Considerations for healthcare during National Cybersecurity Awareness Month
by Wes Wright and Al Colon
|
In recognition of National Cybersecurity Awareness Month, we’ve reached out to our resident cybersecurity experts, Imprivata CTO, Wes Wright, and Imprivata Director of Information Security and Corporate Compliance, Al Colon, to ask them about some of the burning cybersecurity issues in healthcare.…
Is Your Agency in Compliance with the FBI CJIS Advanced Authentication Security Policy?
Nicole Bates
|
Many agencies that I’ve spoken to are not aware of the Advanced Authentication requirements of the FBI CJIS Security Policy 5.6.2.2 and are therefore not aware that they may be in breach of this requirement. This video will quickly enable you to find out whether you may be in breach and how Imprivata can put you back in compliance.…
Last month, Kristi Roose from Mahaska Health Partnership joined me for a live webinar that discussed deploying SSO and Strong Authentication, and the steps you can take to get to Meaningful Use faster. If you missed the webinar, you won't want to miss this -- we've gone ahead and transcribed our answers from the Q&A session.
Question 1: How long did it take to roll a unit out to all the departments and how long did it take to see acceptance to the change?
Answer: We approached these rollouts one unit at a time, and the time frame depended on the number of users. Usually it took about 1-2 weeks per unit to make sure that everyone was comfortable with the product. Once the unit was rolled out acceptance was immediate; customers were grateful for the product and relieved to be able to access data more easily. It was a relief for their workflow. …
A couple of weeks ago I moderated a Healthcare IT News webinar session that examined how hospitals today make patient data easily and securely accessible throughout the clinical workflow. I was joined by Dr. Zafar Chaudry, CIO of Liverpool Women’s NHS Foundation Trust & Alder Hey Children’s NHS Foundation trust and Dr. Lawrence Losey, Pediatrician, Chief of Pediatrics and Chief Medical Information Officer (CMIO) for Parkview Adventist Medical Center. The session addressed the clinical workflow, process and technology behind providing fast, secure access to patient data, touching on all the areas within a hospital where a workstation sits and from anywhere a clinician may need access.…
The HIMSS Virtual Conference occurred this week, covering myriad of topics ranging from Electronic Health Records (EHRs), impact of the HITECH Act, workflow optimization as well as privacy and security in the cloud for healthcare systems.
One presentation that readers of this blog may find useful was that from Box Butte General Hospital on Nov. 4 at 9:00am CT (you can register on the site for access; HIMSS members can already access it online). Here’s a brief synopsis from the session description highlighting what was covered in the presentation...…
Late last year, California enacted a new state law to help notify patients of potential breaches of their personally identifiable health information, requiring healthcare organizations to report suspected incidents of data breaches. The initial results are in, and it’s not pretty. According to the Journal of the American Health Information Management Association, California officials have received more than 800 reports of potential health data breaches in the first five months since the laws went into effect on January 1st. Of the 122 cases that have been investigated, 116 have been confirmed assecurity breaches. Officials expect the numbers to grow as more organizations put in the processes to report potential breaches.…
This week I was part of Network World's second annual real-life scary security stories podcast, a panel hosted by Keith Shaw that told the tales of some frightful security happenings over the past year. There were some amazing examples of breaches of data, corporate espionage and simple access and authentication mis-steps, of which I added a few anecdotes from actual conversations I've had over the past year. [to protect the innocent, actual names were not used]…
I've had a few conversations lately tied around the topic of the insider threat in the financial services arena, so I figured I'd scan around the Web to see what's out there and came across an interesting InfoWorld article. Though it is from last Fall, it hits on a number of concerns that are timely now, especially given the major breaches like Societe Generale. The article reports on a Deloitte study that highlights two major data points that I want to call out:…
I took a brief excursion last week to Madison, Wisconsin with a couple of colleagues to update the folks at Epic about hospitals that use systems from both E…
As we discussed in our last post about secure electronic prescribing of controlled substances (EPCS), the Drug Enforcement Agency (DEA) passed a ruling in 2010 allowing controlled substances to be prescribed electronically—if specific criteria are met by all parties participating in e-Prescribing. These criteria include: …
Desktop virtualization is changing the way care providers work at North Bend Medical Center (NBMC) in Southern Oregon. Doug McCleod, CTO and Joshua Rabe, Systems Architect at NBMC recently discussed the impact of desktop virtualization on IT efficiency, provider productivity, and patient care. They are successfully completing their Virtual Desktop Infrastructure (VDI) project on time and on budget.…
Technology is the great separator in the opioid addiction crisis
Dr. Sean Kelly
|
In his New York Times op-ed, “How Doctors Helped Drive the Addiction Crisis, (Nov. 7, 2015),” Richard Friedman called for a sea-change within the medical profession to combat the growing addiction crisis in our country, calling for improved training and education for physicians.…
2 patient identification metrics that put patients at risk
Even hospitals that follow strict rules and protocols run the risk of patient identification errors, the Healthcare Financial Management Association found in…