Posted on 31 October 2014 by Thales DIS
This post originally appeared on SafeNet’s The Art of Data Protection blog prior to SafeNet being acquired by Gemalto. Medical professionals hailed the technology as “the biggest step towards immortality made in our lifetime.” New devices that would save millions of lives. A new range insulin pumps, defibulators, and implanted devices of all kinds were […]
Posted on 01 June 2015 by Stephen Kingston
When we think about industries and the significant challenges with handling PII and PCI, the ecosystem surrounding healthcare bears specific attention. In today’s world this medical ecosystem has undergone significant change based on the following criteria: Changes in What Constitutes Healthcare – the amount of healthcare options available to consumers has grown significantly – from […]
Posted on 11 February 2015 by Thales DIS
This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. To comply with the DEA’s Electronic Prescriptions for Controlled Substances (EPCS) regulation, medical practitioners need to re-authenticate to their EHR system using two-factor authentication whenever they issue Rx’s for medical narcotics in digital format. […]
Posted on 11 September 2017 by Thales DIS
We’ve partnered with OnKöl to enable and secure an M2M health hub.
Posted on 11 October 2022 by Carsten Brockmann
Over the coming months on this blog, we will be exploring the impact 5G is having on certain industries – and the impact it can have in the future. In our previous blog we looked specifically at manufacturing, and this time we are focusing on healthcare. The importance of technology in healthcare Whether it’s driving […]
Posted on 05 July 2023 by Thales DIS
As the healthcare industry digitises, security is a growing concern for consumers and businesses alike. Our healthcare data is perhaps the most personal information we have, and every effort needs to be made to keep it secure. There is broad consensus that using a password to access sensitive information is not robust enough, not to […]