Nicknamed “Race City USA,” the Town of Mooresville, located in North Carolina, employs approximately 475 staff members, including police officers, firefighters, and administrators in city hall, finance, parks and recreation, and more.
Nicknamed “Race City USA,” the Town of Mooresville, located in North Carolina, employs approximately 475 staff members, including police officers, firefighters, and administrators in city hall, finance, parks and recreation, and more.
At Identity Automation, we work hard every day to provide best-in-class solutions that are configurable, flexible, and scalable. Working to coach our employees and customers on our products and services is our Director of Solutions Engineering, Greg Pearson.
It’s no secret there are high expectations surrounding the healthcare industry, especially today with the state of emergency and fear bound to the COVID-19 Pandemic. Healthcare organizations must take even higher measures to protect patient and staff safety, deliver a high quality of care in an efficient manner, and keep patient records and information secure with adherence to compliance requirements.
Maturity models can be used to evaluate the effectiveness of current capabilities and set a prioritization level when an organization is ready to advance its capabilities. When applying a maturity model to Identity and Access Management (IAM), however, it’s important to examine the key tenets of an overall IAM strategy.
Enhanced security, increased patient safety, reduced risk of prescription fraud, better patient experience— the benefits of Electronic Prescriptions for Controlled Substances (EPCS) are clear. Spurred in response to the opioid crisis, EPCS eliminates paper prescriptions by allowing clinical prescribers to electronically write prescriptions for controlled substances. It also permits pharmacies to receive, dispense, and archive e-prescriptions.
Recently, we discussed the four key areas of comprehensive identity and access management (IAM) as well as the common misconception that IAM is a technology that’s confined to select areas. As we transition away from this perception to one of a robust and mature IAM system with a wide array of tenets, it’s critical to determine an action plan to improve your organization’s IAM capabilities.
Conferences, music festivals, sporting events, parades— every event imaginable from coast to coast is either already cancelled, postponed, or has attendees at the edge of their seats waiting for the latest update. Hospitals and healthcare systems are sending thousands of non-essential employees home to work remotely. Universities and K-12 school districts are also shutting down all over the world, affecting 300 million students globally.
Over the past two decades, the Opioid Epidemic has topped an alarming level of news headlines. In response to this, effective June 1, 2010, the Electronic Prescriptions for Controlled Substances (EPCS) was passed by the Drug Enforcement Agency (DEA) as an alternative to hard copy prescriptions.
From social engineering attacks and phishing to malware and hackers, the healthcare industry has a firm target on its back. As we explored in the other three parts of our healthcare breach crisis blog series, attacks can come from almost any vector with the payoff for criminals on the dark web or via ransomware being well-worth the effort.
I’m pleased to announce a strategic alliance with 3Eye Technologies, a value-added distributor of mobility and cloud solutions. As we continue to gain momentum through the Identity Automation 2.0 growth strategy, a targeted initiative to scale the business with increased focus on execution, the new partnership will provide new routes to accelerated profitability and deliver more value to customers.
current_page_num+2: 5 -
© 2022 Copyright Identity Automation. All Rights Reserved.