The search found 4057 results.
Implementing biometric patient identification can significantly enhance patient experiences and boost your bottom line. For healthcare organizations, positive patient experiences are crucial for success and profitability because it only takes one bad experience for a patient to seek another physician. On a larger scale, it only takes one negative news story to tarnish an organization’s reputation, causing widespread damage to community trust and patient retention.
A new peer-reviewed study details how an enterprise-owned shared device program was successfully implemented with Imprivata mobile solutions. The findings indicate the steps organizations should follow to create a clinical mobility program that enhances patient care and streamlines clinical workflows.
Included in the challenges associated with securing an ever-expanding OT attack surface is the role played by the increasing use of mobile devices – at both the enterprise and individual level. In fact, according to a recent report from Imprivata, only 46 percent of manufacturing organizations have the ability to maintain control over who has access to such devices and when, and 61 percent are using shared pin numbers to secure these devices.
It became clear across the healthcare cybersecurity landscape this week that the specter of a potential double-extortion attack by RansomHub is looming over Change Healthcare, following the February cyberattack by ALPHV.Further, a whirlwind of news on LockBit starts a complicated tale of international espionage and potential new threats to healthcare organizations from this group. We spoke to several cybersecurity leaders this week for healthcare's takeaways.
On April 12, Kaiser Permanente submitted notification of a breach to the US Department of Health and Human Services (HHS) Office for Civil Rights (OCR).“Kaiser Permanente has determined that certain online technologies, previously installed on its websites and mobile applications, may have transmitted personal information to third-party vendors Google, Microsoft Bing, and X (Twitter) when members and patients accessed its websites or mobile applications,” the health care giant shared in an emailed statement.
If you were struggling to swim in treacherous waters with a lifeguard standing nearby, you would expect them to dive in and save you…but what if they didn’t? The results could be disastrous or end up costing your life.
In today's healthcare landscape, organizations face resource constraints, budget challenges, and the rising threat of cyberattacks – and together, these issues have a negative synergy that makes them even more worrying.For example, 74% of cybersecurity workforce leaders feel that staffing shortages put their organizations at a moderate to extreme risk of cyberattack.
It’s no secret that electronic health record (EHR) systems are costly investments. They’re worth it, of course, because they centralize delivery of care. But they can also impede processes and create friction if clinical workflows are clunky and frustrating. This can lead to challenges for clinicians relying on the EHR and IT teams managing these systems.