The search found 4222 results.
We all understand the critical importance of secure messaging within healthcare settings. Indeed, secure messaging has become integral to streamlining care coordination between care teams as well as with other hospital staff.
Less clear, however, are the conditions for its use. All too often, we’re asked the question: just what, exactly, are the conditions for use of secure messaging within healthcare settings?
Introducing Electronic Prescribing of Controlled Substances (EPCS) is a great way to meet the challenging Stage 2 requirements for Meaningful Use.
Professional Services are not something that should only be considered during the initial implementation of Imprivata OneSign. As our customer base has grown through the years, we’ve seen their personnel come and go, departments change, infrastructure develop and new technology appear. What doesn’t change is the need to provide simple secure access even though regulations get more rigorous and security threats become greater.
If the U.S. healthcare industry is ever going to be able to deliver higher-quality care at affordable costs, technology adoption at a national scale is essential. There can be no half measures, and no facet of the healthcare industry can be excluded. If this transition does not occur and we remain a paper-based industry, we risk fatally wounding the U.S. economy.
It was with an element of nostalgia that I read the post 7 ways to secure physician text messages. Why Nostalgia I hear you ask? Well I’ll tell you. From 1995 until 2001 I worked in the Anti-virus industry. It was very different in those days. Viruses were written in bedrooms by kids, not by organized crime groups, No-one had anti-virus on their home computers and the AV updates were sent out monthly or quarterly on floppy disks.
Insider threat is among the biggest challenges security folks face in 2008. The perimeter is dissolving with increased reliance on distributed computing and the mobile workforce, making it more difficult than ever to put up definitive walls around the enterprise. It's a simple reality that we all have to deal with. Check out last month's 2008 Global Information Security Workforce Study conducted by Frost & Sullivan for ISC(2) and SearchSecurity.com's coverage. Two-factor authentication using biometrics as well as physical-logical convergence will gain speed in dealing with the insider threat.
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
On the eve of the HIMSS18 Conference & Exhibition (March 5-9 in Las Vegas), the U.S. Senate provided the biggest boost yet to the already surging momentum behind electronic prescribing for controlled substances (EPCS).
Despite continued efforts at the state and national level to address the issue, opioid addiction has raged on in 2015. Massachusetts is no exception. Just last week, the Boston Globe reported that there were 1,256 opioid-related deaths in the Bay State in 2014, which exceeded estimations from the state’s Department of Public Health released earlier their year.
Did you know that medical errors are the third leading cause of death in the United States? Or that an estimated 400,000 hospitalized patients each year experience some type of preventable harm?