
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Health IT Security: Raising the Bar to Protect PHI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3RO6A3shiJ\"><a href=\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\">Health IT Security: Raising the Bar to Protect PHI<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/embed\/#?secret=3RO6A3shiJ\" width=\"600\" height=\"338\" title=\"&#8220;Health IT Security: Raising the Bar to Protect PHI&#8221; &#8212; OTAVA\" data-secret=\"3RO6A3shiJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a recent Online Tech-sponsored webinar. \u201cIt\u2019s the simplest and most cost-effective measure you can take to prevent attacker access before it happens,\u201d Lindsey said in her 30-minute presentation, Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption. Lindsey was joined on the webinar by Online Tech Director of Healthcare Vertical April Sage, who noted that the leader in secure, compliant hosting services uses Duo products in-house and that a vast majority of its healthcare clients use Duo for secure VPN (Virtual Private Network) connections to their servers, as well. \u201cWe don\u2019t receive remuneration, but we sure do recommend that anyone that needs to mitigate password and protect PHI uses some form of two-factor authentication,\u201d Sage said. \u201cAnd we know that the simplicity of setup we see with Duo is far and beyond anything else we\u2019ve seen.\u201d Lindsey started her presentation by stressing the importance of a strong first line of defense when you\u2019re talking about protecting protected health information (PHI)....","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif"}