fast-breaking news analysis about drug policy and illegal drugs

Your Enslavement in the Matrix
five star (video)

Prison for Profit
The Rise of the Prison Industrial Complex
Prison Profiteers (2013)


home   about

MAP scholar

propaganda news

canada uk

australia pot news

psychedelics news

tag cloud topics

concept dictionary

feeds   stats

user analysis

contact us   faq   chat

login register


news hawking!




A Drug War Carol

No Victim/No Crime -

Need facts? See:

this bot site is Hosted By DrugPolicyCentral! ... Please help us keep going!

This newsbot site, while automated (true!) has always depended on the generosity of volunteers and visitors to keep it up and running. If this site has helped you, and you can afford to help us, then we ask you to give generously. And to those who have been helping to keep us running, a heartfelt THANK YOU!       Donate online: click here and help us out!

US: The Unique Considerations for IAM in Healthcare

Found: Fri Oct 11 18:35:51 2019 PDT
Webpage: [translate]

topical analysis
prison was NOT mentioned
propaganda analysis

The Unique Considerations for IAM in Healthcare The Unique Considerations for IAM in Healthcare

* Webinars

* Whitepapers

* Top 100 Vendors

Cybersecurity The Unique Considerations for IAM in Healthcare

The Unique Considerations for IAM in Healthcare

Healthcare's transition to digital has created exceptional information security challenges for patient care organizations across the industry

Gus Malezis

September 17, 2019



Join Thousands of Fellow Followers

Login or register now to gain instant access to the rest of this premium content!

Tasked with managing an exploding volume of patient, provider, and employee data, hospitals and health systems are increasingly making IT security a top priority. This focus comes just in time, as the healthcare industry has emerged as a major target for cyber-attacks, accounting for 41 percent of all breaches last year (Beazley Breach Briefing -- 2019, March 21, 2019.) Clearly, the healthcare industry must take all necessary steps to enhance systems and data protection without impacting the users -- providers and healthcare workers across the board -- of the systems.

Many of these cybersecurity challenges derive from healthcare's initial transition to digital, during which we focused largely on implementing EHR systems, which were designed/built primarily to enable the management and support of the financial payer aspects of a healthcare delivery organization. Naturally the second audience for EHR systems were -- and are -- the providers and healthcare workers who are focused on the patient as their top priority. This new digital environment gave clinical users access to thick-client EHRs and other clinical applications on shared workstations, and -- given the contained systems -- organizations were able to employ relatively traditional network security controls to protect these systems, PHI, and other data.

Today's healthcare organizations, however, are changing rapidly, shifting quickly to value-based care and transforming into fully modern digital enterprises with elevated focus on provider satisfaction and engagement. The rapid changes within the care delivery ecosystem has sparked an explosion of everything. This includes more people: providers, patients, and users on the network; more devices: shared mobile devices, interconnected medical devices, and personal devices; more points of access: virtual desktops, mobile applications, and the cloud; and more locations: hospitals, ambulatory clinics, and home care.

The once well-defined perimeter around the hospital network is now a blur, eroded by the proliferation of an expanding number of connected devices, an increasingly decentralized workforce, and applications and systems that may now be in the cloud. CIOs and

CISOs must now secure the full enterprise -- and at a time when more and more users require access to information from anywhere, not just within the four walls of the hospital.

Gus Malezis, President and CEO, Imprivata

The challenges and ensuing benefits of this new ecosystem are familiar to other industries that have undertaken the digital transformation journey. Newly digital organizations must establish relationships of confidence and trust across a complex network of people, technology, and information. By focusing on a trusted digital identity, organizations can optimize processes and technologies to solve critical workflow, security, and compliance challenges.

But in healthcare, these challenges are truly unique.

For starters, we have more entities to consider than most other industries. The clinical staff is comprised of many different types of users, each with varying roles and access requirements which vary by environment, location, institution, and role. Furthermore, clinicians no longer represent the only set of users IT must worry about. In the modern healthcare enterprise, business, IT, and other administrative users -- as well as affiliates, contractors and vendors -- all require fast, efficient, compliant, and secure access to different applications and information.

