Among the emerging worries of hospital IT administrators in the HIPAA era is how to authenticate users of their computer systems. Current user authentication practices (the verification of identify and access permission) do not satisfy developing
Among the emerging worries of hospital IT administrators in the HIPAA era is how to authenticate users of their computer systems.
Current user authentication practices (the verification of identify and access permission) do not satisfy developing security requirements, according to Stephen Pellissier, project manager at the Advanced Technology Institute in Charleston, SC, who spoke Sunday at the HIMSS meeting in San Diego.
"Users find proper authentication time-consuming and mission-distracting," Pellissier said.
Passwords, though available and reliable, are often shared with other users during the same session. Also, users may choose "weak" passwords, or they forget, lose, or write down "good" passwords.
Biometrics and smart cards offer alternative solutions in the healthcare environment, where rapid sign-on is critical and multiple users may share multiple systems on the same workstation.
Smart cards can offer a measure of security due to their secret PINs, but they are susceptible to loss, theft, or damage.
Biometrics, including voice and face recognition systems and fingerprint and iris scanning, is gaining favor in many healthcare facilities.
"Biometrics is becoming increasingly accurate, cost-effective, and easy to use," Pellissier said.
The disadvantages of biometrics are that it lacks standards, and once compromised, the resulting security breech can be serious.
The following are pros and cons for each biometrics technology, according to Pellissier:
? Widely used finger scans offer reliability and maturity, although obtaining input samples is not possible in all environments.
? Voice recognition systems are least intrusive but are highly susceptible to interference.
? Face recognitions systems are also unintrusive but are impaired by poor lighting conditions and can be compromised with masks.
? Iris scanning is the most accurate and works in all environments. It is perceived as intrusive, however.
"Technology offers no silver bullet for meeting the challenge of effective authentication," he said.
While good security practice also involves audit controls (who did what, when) and user access (based on need to know), user authentication if of prime importance.
Integration of the various methods of authentication will be the most difficult technical and procedural challenge to overcome, Pellissier said.
Could Cloud-Based 'Progressive Loading' be a Boon for Radiology Workflows?
March 13th 2024The newly launched Progressive Loading feature, available through RamSoft’s OmegaAI software, reportedly offers radiologist rapid uploading of images that is faster than on-site networks and other cloud-based systems regardless of the network radiologists are using.
Philips Garners FDA 501(k) Clearance for Update of Real-Time Clinical Surveillance Software
March 16th 2022New additions to the Philips Capsule Surveillance software include improved integration with health information technology (HIT) systems and enhanced visibility of patient data across remote devices.