Blog Listing

A proposed solution to the challenges of patient matching, in response to the GAO report
A proposed solution to the challenges of patient matching, in response to the GAO report
Earlier this month, the GAO (Government Accountability Office) released a report long-anticipated
Overcome risk to drive a successful healthcare IT strategy (Part II)
Overcome risk to drive a successful healthcare IT strategy (Part II)
In Part I of this two-part blog, we highlighted key challenges facing a health system Chief Information Security Officer (CISO), including the ever-present n
Overcome risk to drive a successful healthcare IT strategy (Part I)
Overcome risk to drive a successful healthcare IT strategy (Part I)
If you’re a health system Chief Information Security Officer (CISO), you have one over-arching element you deal with all the time: operational risk.
Are You EPCS Ready? The National Compliance Deadline is Less than Two Years Away
Are You EPCS Ready? The National Compliance Deadline is Less than Two Years Away
On October 24, 2018, President Trump signed into law the “
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
The top five takeaways from the 2018 Gartner Identity and Access Management Summit
There are three main components of an identity and access management (IAM) strategy: identity governance and administration, access management (including privileged access management), and adaptive multifactor authentication.
10 questions to ask privileged access management vendors
10 questions to ask privileged access management vendors
If a hacker gets access to your privileged accounts they can move around your network, applications and equipment.
The do's and don'ts of using active directory in your organization
The do's and don'ts of using active directory in your organization
Active Directory (AD) is so ubiquitous on Windows networks that many organizations have not invested time optimizing the tool.
The importance and impact of patient matching
The importance and impact of patient matching
For decades, the healthcare industry has struggled with accurately linking a patient’s health data within and across health systems — an activity known as pa
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
‘Reference Architecture’ guide helps customers implement Imprivata OneSign Single Sign-On with Epic systems
We know how time-consuming it can be to identify various types of clinical workflows within a healthcare organization and then deploy technology securely without creating disruptions for end users. How do you enable single sign-on (SSO) into the EHR for each clinician, even though some may be accessing via shared workstations or through virtual desktops?
Imprivata for Community Connect offers a cost-saving and secure solution for Great Plains Health
Imprivata for Community Connect offers a cost-saving and secure solution for Great Plains Health
To help streamline workflows for healthcare organizations who use Epic Community Connect, Imprivata developed
10 most common HIPAA violations and solutions
10 most common HIPAA violations and solutions
Enacted into law in 1996, the Health Insurance Portability and Accountability Act (HIPAA) includes five sections detailing data privacy and security provisio
The Broad Impact of Unique Patient Identifiers
The Broad Impact of Unique Patient Identifiers
Originally published by Just Associates
How to improve patient care starting at registration
How to improve patient care starting at registration
Wait times across all types of healthcare settings averaged nearly 19 minutes in 2017, according to a Vitals2 study.
Getting authentication right – considerations for medical device security
Getting authentication right – considerations for medical device security
Drivers such as HIPAA compliance, general PHI privacy, and concerns around unauthorized use have led to increased regulations for medical device security.
What is access provisioning in Identity Access Management (IAM)?
What is access provisioning in Identity Access Management (IAM)?
Account provisioning in identity access management solutions simplify and reduce time to complete tasks. Learn why IAM is the best choice in this blog.
Why an identity governance program is important in healthcare
Why an identity governance program is important in healthcare
Controlling and securing access to protected health information (PHI) is one of the mos
Mass lawmakers embrace electronic prescribing of controlled substances
Mass lawmakers embrace electronic prescribing of controlled substances
Massachusetts lawmakers recently passed legislation that requires providers and pharmacies to switch to electronic prescribing of opioid medication by 2020,
Avoiding common security and compliance workarounds for medical devices
Avoiding common security and compliance workarounds for medical devices
Security concerns continue to grow for healthcare organizations as systems integrate new technologies and as electronic patient health information (PHI) prol
Regulatory recommendations and considerations for medical device security
Regulatory recommendations and considerations for medical device security
With the rise in adoption of new technology in the healthcare industry, robust, network-connected medical devices are rapidly becoming critical tools used du
The Duplicate Disconnect
The Duplicate Disconnect
This perception-and-reality disconnect isn’t due to naiveté or denial on the part of health information management (HIM) directors. The culprit is lack of standardization, whether that be variances in the formulas used to calculate the rate, algorithms for identifying duplicates or how duplicates are reported. As a result, establishing an accurate duplicate rate that would be accepted industry wide is a significant challenge for even the most diligent HIM manager.