The search found 3761 results.
News
Thieves use stolen personal data to get treatment, drugs, and medical equipment. An estimated 2.3 million adults were affected by medical identity theft last year. Some hospitals are turning to new technology such as biometric screening to confirm patient identities.
News
CHICAGO – Implementing secure messaging options can have far-reaching and long-lasting benefits for healthcare facilities. Whether an organization wants to account for employees already sending text messages, or is looking to implement a new system entirely, there are a few things that they should keep in mind, according to Greg Slattery, CIO of Community Hospitals and Wellness Centers.
Infographic
Learn how Imprivata FairWarning for Cloud Solutions for Salesforce translates Shield Event Monitoring log files into user-friendly, leverageable insights that transform your Salesforce data security, compliance, and governance.
Blog
Learn how leading New York hospitals are critically thinking about, and planning for, I-STOP's mandatory introduction of EPCS processes.
Blog
Every second counts on the manufacturing floor, and broken access can break everything. Here’s how manufacturers can restore security and speed with safe, fast digital access management.It’s 5:59 AM. The early shift is clocking in at a U.S.-based consumer goods manufacturing plant. Dana, a floor supervisor, is already juggling two problems: a bottleneck at Line 3 caused by an unauthorized system setting change, and a growing backlog of workers unable to complete compliance training on shared tablets.
Blog
Marietta, GA, shows that CJIS compliance can be more than a checkbox. Learn how the city improved usability and efficiency through smarter, compliant access management.Achieving compliance with the FBI’s Criminal Justice Information Services (CJIS) Security Policy 6.0 is a major milestone. But for many agencies, the bigger question comes next: how do you sustain compliance while making access easier for your people?
Blog
Privileged Access Management or PAM solutions are a relatively new breed of tools that allow you to manage credentials with advanced permissions. It’s vital to properly monitor and secure these accounts because they grant access to critical network systems and applications.
Blog
Determining how much remote access will cost an enterprise is not a simple cut and dry calculation. The reason: different remote access providers may provide a variety of options or deployment models which provide different levels of value to their client companies.