The search found 3760 results.
Blog
Passwords are outdated and unsecure. Learn how passwordless authentication works, why it’s safer, and how organizations can make the transition now.While passwords were once our only digital defense, today’s passwordless solutions are making the future more secure than ever, reshaping how we think about identity and access.In this post, we’ll dive into the current state of passwordless technology, explore how it works, and answer common questions, including:
Blog
Q&A with Michele Higgins, PharmD, MBA
Michele Higgins, PharmD, MBA, is the pharmacy informatics coordinator for Nebraska Methodist Health System in Omaha, Nebraska. Higgins’ experience, spanning over 20 years, includes implementing systems for automated dispensing cabinets, carousels, pharmacy information systems, bedside barcoding, and setting up a pharmacy department in a brand new facility with a new NICU population utilizing 100% CPOE. Her most recent project has been implementing electronic prescribing of controlled substances (EPCS) for providers across Nebraska Methodist Health System. Recently, Higgins spoke about her EPCS implementation experience and advice:
Blog
Privileged Access Management (PAM) consistently receives recognition as the most important and impactful cybersecurity consideration. This is due to the criticality of privileged credentials and the need to protect them.
Blog
Every 11 seconds, a company falls victim to a ransomware attack. Compromised protected personal data resulted in 1.8 HIPAA privacy violations per day in 2020. The cost of cyber attacks globally in 2021, according to Cybersecurity Ventures, is expected to cost $20 billion.
Blog
Despite large financial and time-intensive investments into access management tools and cybersecurity solutions, a business’ critical assets still remain vulnerable and prone to attack.
News
When the clock struck midnight on January 1st, it didn’t just usher in the fresh start of a new year. It also marked the first day of a landmark nationwide mandate for curbing the opioid epidemic: Beginning in 2023, healthcare organizations and providers must electronically prescribe all Schedule II, III, IV, and V controlled substances covered by Medicare Part D.
Blog
Data breaches that involve third parties, vendors, and contractors have continued to make headlines throughout the past 10 years. We continue to see headlines, see articles on social media, and we've all become numb to getting the letters in the mail about another data breach.
News
The use of digital identity and identity access management (IAM) technologies in hospital settings during the COVID-19 pandemic improved infection control, clinical care and facility operations, finds original research published in the BMJ Health Care Inform.
Blog
It's not a matter of if your company will be hacked - but when. Planning and ongoing preparation is the ultimate protection against cyber-attacks. Our guest blogger and cybersecurity expert, Marco Essomba, explores seven reasons companies get hacked.