Imprivata HealthCon 2014: Q&A with Aivars Apsite, Technology Strategist with Metro Health
Registration for Imprivata HealthCon 2014 (May 4-6 in Boston) is now open, and the event will feature more than 30 in-depth educational sessions covering a wide range of business, product and technology issues. …
Make a well-informed decision about which two-factor authentication modalities to introduce to your EPCS process: keep prescriber satisfaction in mind …
As HIMSS15 gets closer, Imprivata continues to preview the presentations that will take place in our booth (#3848). Customers will share their success stories, lessons learned, and best practices using Imprivata solutions.…
Outdated communication technologies such as paging, fax, email, and phone calls delay the delivery of patient care, impact provider productivity, and reduce patient satisfaction. To solve these problems, Saint Mary’s Hospital in CT took a strategic approach to enable better communication, ease clinical workflows, and improve patient care. …
How Saint Joseph Health System is making checking in more secure and accurate with biometric identification
Justyna Evlogiadis
|
Checking in to a hospital can be a long and tedious process, but palm vein biometric identification technology can make registration simple, saving not only …
Does biometric identification have a role in population health?
The Medicare Access and CHIP Reauthorization Act of 2015 (MACRA)’s attempt to move the Medicare program away from payments based on volume of services delive…
Advancing interoperability in today’s healthcare ecosystem
At HIMSS18, Imprivata’s Chief Medical Officer, Doctor Sean Kelly, sat down with CommonWell TV to discuss the way in which Imprivata helps healthcare organiza…
At this year’s annual HIMSS conference, held last month in Orlando, Florida, we joined more than 45,000 professionals from across the globe to showcase innov…
What a Difference a Year Makes: Onsite at VMworld 2011
Ed Gaudet
|
VMworld was markedly different from a healthcare IT point of view this year. I wrote a guest blog for HealthITExchange summarizing a few of my thoughts which you can find here. Were you at VMworld this year? What was your impression?…
Recent survey results released show only 50.7% of U.S. hospitals with implemented electronic medical records (EMRs). While transitioning to a paperless system seems to be a logical evolution in the health care system, the rather slow rate of EMR adoption does not surprise me. Even with the passage of the Health Information Technology for Economic and Clinical Health Act (HITECH) in February 2009 which attached a monetary incentive to implementation, technologies that do not seamlessly fit into clinicians’ day-to-day activities, improve patient care, and enable them to work more efficiently fail to achieve widespread acceptance. In order to improve EMR adoption rates in the U.S., we must provide doctors with tools that do not disrupt time spent with the patients, while enhancing their ability to access vital information quickly and efficiently.…
The National Institute of Standards and Technology (NIST) published its Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule back in late 2008, but spurred by a jolt of healthcare IT investment driven by HITECH mandates has renewed relevance today. From a user access perspective, there are important technical safeguards outlined in the area of Access Control, Audit Control, Integrity, and Person or Entity Authentication that are worth calling out. Specific Key Activities within these technical safeguards criteria you should review include...…
Imprivata’s Geoff Hogan authored an article for Security Technology Executive last month titled, “Passwords in Peril” that delves into the password management conundrum that organizations face with the growing number of applications that employees use daily. While the article summarizes succinctly the helpdesk costs issue, employee productivity and the data security vulnerabilities that a runaway password management problem causes, it also highlights effective single sign-on (SSO) strategies and tactics to overcome these challenges.
I wanted to take this opportunity to pull out a couple of SSO and Password Management best practices that Geoff covered, while adding a couple more...…
Another insider unauthorized access incident came across my radar just as I put the finishing touches on my most recent blog post highlighting Lesmany Nunez’s case being the latest example of a disgruntled employee breaching a network. As of today, the most current remote access security breach involves Danielle Duann, an IT director of a nonprofit organ and tissue donation center.…