Blog Listing

Considerations for healthcare during National Cybersecurity Awareness Month
Considerations for healthcare during National Cybersecurity Awareness Month
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.
Is Your Agency in Compliance with the FBI CJIS Advanced Authentication Security Policy?
Is Your Agency in Compliance with the FBI CJIS Advanced Authentication Security Policy?
Many agencies that I’ve spoken to are not aware of the Advanced Authentication requirements of the FBI CJIS Security Policy 5.6.2.2 and are therefore not aware that they may be in breach of this requirement. This video will quickly enable you to find out whether you may be in breach and how Imprivata can put you back in compliance.
Mahaska Webinar - Q&A
Mahaska Webinar - Q&A
Last month, Kristi Roose from Mahaska Health Partnership joined me for a live webinar that discussed deploying SSO and Strong Authentication, and the steps you can take to get to Meaningful Use faster. If you missed the webinar, you won't want to miss this -- we've gone ahead and transcribed our answers from the Q&A session. Question 1: How long did it take to roll a unit out to all the departments and how long did it take to see acceptance to the change? Answer: We approached these rollouts one unit at a time, and the time frame depended on the number of users. Usually it took about 1-2 weeks per unit to make sure that everyone was comfortable with the product. Once the unit was rolled out acceptance was immediate; customers were grateful for the product and relieved to be able to access data more easily. It was a relief for their workflow.
Fast Access for Clinicians and Secure Patient Data for IT: Can You Have Both?
Fast Access for Clinicians and Secure Patient Data for IT: Can You Have Both?
A couple of weeks ago I moderated a Healthcare IT News webinar session that examined how hospitals today make patient data easily and securely accessible throughout the clinical workflow. I was joined by Dr. Zafar Chaudry, CIO of Liverpool Women’s NHS Foundation Trust & Alder Hey Children’s NHS Foundation trust and Dr. Lawrence Losey, Pediatrician, Chief of Pediatrics and Chief Medical Information Officer (CMIO) for Parkview Adventist Medical Center. The session addressed the clinical workflow, process and technology behind providing fast, secure access to patient data, touching on all the areas within a hospital where a workstation sits and from anywhere a clinician may need access.
HIMSS Virtual Conference Box Butte General Hospital -- VDA, Productivity and the User Experience
HIMSS Virtual Conference Box Butte General Hospital -- VDA, Productivity and the User Experience
The HIMSS Virtual Conference occurred this week, covering myriad of topics ranging from Electronic Health Records (EHRs), impact of the HITECH Act, workflow optimization as well as privacy and security in the cloud for healthcare systems. One presentation that readers of this blog may find useful was that from Box Butte General Hospital on Nov. 4 at 9:00am CT (you can register on the site for access; HIMSS members can already access it online). Here’s a brief synopsis from the session description highlighting what was covered in the presentation...
California Medical Data Breach Report Highlights Healthcare Access Management Concerns
California Medical Data Breach Report Highlights Healthcare Access Management Concerns
Late last year, California enacted a new state law to help notify patients of potential breaches of their personally identifiable health information, requiring healthcare organizations to report suspected incidents of data breaches. The initial results are in, and it’s not pretty. According to the Journal of the American Health Information Management Association, California officials have received more than 800 reports of potential health data breaches in the first five months since the laws went into effect on January 1st. Of the 122 cases that have been investigated, 116 have been confirmed assecurity breaches. Officials expect the numbers to grow as more organizations put in the processes to report potential breaches.
Halloween Scary Security Stories 2008
Halloween Scary Security Stories 2008
This week I was part of Network World's second annual real-life scary security stories podcast, a panel hosted by Keith Shaw that told the tales of some frightful security happenings over the past year. There were some amazing examples of breaches of data, corporate espionage and simple access and authentication mis-steps, of which I added a few anecdotes from actual conversations I've had over the past year. [to protect the innocent, actual names were not used]
Financial Services CIOs, Insider Threats and the Human Behavior
Financial Services CIOs, Insider Threats and the Human Behavior
I've had a few conversations lately tied around the topic of the insider threat in the financial services arena, so I figured I'd scan around the Web to see what's out there and came across an interesting InfoWorld article. Though it is from last Fall, it hits on a number of concerns that are timely now, especially given the major breaches like Societe Generale. The article reports on a Deloitte study that highlights two major data points that I want to call out:
Want to Improve Clinician Workflows and Physician Satisfaction? It’s All About the Clicks.
Want to Improve Clinician Workflows and Physician Satisfaction? It’s All About the Clicks.
Physicians and nurses are on the front lines caring for patients while at the same time living through unprecedented change in thei
Strengthening our Epic connection
Strengthening our Epic connection
I took a brief excursion last week to Madison, Wisconsin with a couple of colleagues to update the folks at Epic about hospitals that use systems from both E
Desktop virtualization in healthcare set to expand through 2013
Desktop virtualization in healthcare set to expand through 2013
Imprivata doesn’t virtualize desktops. But desktop virtualization is improving care provider access to patient information – and that is what we do.
Live from the HealthCon show floor: Recap from the first half of day 1!
Live from the HealthCon show floor: Recap from the first half of day 1!
This is an exciting day for Imprivata and a milestone for the company as we kick off our first ever user conference!
Imprivata Healthcare News Watch 2/25/13
Imprivata Healthcare News Watch 2/25/13
A lot of us are participating in Oscar’s related talk this afternoon.  Whether you’re happy for Ben Affleck’s stardo
KLAS Rankings: The Voice of the Customer
KLAS Rankings: The Voice of the Customer
Early this week, we announced that KLAS has onc
Common Overlooked Steps and Key Considerations to Enabling e-Prescribing of Controlled Substances
Common Overlooked Steps and Key Considerations to Enabling e-Prescribing of Controlled Substances
As we discussed in our last post about secure electronic prescribing of controlled substances (EPCS), the Drug Enforcement Agency (DEA) passed a ruling in 2010 allowing controlled substances to be prescribed electronically—if specific criteria are met by all parties participating in e-Prescribing. These criteria include:
How Leading New York Hospitals are Approaching I-STOP Compliance
How Leading New York Hospitals are Approaching I-STOP Compliance
Learn how leading New York hospitals are critically thinking about, and planning for, I-STOP's mandatory introduction of EPCS processes.
Virtual Desktop Infrastructure (VDI) Best Practices: Advice from North Bend Medical Center
Virtual Desktop Infrastructure (VDI) Best Practices: Advice from North Bend Medical Center
Desktop virtualization is changing the way care providers work at North Bend Medical Center (NBMC) in Southern Oregon. Doug McCleod, CTO and Joshua Rabe, Systems Architect at NBMC recently discussed the impact of desktop virtualization on IT efficiency, provider productivity, and patient care. They are successfully completing their Virtual Desktop Infrastructure (VDI) project on time and on budget.
Technology is the great separator in the opioid addiction crisis
Technology is the great separator in the opioid addiction crisis
In his New York Times op-ed, “How Doctors Helped Drive the Addiction Crisis, (Nov. 7, 2015),” Richard Friedman called for a sea-change within the medical profession to combat the growing addiction crisis in our country, calling for improved training and education for physicians.
2 patient identification metrics that put patients at risk
2 patient identification metrics that put patients at risk
Even hospitals that follow strict rules and protocols run the risk of patient identification errors, the Healthcare Financial Management Association found in
Let the clinicians be heard: Nuance Dragon’s Peter Mahoney talks voice powered secure messaging
Let the clinicians be heard: Nuance Dragon’s Peter Mahoney talks voice powered secure messaging
Earlier this month, we a