The search found 3762 results.
Blog
The Meaningful Use Analysis presented at the recent HIT Policy Committee Meeting indicates that 2,246 Eligible Professionals and 100 Hospitals have attested successfully. That’s a good start to EHR Adoption; with Stage 2 potentially delayed for these earlier adopters it will be interesting to see how many more attest to Meaningful Use in 2011.
News
Staying one step ahead of ever-evolving cybersecurity threats is an inescapable initiative for today’s digital businesses. Tech teams must be ready to respond to a range of scenarios—from ransomware and distributed denial of service attacks to social engineering and human error—to guard sensitive data, ensure reliable operations and maintain customers’ trust. Without robust, adaptable, companywide strategies, the risks to a business’s finances and reputation can be severe.
Whitepaper
This whitepaper features Imprivata customers who have successfully deployed Imprivata OneSign® Single Sign-On (SSO) and strong authentication at their hospitals to provide care providers with fast access to patient health information. These Healthcare IT professionals offer 20 valuable tips for successful procurement, implementation and deployment of SSO technology.
News
Managing risk and boosting resilience is an important initiative for organizations—particularly so for the finance, healthcare and logistics sectors. From cyberattacks to global market shifts, developing solid strategies to not only recover from disruption, but also to function smoothly in the midst of it requires careful review of all elements of an organization, including finances, tech stacks, team makeup, workplace culture and more.
Blog
After the recent 2008 HIMSS Conference, we conducted a survey of 171 healthcare IT decision makers to identify some of the trends they face relating to identity management. I wanted to call out a few interesting data points...
Blog
In our last blog posting, we discussed three priorities all organizations should focus on in 2009: security, productivity and manageable IdM projects. Today we're looking more closely at enterprise security.
Blog
Back in January, I shared some of my observations on 2009 Priorities for identity management in the new economic reality people are faced with - productivity, security and manageable IT projects. This year’s economics have forced people to do more with less, manage tighter budgets and maintain enterprise security while dealing with re-orgs and layoffs. While 2008 was the worst year to date for data breaches, 2009 hasn’t been much better if you look at this chronology of data breaches, including the recently disclosed incident at Goldman Sachs. The Identity Theft Resource Center keeps tabs as well, and has a nice snapshot of high-profile data breaches. Many of these are the result of unauthorized access, some combined with placing malicious code on servers or laptops to siphon off data. It’s amazing the methods that are being used to access systems, steal data, sometimes extort money and always damage reputations. Potential impact of the Goldman Sachs’s unauthorized upload of proprietary software is still under investigation, but information on how easy it was to pull off makes for scary reading. Given the potential impact of data breaches, there has been significant progress made to tighten access to systems, so let’s review some of the relevant things that are happening in identity management. Following are three areas, I believe, we need to watch for in the latter half of 2009...
Blog
As we turn the page to 2010 and look to delve into the top–level security concerns that lie ahead, we’d be remiss not to reflect on those security events that helped shape 2009 into the ‘year of the data breach,’ and take these as learning experiences for the New Year.