The HITECH Act, HIPAA, as well as mandates from State regulations (e.g. Massachusetts 201 CMR 17.00), are raising the minimal requirements that organizations such as healthcare-covered entities and business associates must implement to prevent unauthorized access. Further, the Connecticut Attorney General’s lawsuit against Health Net of Connecticut for failing to secure approximately 446,000 enrollees’ Protected Health Information (PHI), and to notify State authorities and enrollees of a security breach, is a reminder that breaches are not just a risk to information, but a risk to the organization.…
Back when this blog was in its infancy, we outlined a number of identity management resources that readers should check out. Those blogs are still on the “must-read” list, but there are a number of new ones that have popped up that people interested in identity and access management may find useful...…
The New York Times recently published an interesting article on the rising problem of medical identity theft. When the federal government last researched the issue in 2007, more than 250,000 Americans reported that they were victims of medical identity theft. Since that last report, most experts agree the problem has undoubtedly grown, in part because of the growing use of electronic medical records built without extensive safeguards. To exacerbate the situation, cleaning up after medical ID theft can be hindered by HIPPA compliance – the regulations protect the medical information of the ID thieves as well as you.…
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:…
Insider threat is among the biggest challenges security folks face in 2008. The perimeter is dissolving with increased reliance on distributed computing and the mobile workforce, making it more difficult than ever to put up definitive walls around the enterprise. It's a simple reality that we all have to deal with. Check out last month's 2008 Global Information Security Workforce Study conducted by Frost & Sullivan for ISC(2) and SearchSecurity.com's coverage. Two-factor authentication using biometrics as well as physical-logical convergence will gain speed in dealing with the insider threat.…
In reviewing the final rule and all the many blogs/articles about it I got to thinking about what it must be like for a hospital having to face planning how …
One of the key focuses in today’s ever changing world of healthcare is workflow improvement through time management optimization – a message that was highlig…
How to Successfully Improve your Clinical Communications: Empower your Crew
Margot Lieblich
|
Learn how to successfully implement a new clinical communications solution: Listen to your clinical crew and empower them to rally together effectively …
Did you know, on average, care providers log into Citrix workstations and applications 70 times a day, entering a username and password each time? That’s 45 minutes wasted per provider, per day!…
Opiate abuse claimed the lives of more than 1,000 Massachusetts residents last year, yet Massachusetts, a historically progressive adopter of health information technology (HIT), has yet to adopt Electronic Prescribing of Controlled Substances (EPCS), a critical part of the process for solving the prescription drug abuse crisis.…
CIO of the year Craig Richardville talks interoperability, cyber security, and patient identity
John Hallock
|
During HIMSS 2016, I had the opportunity to talk to one of the true leaders in healthcare technology, Craig Richardville, Carolinas HealthCare Systems’ Senio…