NHIT Week: Demonstrating the Importance of Health IT
Claire Reilly
|
Technology has the ability to transform the everyday hospital setting by cutting costs and time, improving patient safety, protecting patient data and ultimately saving lives. Imprivata believes in the power of health IT, and that is why NHIT Week is so important to us.…
Five questions you should be asking about cybersecurity
The threat of hackers stealing private information and holding it for ransom is real, and the healthcare industry has become a prime target – in fact, phishi…
Protecting medical devices to build cyber resilience
The digitization of healthcare has allowed healthcare organizations to utilize robust technology such as medical devices to help improve both patient care an…
Roaming quickly and securely at Cumberland Healthcare
Kim Johnson
|
I recently sat down with Jason Morse, Director of Information Technology at Cumberland Healthcare (Cumberland Memorial Hospital), a 25-bed facility in Cumber…
Connecticut the Fourth State to Mandate E-Prescribing to Combat Opioid Abuse
Dr. Sean Kelly
|
Connecticut lawmakers recently passed legislation that requires electronic prescribing of opioid medication, further validating the significant role technolo…
Five reasons single-password authentication should be banned
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.…
If you’re still authenticating remote users with a single password, it’s time to make a change. There’s just too much at stake. With that in mind, here are four things to keep in mind when considering a two-factor authentication policy for your organization - and one thing you should probably avoid.…
See how to streamline your security methods and ensure your gaming business doesn’t suffer a hacking incident. This article covers recent casino data breaches and reveals how to prevent cybercriminals from accessing sensitive, confidential data on your network.…