The search found 3760 results.
Blog
Healthcare organizations are under constant attack from cyber threats. In the past two years, 90 percent of organizations experienced data breaches, with more than 100 million patient records impacted. Many of these attacks—up to 63 percent—were the result of weak or stolen credentials.
Blog
There are many benefits to electronic prescribing of controlled substances (EPCS), including improving efficiency of clinical workflows, decreasing patient wait times at pharmacies and minimizing the potential for medication errors, inaccuracies or forgeries. However, because these medications are heavily regulated due to the risk of diversion and abuse, the DEA rule mandates that several criteria be met for EPCS.
Blog
Cyber insurance is now a cornerstone of organizational risk management, but skyrocketing premiums, complex procurement, and hidden coverage gaps pose serious hurdles. Discover how to overcome these challenges and lower your costs with stronger cybersecurity strategies.
Blog
Improve your ROI on mobile investments by understanding three of the most common factors to cause a decrease in returns: inventory shrinkage, workflow friction, and disjointed technology.
Blog
Balancing security and usability doesn’t need to be a daunting challenge. These strategies can help you strike the right balance.
Blog
In recent years, a number of secure text messaging applications have come to market to help healthcare organizations strike a balance between the clinical demand for more efficient communication technologies and the IT requirement to comply with HIPAA and information security regulations.
Blog
A focus of the Gartner Identity & Access Management Summit this week is identity governance and administration (IGA) as a foundational component to a successful identity and access management (IAM) initiative.
Blog
There’s one question every organization needs to be able to answer: What are the company’s specific critical access points? It’s easier asked than answered, and depending on the system, the users, the assets, and a few other factors, critical access varies by organization and use case.