The search found 4286 results.
Cyber security strategy is a war zone: you need a battle plan. This whitepaper offers C-Suite cyber security proactive military, managerial, and technological strategies to combat the danger of passwords within their organization, and tools to understand and engineer the social behaviors of employees that hackers prey upon so successfully.
Electronic prescribing of controlled substances (EPCS) delivers a number of benefits. It helps address prescription drug abuse by reducing “doctor shopping” and minimizing the risk of altered, stolen or fraudulent prescriptions. But to realize these benefits, healthcare organizations must implement EPCS systems that meet DEA requirements. However, these requirements present a potential challenge to implementation and physician adoption.
This whitepaper identifies the root causes of patient identification errors and equips readers with an actionable checklist for choosing the right positive patient identification solution for their healthcare organization's specific needs.
In a recent webinar, Imprivata customer Joe Cruise from Group Health Centre in Ontario, Canada, and Sean Kelly from Imprivata, explain how to optimize an Epic environment with desktop virtualization, to satisfy clinicians and security requirements, and save valuable time for direct patient care.
Download the webinar, and you will learn about:
As healthcare transitions from a fee-for-service to a pay-for-performance model to improve patient engagement and outcomes, the future of care delivery for organizations centers on a network of IP-connected computers, sensors, and devices in which doctors, nurses, and patients can securely share information. This “Internet of Things” in healthcare has the potential to transform the healthcare industry by minimizing the need for direct patient-physician interaction and allowing providers to deliver more personalized treatments, using PHI from wearables in a secure and reliable manner.
Trust in depth is the most comprehensive way to establish data privacy in conjunction with your security posture. So what does trust in depth encompass? Read this whitepaper to learn more.