Privacy & Security
Security
The companies are combining Imprivata's Mobile Device Access technology with the Vocera Collaboration Suite, which can offer faster and more authentication across workstations, virtual desktops and mobile devices.
Privacy & Security
Data accessed during the breach may have included patient and health plan member names as well as dates of birth, Social Security numbers and some clinical information.
Leaders know that the IT department alone cannot secure an organisation, and that the easiest path to breach the best technical defenses is through their people, writes Rod Piechowski, VP of thought advisory for HIMSS.
Human error is the primary cause of breaches reported to the Information Commissioner’s Office this year.
William Morris and two other experts show provider organization CIOs and CISOs what to look for during cloud deployments.
90% of healthcare organizations plan to use multiple cloud vendors over the next few years. Here’s what they need to know.
For a few hundred dollars, any hacker can buy their way into a healthcare network.
Security
The complexities of securing a hybrid cloud environment are not to be underestimated as more health systems contend with vendor implementations of all shapes and sizes. One prominent CISO offers tips and best practices.
Privacy & Security
The IoT: "Every something that comes on the market is in essence its own small computer with an ability to find its way into something."
Privacy & Security
Hospitals often don't file for the funds because they're unaware of what can be reimbursed and there is only a 30-day window to apply.