The search found 4252 results.
We all understand the critical importance of secure messaging within healthcare settings. Indeed, secure messaging has become integral to streamlining care coordination between care teams as well as with other hospital staff.
Less clear, however, are the conditions for its use. All too often, we’re asked the question: just what, exactly, are the conditions for use of secure messaging within healthcare settings?
Introducing Electronic Prescribing of Controlled Substances (EPCS) is a great way to meet the challenging Stage 2 requirements for Meaningful Use.
Professional Services are not something that should only be considered during the initial implementation of Imprivata OneSign. As our customer base has grown through the years, we’ve seen their personnel come and go, departments change, infrastructure develop and new technology appear. What doesn’t change is the need to provide simple secure access even though regulations get more rigorous and security threats become greater.
The New York Times recently published an interesting article on the rising problem of medical identity theft. When the federal government last researched the issue in 2007, more than 250,000 Americans reported that they were victims of medical identity theft. Since that last report, most experts agree the problem has undoubtedly grown, in part because of the growing use of electronic medical records built without extensive safeguards. To exacerbate the situation, cleaning up after medical ID theft can be hindered by HIPPA compliance – the regulations protect the medical information of the ID thieves as well as you.
If the U.S. healthcare industry is ever going to be able to deliver higher-quality care at affordable costs, technology adoption at a national scale is essential. There can be no half measures, and no facet of the healthcare industry can be excluded. If this transition does not occur and we remain a paper-based industry, we risk fatally wounding the U.S. economy.
It was with an element of nostalgia that I read the post 7 ways to secure physician text messages. Why Nostalgia I hear you ask? Well I’ll tell you. From 1995 until 2001 I worked in the Anti-virus industry. It was very different in those days. Viruses were written in bedrooms by kids, not by organized crime groups, No-one had anti-virus on their home computers and the AV updates were sent out monthly or quarterly on floppy disks.
Insider threat is among the biggest challenges security folks face in 2008. The perimeter is dissolving with increased reliance on distributed computing and the mobile workforce, making it more difficult than ever to put up definitive walls around the enterprise. It's a simple reality that we all have to deal with. Check out last month's 2008 Global Information Security Workforce Study conducted by Frost & Sullivan for ISC(2) and SearchSecurity.com's coverage. Two-factor authentication using biometrics as well as physical-logical convergence will gain speed in dealing with the insider threat.
Strong authentication can come in a variety of forms, each with it's own unique strengths and weaknesses. Before selecting a type of strong authentication, think about the following:
Back when this blog was in its infancy, we outlined a number of identity management resources that readers should check out. Those blogs are still on the “must-read” list, but there are a number of new ones that have popped up that people interested in identity and access management may find useful...