[ Monday, December 28, 2009 ]


User Authentication: With HITECH adding new emphasis on HIPAA, particularly security issues that can prevent a data breach (or at least the reporting requirements), many covered entities are re-thinking their need to encrypt PHI. That's now a very good idea, even if it's costly or a hassle. But you should also revisit your authentication protocols. You've obviously got usernames and passwords, but is that enough? Perhaps not. Here's an interesting article on different types of secondary authentication methods, some of which sound very easy and pretty cool.

Jeff [10:20 AM]

Comments: Post a Comment
http://www.blogger.com/template-edit.g?blogID=3380636 Blogger: HIPAA Blog - Edit your Template