07-11-13 | Blog Post

Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption

Blog Posts

Join Zoe Lindsey, Regional Director of Duo Security and April Sage, Director Healthcare Vertical of Online Tech for an informative webinar on how to secure access to confidential health information in a cost effective and scalable way without interrupting your users’ workflow.

TitleAchieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption
When: Tuesday, July 23 @2PM ET
Description: Passwords are flawed; they are shared among users, easy to guess, and increasingly easy to breach. Two-factor authentication (using two different types of authentication), provides a higher level of security and assurance. Two-factor authentication is now offered by the Department of Health & Human Services/Centers for Medicare & Medicaid Services (CMS) as guidance for remotely accessing electronic protected health information (ePHI) for entities that must adhere to the HIPAA security regulations.

The vulnerability of static passwords has led to a wide range of regulatory provisions mandating the use of two-factor authentication to secure remote access to sensitive or private information, such as PHI, NIST, PCI and more.

Historically, costs and scalability issues have limited the use of two factor authentication to very small implementations for users with the most privileged access. Workplace trends and new technology are changing that.

Also, don’t miss our upcoming webinar on Tuesday, July 16 – Why Is It So Hard to Secure a Company? with Adam Goslin, COO of High Bit Security as he discusses the latest information on cyber-theft, and the very real security challenges all businesses face.

HIPAA Compliant Hosting White PaperFor a complete guide to HIPAA technicaladministrative and physical security, read our HIPAA Compliant Hosting white paper. This white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a HIPAA compliant data center IT architecture, contractual requirements, benefits and risks of data center outsourcing, and HIPAA hosting vendor selection criteria.

Zoe Lindsey, Regional Director, Enterprise Sales at Duo Security

Zoe has worked in tech for years, and came to Duo with a background in cellular and medical technology. Ever since getting her first Commodore64 at age 10, her passion has drawn her back again and again to working with technology and information. Zoe works with her team to introduce Duo to as many new users as possible — she has assisted surgical centers, general hospitals, and specialty clinic to implement two-factor authentication solutions.

april-sageApril Sage, Director of Healthcare Vertical Online Tech

April Sage has been involved in the IT industry for over two decades, initially founding a technology vocational program. In 2000, April founded a bioinformatics company that supported biotech, pharma, and bioinformatic companies in the development of research portals, drug discovery search engines, and other software systems. Since then, April has been involved in the development and implementation of online business plans and integrated marketing strategies across insurance, legal, entertainment, and retail industries until her current position as Director, Healthcare Vertical of Online Tech.

Related Articles:

HIPAA Encryption: First Steps to Identifying and Securing Health Data
According to DetroitNews.com, personal information of 49,000 individuals – including that of names, SSNs, DOB, cancer screening test results and dates of completion – were accessed by hackers recently. The data resided in a password-protected area of the Michigan Cancer … Continue reading →

Offsite HIPAA Data Centers are Key to Health Organization Disaster Recovery
Offsite Data Centers are Key to Healthcare’s Disaster Recovery Catastrophes can happen at anytime and anywhere. Just ask the staff and patients at the Moore Medical Center in Moore, Oklahoma, when last month a deadly tornado struck the medical facility … Continue reading →

HIPAA Compliant Data Centers: Preventing Health Data Loss
According to HealthDataManagement.com, a laptop that may have operating room information on nearly 13,000 pediatric patients was stolen from a badge-controlled access area of the Lucile Packard Children’s Hospital at Stanford in early May. While the electronic systems were encrypted, … Continue reading →

Overwhelmed by cloud chaos?
We’re cloud experts, so you don’t have to be.

© 2024 OTAVA® All Rights Reserved