Blog Listing

How Leading New York Hospitals are Approaching I-STOP Compliance
How Leading New York Hospitals are Approaching I-STOP Compliance
Learn how leading New York hospitals are critically thinking about, and planning for, I-STOP's mandatory introduction of EPCS processes.
Virtual Desktop Infrastructure (VDI) Best Practices: Advice from North Bend Medical Center
Virtual Desktop Infrastructure (VDI) Best Practices: Advice from North Bend Medical Center
Desktop virtualization is changing the way care providers work at North Bend Medical Center (NBMC) in Southern Oregon. Doug McCleod, CTO and Joshua Rabe, Systems Architect at NBMC recently discussed the impact of desktop virtualization on IT efficiency, provider productivity, and patient care. They are successfully completing their Virtual Desktop Infrastructure (VDI) project on time and on budget.
Technology is the great separator in the opioid addiction crisis
Technology is the great separator in the opioid addiction crisis
In his New York Times op-ed, “How Doctors Helped Drive the Addiction Crisis, (Nov. 7, 2015),” Richard Friedman called for a sea-change within the medical profession to combat the growing addiction crisis in our country, calling for improved training and education for physicians.
2 patient identification metrics that put patients at risk
2 patient identification metrics that put patients at risk
Even hospitals that follow strict rules and protocols run the risk of patient identification errors, the Healthcare Financial Management Association found in
Let the clinicians be heard: Nuance Dragon’s Peter Mahoney talks voice powered secure messaging
Let the clinicians be heard: Nuance Dragon’s Peter Mahoney talks voice powered secure messaging
Earlier this month, we a
Healthcare organizations report thousands of hours and millions of dollars saved with SSO and VDI
Healthcare organizations report thousands of hours and millions of dollars saved with SSO and VDI
As a practicing emergency physician, I’ve seen firsthand how technology impacts patient care.
Helpful everyday uses for SSO
Helpful everyday uses for SSO
The days of needing only one or two sets of login credentials are long gone.
Gartner to healthcare provider CIOs: Evaluate biometrics for their most important patient identification use cases
Gartner to healthcare provider CIOs: Evaluate biometrics for their most important patient identification use cases
We believe a new report featuring recommendations by Gartner analyst Barry Runyon calls on healthcare provider CIOs to eva
A preview of the upcoming NAHAM 2018 conference
A preview of the upcoming NAHAM 2018 conference
The National Association of Healthcare Access Management (NAHAM) annual conference is the premier patient access educational event, providing the latest info
How to improve patient care starting at registration
How to improve patient care starting at registration
Wait times across all types of healthcare settings averaged nearly 19 minutes in 2017, according to a Vitals2 study.
An overlooked weapon in your cyber security arsenal: IAM
An overlooked weapon in your cyber security arsenal: IAM
There’s no escaping the fact that cyber criminals are hitting healthcare hard.
Three tips to Jumpstart your Distressed IGA Deployment
Three tips to Jumpstart your Distressed IGA Deployment
A focus of the Gartner Identity & Access Management Summit this week is identity governance and administration (IGA) as a foundational component to a successful identity and access management (IAM) initiative.
VMworld 2011: From the Show Floor-  Part 2
VMworld 2011: From the Show Floor- Part 2
Day 2 is now in full swing at VMworld 2011. We had a very busy Day 1 yesterday. While the show attendance was clearly impacted by Irene, it sure feels like there are 15,000+ VMworld attendees here in sunny Vegas.
Improve Clinician Productivity and Secure Access to EMR Applications - Webinar
Improve Clinician Productivity and Secure Access to EMR Applications - Webinar
Are you interested in improving clinician productivity and securing access to NextGen EMR applications?
Welcome, Jim Whelan, VP of Imprivata’s North American Healthcare Group
Welcome, Jim Whelan, VP of Imprivata’s North American Healthcare Group
I’m excited to join Imprivata at a time where healthcare IT, patient data security and clinician workflow efficiencies are front and center in boardrooms and nurses' stations across the country’s healthcare institutions. With more than 500 hospitals on the customer roster, one million healthcare users and strategic relationships with all of the popular HIS vendors, Imprivata has built a strong foundation that was very attractive for me to join and bring my experiences. Imprivata’s healthcare pedigree enables us to focus on delivering practical innovations for solving real-world problems surrounding simplifying and securing user access in hospital environments.
Halloween Scary Security Stories – Healthcare Security Risks
Halloween Scary Security Stories – Healthcare Security Risks
This week, I took part in Network World’s annual real-life scary security stories podcast, a panel hosted by Keith Shaw that looks at some of the most frightful security incidents over the past year. This year, I focused on some of the data security incidents that are becoming all too common in the healthcare industry.
2009 Identity Management Mid-Year Report:  A brief look back and ahead
2009 Identity Management Mid-Year Report: A brief look back and ahead
Back in January, I shared some of my observations on 2009 Priorities for identity management in the new economic reality people are faced with - productivity, security and manageable IT projects. This year’s economics have forced people to do more with less, manage tighter budgets and maintain enterprise security while dealing with re-orgs and layoffs. While 2008 was the worst year to date for data breaches, 2009 hasn’t been much better if you look at this chronology of data breaches, including the recently disclosed incident at Goldman Sachs. The Identity Theft Resource Center keeps tabs as well, and has a nice snapshot of high-profile data breaches. Many of these are the result of unauthorized access, some combined with placing malicious code on servers or laptops to siphon off data. It’s amazing the methods that are being used to access systems, steal data, sometimes extort money and always damage reputations. Potential impact of the Goldman Sachs’s unauthorized upload of proprietary software is still under investigation, but information on how easy it was to pull off makes for scary reading. Given the potential impact of data breaches, there has been significant progress made to tighten access to systems, so let’s review some of the relevant things that are happening in identity management. Following are three areas, I believe, we need to watch for in the latter half of 2009...
Security in the Cloud
Security in the Cloud
While the concept of cloud computing (accessing applications online) has been around for close to a decade, talks on the subject have intensified significantly in recent months. The catalysts to these discussions range from the sharp decline in hardware and network infrastructure costs to the desire for a business to 'go green' to the need for accessibly by an increasingly distributed workforce. Whatever the reason, big business has taken notice and as this interest turns into action, these companies must be prepared to look at all of the key issues around this move before taking action.
Identifying Identity Resources
Identifying Identity Resources
There's a lot of news and opinions on the web as the blogosphere continues to grow. As a result, the web can be overwhelming on one hand and full of wonder on the other as you sort and click through the rabbit hole of conversations on the other side. In light of this, I thought I would provide a short list of great blogs and resources that I follow from the identity management circles that are worth checking out and engaging with:
The Unintended Consequences of Meaningful Use – A CIO’s Perspective
The Unintended Consequences of Meaningful Use – A CIO’s Perspective
Ed Ricks, the VP Information Services & CIO at Beaufort Memorial Hospital (an Imprivata customer), has started blogging for Computerworld on healthcare I