[ Monday, December 28, 2009 ]
User Authentication: With HITECH adding new emphasis on HIPAA, particularly security issues that can prevent a data breach (or at least the reporting requirements), many covered entities are re-thinking their need to encrypt PHI. That's now a very good idea, even if it's costly or a hassle. But you should also revisit your authentication protocols. You've obviously got usernames and passwords, but is that enough? Perhaps not. Here's an
interesting article on different types of secondary authentication methods, some of which sound very easy and pretty cool.
Jeff [10:20 AM]
http://www.blogger.com/template-edit.g?blogID=3380636
Blogger: HIPAA Blog - Edit your Template