemon Institute Study Quantifies How Single Sign-On Can Save Hospitals Time and Money
Ponemon Institute Study Quantifies How Single Sign-On Can Save Hospitals Time and Money
Study spotlights the value of single sign-on solutions for hospitals seeking meaningful use credits. An eye-opening new study that was just released from the Ponemon Institute revealed roughly 60 percent of the more than 400 healthcare IT respondents believe that single sign-on (SSO) solutions support their organizations’ efforts to demonstrate the “meaningful use” of EMR adoption.
No Click Access from zero clients? It’s just another client right?
No Click Access from zero clients? It’s just another client right?
Today, Teradici have released Teradici PCoIP® Firmware release 3.5. Within this firmware update is code specifically designed to integrate with a new API from Imprivata that enables full No Click Access™ from a Teradici-enabled PCoIP zero client. This integration supports strong authentication with just the tap of an access card or ID badge to automate the process of bringing the user directly to their virtual desktop.
Increase Physician Adoption of EHRs
Increase Physician Adoption of EHRs
On April 21st, the HIT Policy Committee Certification/Adoption Workgroup held a meeting to discuss Electronic Health Record (EHR) usability.
Saving clicks for clinicians – Imprivata OneSign verified as Citrix Ready
Saving clicks for clinicians – Imprivata OneSign verified as Citrix Ready
By combining the benefits of roaming desktops with the simplicity of No Click Access delivered by Imprivata OneSign, clinicians can now access Citrix XenDesktop or XenApp with the tap of a badge or swipe of a fingerprint - enabling clinicians to dedicate more of their time with their patients and less time with the computer.
Verity Credit Union Live Webinar - Q&A
Verity Credit Union Live Webinar - Q&A
Security compliance often requires complex passwords – causing user frustration and helpdesk calls. Jon Wu, System Engineer at Verity Credit Union, joined me for a webinar on how SSO helped Verity increase user productivity and customer satisfaction. Below is the transcribed Q&A from the webinar. View the full webinar here Question 1: Did auditing play a role in your decision to buy single sign-on, and has it helped with reporting on user access? Answer: Yes it did. When we first mentioned that we would be getting a password program, users were nervous. They thought, “is this password program going to remember all of my passwords and keep it secure?” When we presented to Imprivata, they said no problem, it’s all taken care of. From end to end the passwords are encrypted. Imprivata takes care of both situations, and we don’t have to worry about it being exposed in any way.