Moreover, clinical workflows in healthcare are complicated by the industry's complex operational and regulatory ecosystem. Nurses are using shared workstations and increasingly shared mobile devices in their rounds. Physicians, on the other hand, are heavy users of mobile devices -- both their own personal devices and, at times, hospital-issued units. Providers -- with their various access devices -- need to access a myriad of clinical and business applications, all across various physical locations. These access requirements are compromised, meanwhile, by technology's regrettable tendency to introduce barriers to service and care, further impacting user experience and workflow efficiency -- all for the benefit of compliance, or security, or both.

These impacts on clinical user experience and workflow efficiency occur before we even address regulatory concerns. Healthcare is a heavily regulated industry, and the information that's shared is highly sensitive. This requires compliance with unique and specific regulatory requirements, from HIPAA to DEA requirements for electronic prescribing of controlled substances (EPCS).

And let's not forget that healthcare, because of the value of healthcare information and the services it provides, is constantly under attack. The cost of data breaches are amongst the highest of any industry, averaging $429 per medical record. (Cost of a Data Breach Report 2019, Ponemon Institute)

So, how do we overcome these challenges to give users simplified, and better yet transparent and secure access to the applications, devices, and information they need, anywhere and anytime they need it? This is where an architecture of trust is required, and this will depend largely on trusted digital identity in conjunction with access management (IAM).

As we build out this architecture of trust an important set of logical steps need to be considered.

First, IT teams need to understand the identity of the participants, of the users, and of the system. This can be accomplished with current existing systems, and more modern emerging systems offer further simplified identity validation processes. In many ways we do this now in the U.S. for EPCS -- and this is a process that works.

Next, the trusted users are offered the appropriate levels of access into the right systems.

Automation can offer improvements in performance. For example, with the right identity management technology in place, healthcare organizations can automate the process of identity proofing, provisioning access, and seeding access with the correct credentials. And this access can be quickly suspended or terminated, without expunging the historical data and logs, should they be required for some future review.

To further enhance security and achieve compliance, the next step is layering on multifactor authentication. Pick the combination of authentication methods that's right for your organization. The combination of two or more factors including a push token, fingerprint biometrics, or hands-free authentication, amongst others, delivers trust and improves security. However, don't neglect to invest in ease of use and tight integration -- key tenets of an effective and utilized system. A secure system that is ignored or bypassed offers no value. Make it easy and convenient to use and your users will thank you for years to come.

As an industry, healthcare has traditionally focused on revenue cycle, and in locking down everything within our networks. We call this security and compliance -- yet this has the unintended consequence of being a detriment of our providers -- some of the most skilled and passionate professionals in the world -- who are caring for our loved ones.

In the new digital world, it's time to revamp our architecture so as to support the workload of our providers, yet do so with ease of use, simplicity, and, ideally, an invisible infrastructure that is fast, efficient, scalable, secure, and compliant.

Gus Malezis, President and CEO, ImprivataSHOW CAPTIONHIDE CAPTION


UT Austin Announces Cybersecurity Leadership Program to Address Workforce Shortage


Oct. 10, 2019


Load More Content

Stay Connected

Healthcare Innovation delivers business-building content in print, online, via email and social media. Stay up to date by subscribing, or manage your subscription here. Put powerful Healthcare Innovation content to work for you. Subscribe Today!

* Topics * Summits

* Policy & Value-Based Care

* Pop Health

analysis of article text

prohibitionist hits:0 government drug warrior (prohibition_agency) hits:1 propaganda (drugwar_propaganda) hits:15 legalization hits:0 drug_reformer hits:0 reform_referenda hits:0 cannabis hits:0 stimulant hits:0 narcotic hits:0 hallucinogen hits:0
    prohibitionist     prohibition_agency     drugwar_propaganda     legalization     drug_reformer
    reform_referenda     cannabis     stimulant     narcotic     hallucinogen

incarceration/prison mentioned? NO - the issue of prison or incarceration was NOT mentioned in this article .

