business , compliances , information-rights-management , security

Securing the confidentiality of PHI

March 8, 2009

PHI (Protected Health Information) requires passwords but….

a) Easy-to-guess passwords are one of the top ten threats to network security

b) When passwords change often to improve security, users write them down, increasing the risk of a breach

In addition, employers must block terminated staff from continued access to systems that have PHI.

However, it is difficult to revoke access to multiple systems quickly.

“Centralized Password Management”. Centralized Password Management lets organizations easily enforce an unlimited number of strong password rules, such as minimums on length, unique characters, letters and numbers required, etc, to maintain security.

Centralized password management allows for, strong, complex password enforcement in addition it allows for:

  1. Password synchronization 
  2. Integration of multiple passwords 
  3. Simplified password resets 
  4. Correction of forgotten passwords
  5. Password administrative revocation
  6. Password change privileges instantly and automatically on multiple systems
  7. Saving administrative Time and $Money
  8. Increases Corporate and Stockholder value