Date Added: Feb 2012
Defending the authors' most sensitive data and applications with only a user ID and password simply isn't adequate. By simply obtaining a user ID and password or using a workstation that hasn't been logged off, snoopers in house and hackers remotely can access sensitive health records. A new level of secured yet convenient authentication is required to protect data that is at rest or in motion. Governments around the world are embarking on Healthcare reform in an effort to provide new levels of service, new insights into an increased quality and effectiveness of care, and certainly to lower costs and prevent fraud.