Overcome risk to drive a successful healthcare IT strategy (Part II)
Joel Alcon
|
In Part I of this two-part blog, we highlighted key challenges facing a health system Chief Information Security Officer (CISO), including the ever-present n…
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
Rebecca Slisz
|
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.…
For decades, the healthcare industry has struggled with accurately linking a patient’s health data within and across health systems — an activity known as pa…
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
Joel Alcon
|
We know how time-consuming it can be to identify various types of clinical workflows within a healthcare organization and then deploy technology securely without creating disruptions for end users. How do you enable single sign-on (SSO) into the EHR for each clinician, even though some may be accessing via shared workstations or through virtual desktops?…
Enacted into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) includes five sections detailing data privacy and security provisio…
Getting authentication right – considerations for medical device security
Drivers such as HIPAA compliance, general PHI privacy, and concerns around unauthorized use have led to increased regulations for medical device security.…
What is access provisioning in Identity Access Management (IAM)?
Account provisioning in identity access management solutions simplify and reduce time to complete tasks. Learn why IAM is the best choice in this blog.…
Mass lawmakers embrace electronic prescribing of controlled substances
Massachusetts lawmakers recently passed legislation that requires providers and pharmacies to switch to electronic prescribing of opioid medication by 2020, …
Avoiding common security and compliance workarounds for medical devices
Security concerns continue to grow for healthcare organizations as systems integrate new technologies and as electronic patient health information (PHI) prol…
Regulatory recommendations and considerations for medical device security
With the rise in adoption of new technology in the healthcare industry, robust, network-connected medical devices are rapidly becoming critical tools used du…
This perception-and-reality disconnect isn’t due to naiveté or denial on the part of health information management (HIM) directors. The culprit is lack of standardization, whether that be variances in the formulas used to calculate the rate, algorithms for identifying duplicates or how duplicates are reported. As a result, establishing an accurate duplicate rate that would be accepted industry wide is a significant challenge for even the most diligent HIM manager.…