SSH Keys: Security Asset or Liability for Healthcare?

With the extensive network systems found in the healthcare industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and control can create HIPAA violations by not adequately restricting access to Electronic Protected Health Information (ePHI). If SSH keys are not surely managed, the organization does not know who has access. In this session, we’ll examine SSH study results that reveal widespread lack of security controls for SSH keys in the healthcare industry. We’ll discuss the common mistakes that almost all healthcare organizations make around security, policy, and auditing practices when managing SSH keys.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Data science, AI, and machine learning: The Path to Improved Safety

As safety departments seek ways to improve medicinal product safety and protect patients, data science approaches offer significant promise. What’s possible, what's realistic, and what’s the value to the industry and public?
Watch Now

Impact of Supplier Choice on Clinical Trial Execution

Asia-Pacific has become an increasingly complex and congested destination for clinical trials as local and global sponsors alike flock to the region to take advantage of its many benefits, including access to large patient pools.
Watch Now

Navigating value based care a physicians perspective

athenahealth

The value-based care model promises great gains for healthcare, from improved outcomes to reduced costs and greater physician satisfaction. But if you’re still playing by fee-for-service rules, you’ll stumble. How can providers succeed in this brave new world?
Watch Now

The end of OR underutilization: How the University of Kansas Health System maximized OR efficiency

Surgical block utilization is critical for health systems to maximize operating room efficiency and generate revenue. But integrating new approaches to block management can be intimidating. It doesn’t have to be.
Watch Now