Pairing a single sign-on system with authentication technologies enables hospitals to provide easier access to electronic health records while ensuring only appropriate clinicians view patient information, the IT director of a rural Iowa hospital says.
Two final rules for the federal electronic health record incentive program require that participants conduct a risk analysis and use EHR software that has encryption and authentication capabilities.
Cybersecurity Coordinator Howard Schmidt unveils a White House blueprint to create an online environment where people and business can complete transactions in confidence.
The final version of regulations to carry out the HITECH Act must include far more details on privacy and security to ensure widespread adoption of electronic health records, says William R. Braithwaite, M.D., Ph.D.
Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
Completing security risk assessments for a long list of applications and providing information security training to its entire staff are two of the top priorities for 2010 at Johns Hopkins Medicine, one of the nation's largest academic medical centers.
In an interview, Stephanie Reel, vice president for information...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.