propaganda analysis

explicit prohibition propaganda (explicit_propaganda) hits:0 hated group (propaganda_theme1) hits:15 madness, violence, illness (propaganda_theme2) hits:0 survival of society (propaganda_theme3) hits:0 gateway, use is abuse (propaganda_theme4) hits:0 children (propaganda_theme5) hits:0 demonize, war, epidemic (propaganda_theme6) hits:0 total prohibition (propaganda_theme7) hits:0 dissent opposed (propaganda_theme8) hits:0
EXP - explicit prohibition propaganda (explicit_propaganda) GRP - hated group (propaganda_theme1) MAD - madness, violence, illness (propaganda_theme2)
SOC - survival of society (propaganda_theme3) USE - gateway, use is abuse (propaganda_theme4) KID - children (propaganda_theme5)
WAR - demonize, war, epidemic (propaganda_theme6) TOT - total prohibition (propaganda_theme7) DIS - dissent opposed (propaganda_theme8)

 drug of abuse implied / mentioned

drug related 80%
[news] [concept]

prohibition agency illegal drugs  
drugwar_propaganda : a drug war propaganda event, campaign release, slogan, or themepropaganda

drugwar propaganda 80%
[news] [concept]

propaganda theme1 Why Are Americans So Easy to Manipulate? (Bruce E Levine, 2012)
Classic Modern Drug Propaganda
Themes in Chemical Prohibition
Drug War Propaganda (kindle edition)
propaganda_theme1 : drug war propaganda theme: hated groupshated group

propaganda theme1 80%
[news] [concept]

"heavy users" "users" "user"15Hated Groups (propaganda theme 1)
America's Racist Drug laws
Labeling theory
Transfer (propaganda)
 drug of abuse

illegal drugs 80%
[news] [concept]

various illegal drugs  
 drug law 80%
[news] [concept]
"controlled substances"1History of United States drug pr...
prohibition_agency : various drug prohibition and propaganda agencies and police; tax-supported entities dependent on continuing prohibitiongovernment drug warrior

prohibition agency 70%
[news] [concept]

"DEA"1Drug Enforcement Administration
The Top Five Special Interest Groups Lobbying To Keep Marijuana Illegal
 various illegal drugs 80%
[news] [concept]
"controlled substances"
DEA's Drugs of Abuse booklet

st:0.01 fo:0 s:0 d:2.08 c:0.03 db:0.138 a:0.5 m:0.05 t:3.09 (f)

text of article used for CRITICAL ANALYSIS, under FAIR USE provisions of the Copyright Act of 1976, 17 U.S.C. § 107, et al.

media charts

Bot's analysis of: "The Dangers and Consequences of Marijuana Abuse" the U.S. Department of Justice Drug Enforcement Administration (DEA) Demand Reduction Section, May 2014
more >>

Newsbot crossword puzzles!

Drug War

A review and analysis of modern prohibition rhetoric

  • Amazon Kindle
  • html (free)
  • pdf (free)
  •   Wonder Drug Cover-Up: Yes, it's true: pot fights cancer. more

    As Bad For Your Lungs As Smoking 20 Normal Cigarettes? 20 times more likely to cause cancer than tobacco? Why does the US Government make cannabis researchers use only Government-issued marijuana?


    Observer's Propaganda Picks
    dripping with drug-war propaganda!

    Prohibition-era cartoons
    Anti-prohibition political cartoons from Prohibition I.

      Support Mapinc & Drugsense

    Donate to drugsense please give generously!

    article tags


    various_illegal_drugs concept - general terms for illegal drugs
    prohibition_agency concept - various drug prohibition and propaganda agencies and police; tax-supported entities dependent on continuing prohibition
    drug_law concept
    illegal_drugs concept - drugs of abuse, so-called
    propaganda_theme1 concept - drug war propaganda theme: hated groups
    drugwar_propaganda concept - a drug war propaganda event, campaign release, slogan, or theme
    drug_related concept - related to illegal drugs and prohibition