PatientEngagementHIT

Patient Engagement White Papers & Webcasts

EPCS: A Primer on the Identity Proofing and Logical Access Control Requirements

The DEA requires all practitioners who will be prescribing controlled substances electronically to undergo identity proofing, even if they have already been authorized to prescribe controlled substances using paper. This whitepaper outlines both... Download white paper

How Cambridge Health Alliance Protects Against Prescription Fraud and Improves Patient Satisfaction

This whitepaper provides best practices and technologies (including Imprivata Confirm ID and Hands Free Authentication) used at Cambridge Health Alliance (Cambridge, MA) to enable EPCS, drive adoption, and realize efficiency, patient safety,... Download white paper

What you need to know to implement Electronic Prescriptions for Controlled Substances

n 2010, the Federal Drug Enforcement Administration (DEA) published an interim final rule as to what vendors and healthcare organizations need to do to support Electronic Prescribing of Controlled Substances. Since that time many vendors have... Download white paper

Increase Patient Satisfaction and Practice Revenue with Texting

Texting is a great way to communicate with patients anytime without being intrusive. It’s easy. It’s inexpensive. Best of all, it’s what your patients want. But pudding is supposed to be full of proof, right? So we’ve... Download white paper

Gartner Competitive Landscape: Secure Web Gateways

The secure web gateway market is still transforming toward SaaS deployments as CASB and DNS services capabilities add new challenges to traditional providers. Technology strategic planners must pay attention to these new concepts to compete effectively... Download white paper

What Covered Entities Need to Know about OCR HIPAA Audit​s

OCR announced Phase 2 of its HIPAA audit program in 2016, which would focus on desk audits to review how healthcare organizations – and business associates – adhere to the HIPAA Privacy, Security, and Breach Notification Rules. Healthcare... View webcast

What Makes a Healthcare Consulting Firm Worth the Investment

When you’re tackling the healthcare industry’s biggest challenges, an experienced consulting firm can help your team succeed. But with so many options, how do you know which firm is the best for your organization? Read through our... Download white paper

Physician Advisor Programs: A Pillar of Thriving Provider Organizations

Today, hospitals face growing pressure from government and commercial payers to manage their utilization of services and provide justification for clinical decision-making in line with evidence-based practices.  Physician advisor programs... Download white paper

How to Implement NIST CSF: A 4-Step Journey to Cybersecurity Maturity

NIST CSF can help CISOs understand their organization’s capabilities across the cybersecurity lifecycle. The process is a journey that involves making improvements over time. Rsam recommends breaking down NIST CSF implementation into four... Download white paper

Ransomware Attacks Growing in the Healthcare Industry

Despite billions of dollars and operational continuity at risk, the healthcare industry is stymied by both a lack of answers and resources required to adequately defend itself. Per a May 2016 study from Ponemon Institute, nearly 90% of healthcare... Download white paper

4 Ways Healthcare Payers Can Improve Operational Excellence

Monitoring, measuring, and analyzing healthcare payer data can improve operations by increasing employee productivity and lowering costs. Read this whitepaper to learn how leading healthcare payers are using data to find efficiencies in claims... Download white paper

Getting Ahead With Telehealth: How to Launch and Maintain a Successful Platform

With recent surveys indicating more than three-quarters of all hospitals and health systems having some sort of telehealth program in pilot stages or in place, the time is right for administrators to take a closer look at the platform. How can... View webcast

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges

In this paper, we identify 10 threat vectors common to all healthcare organizations along with a number of suggestions on how to mitigate these security challenges. Download white paper

Security in Healthcare: Bolstering Connectivity and Protecting Patients

As connected services become more commonplace in healthcare, more opportunities exist for bad actors to exploit weaknesses in the industry’s security defenses. There is certainly evidence that attackers have focused their attention on healthcare.... Download white paper

Healthcare Security: The Simplest Way to Stay Ahead of Attacks

Healthcare has become criminals’ most lucrative target because medical records are worth 10 times that of credit cards, and the attack surface has rapidly expanded as numerous disruptive technologies are being adopted. Download this whitepaper... Download white paper

How Healthcare Benefits from Cloud-Delivered Security

Healthcare IT professionals are swimming upstream to overcome security challenges. Cloud-delivered solutions may represent a life preserver in their efforts to reduce risk, simplify management and control costs. In this paper, we take a look... Download white paper

The Complexities of the Secure DIY Cloud

Private and do-it-yourself clouds — or the DIY cloud — have the potential to add considerable value to the organizations adopting them, but they also present challenges from implementation and management perspectives — particularly... Download white paper

Completing your AWS Cloud: Securing your Amazon Web Services Environment

This white paper is intended to help you make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization’s situation and needs. Download white paper

Inside the 6 Principal Layers of the Cloud Security Stack

What’s really inside a fully integrated secure cloud infrastructure? It’s not a myriad of point security tools bolted on in a haphazard manner. A truly secure cloud is designed from the ground by security experts and engineers. Go... Download white paper

‘But I was compliant’ Investing in Top-Down Security to Build a Compliant Business

Businesses face mounting pressures to protect their data. Attacks are increasingly sophisticated and organized, and the stakes are higher. No longer is the typical hack focused on defacing a website; now, attackers are stealing and selling valuable... Download white paper

Continue to site...