The HIPAA Security Rule has been in effect since 2005. Most healthcare organizations have well-established user authentication and authorization systems and practices in place to control access to IT applications, safeguard PHI and satisfy HIPAA requirements. But one area healthcare IT and information security planners frequently overlook is privileged access management (PAM)

Leave a Reply

Your email address will not be published. Required fields are marked *

Previous post Adapting to the New Normal in Dentistry
Next post Free excerpt: The STAT guide to mRNA, how covid vaccines are just the beginning