Blog Listing

Guest Post: The New Need for Auditing: Privacy and Breach Notification Mandates
Guest Post: The New Need for Auditing: Privacy and Breach Notification Mandates
The HITECH Act, HIPAA, as well as mandates from State regulations (e.g. Massachusetts 201 CMR 17.00), are raising the minimal requirements that organizations such as healthcare-covered entities and business associates must implement to prevent unauthorized access. Further, the Connecticut Attorney General’s lawsuit against Health Net of Connecticut for failing to secure approximately 446,000 enrollees’ Protected Health Information (PHI), and to notify State authorities and enrollees of a security breach, is a reminder that breaches are not just a risk to information, but a risk to the organization.
Identifying Identity Resources, Part II
Identifying Identity Resources, Part II
Back when this blog was in its infancy, we outlined a number of identity management resources that readers should check out. Those blogs are still on the “must-read” list, but there are a number of new ones that have popped up that people interested in identity and access management may find useful...
Medical ID Theft and Tying Patients to Electronic Records with Strong Authentication
Medical ID Theft and Tying Patients to Electronic Records with Strong Authentication
The New York Times recently published an interesting article on the rising problem of medical identity theft. When the federal government last researched the issue in 2007, more than 250,000 Americans reported that they were victims of medical identity theft. Since that last report, most experts agree the problem has undoubtedly grown, in part because of the growing use of electronic medical records built without extensive safeguards. To exacerbate the situation, cleaning up after medical ID theft can be hindered by HIPPA compliance – the regulations protect the medical information of the ID thieves as well as you.
Tips and Tricks for selecting Strong Authentication
Tips and Tricks for selecting Strong Authentication
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Inside the Insider Threat
Inside the Insider Threat
Insider threat is among the biggest challenges security folks face in 2008. The perimeter is dissolving with increased reliance on distributed computing and the mobile workforce, making it more difficult than ever to put up definitive walls around the enterprise. It's a simple reality that we all have to deal with. Check out last month's 2008 Global Information Security Workforce Study conducted by Frost & Sullivan for ISC(2) and SearchSecurity.com's coverage. Two-factor authentication using biometrics as well as physical-logical convergence will gain speed in dealing with the insider threat.
Congratulations to Licking Memorial Hospital on achieving Stage 6 on the HIMSS EMR Adoption Model
Congratulations to Licking Memorial Hospital on achieving Stage 6 on the HIMSS EMR Adoption Model
Name: Sallie Arnett Title: VP Information Systems Facility: Licking Memorial Health Systems
Which Telecoms Store Your Data the Longest?
Which Telecoms Store Your Data the Longest?
You know that your text messages are stored by your cell phone provider, what you may not know is how much information and for how long.  Well we
5 Tips as you start your planning for Stage 2 Meaningful Use
5 Tips as you start your planning for Stage 2 Meaningful Use
In reviewing the final rule and all the many blogs/articles about it I got to thinking about what it must be like for a hospital having to face planning how
Allowing More Time for Patient Care
Allowing More Time for Patient Care
One of the key focuses in today’s ever changing world of healthcare is workflow improvement through time management optimization – a message that was highlig
Healthcare News Watch 3/11/13
Healthcare News Watch 3/11/13
Even after North America’s biggest health IT convention of the year, the industry news still does not take a break! 
 Calculating ROI for Roaming Virtual Desktops in an Epic Environment
Calculating ROI for Roaming Virtual Desktops in an Epic Environment
Metro Health is an integrated healthcare system with a regional 208-bed hospital, along with 25 clinics in Western Michigan.
HIMSS14: Where to Find Imprivata
HIMSS14: Where to Find Imprivata
The 2014 version of the HIMSS Annual Conference kicks off today and we are excited about having our largest presence at HIMSS to date!
How to Successfully Improve your Clinical Communications: Empower your Crew
How to Successfully Improve your Clinical Communications: Empower your Crew
Learn how to successfully implement a new clinical communications solution: Listen to your clinical crew and empower them to rally together effectively
Imprivata + Citrix XenDesktop and XenApp = Fast, Secure Access to Virtual Desktops
Imprivata + Citrix XenDesktop and XenApp = Fast, Secure Access to Virtual Desktops
Did you know, on average, care providers log into Citrix workstations and applications 70 times a day, entering a username and password each time? That’s 45 minutes wasted per provider, per day!
Massachusetts can combat opiate abuse by driving EPCS adoption
Massachusetts can combat opiate abuse by driving EPCS adoption
Opiate abuse claimed the lives of more than 1,000 Massachusetts residents last year, yet Massachusetts, a historically progressive adopter of health information technology (HIT), has yet to adopt Electronic Prescribing of Controlled Substances (EPCS), a critical part of the process for solving the prescription drug abuse crisis.
CIO of the year Craig Richardville talks interoperability, cyber security, and patient identity
CIO of the year Craig Richardville talks interoperability, cyber security, and patient identity
During HIMSS 2016, I had the opportunity to talk to one of the true leaders in healthcare technology, Craig Richardville, Carolinas HealthCare Systems’ Senio
ECRI study shines a spotlight on medical errors due to patient misidentification
ECRI study shines a spotlight on medical errors due to patient misidentification
Mistakes can happen. But, in healthcare, how often do medical errors related to patient misidentification occur and at what cost?
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
Imprivata leading the way in the IAM category in the KLAS Cybersecurity 2017 report
With 90% of healthcare organizations breached in the past two years,1 it’s no wonder that cybersecurity has become a front-and-center priority of
Product Management and The Importance of Understanding the Customer
Product Management and The Importance of Understanding the Customer
Imprivata SVP of Product Management Barbara Dumery joined the
When compliance dashboards and annual audits are not enough
When compliance dashboards and annual audits are not enough
Originally posted: October, 2017