Uses for Biometric Authentication in Healthcare Security

In an industry where some of the most advanced technology available is put to use every day, the meager state security technology in healthcare may come as a shock to the general public. Even as electronic data becomes increasingly standard for health records and even prescription writing, the need for biometric authentication in healthcare is obvious for the security side. As Paul Donfried, chief technology officer told iHealthBeat.com in 2013, “[In healthcare], 99% of the technology being used today is …

The Breach Goes On…

Did you hear about the Russian hackers that have stolen over 1 billion passwords and user profiles?  It demonstrates the over-arching driver for biometrics.  Passwords aren’t just dead…they are a liability.  Of course, we have all known this for some time, IBM stated such in 2012; but the gravity of the situation is mindboggling and alarming.  Nothing is secure and that means what we, as a society, have been using to “secure” things is truly useless.  The password did serve’s …

The Apple / IBM Partnership is a Validation of BIO-key’s Vision

The Apple / IBM partnership is a great validation of BIO-key’s vision and ambidextrous device plus cloud approach. Why? Because the Apple-IBM partnership is all about the tighter integration of IBM data analytic services and apps with Apple’s devices, design capabilities, and most importantly, cross-device continuity for business services.   The new Apple Swift development platform seamlessly moves a user between mobile and a desktop or tablet, blurring of the lines between device, thus I can start a task on …

How New York’s I-STOP Law Will Forever Change Physician Behavior across the USA

How New York’s I-STOP Law Will Forever Change Physician Behavior across the USA To understand fully what we mean by this title, let us explore what New York State’s I-STOP law is. This will come as no news to our New York colleagues, who are hurriedly and meticulously looking for ways to stay in compliance by the end of March next year. What is I-STOP? The Internet System for Tracking Over-Prescribing was passed by the New York State Legislature in …

Does Apple or FIDO care about a Trusted Source?

How does Apple or FIDO know you are the person that is authorized to access that phone? Or, how does the 3rd party applications (apps) that are accessed through the phone know you are the person authorized to have access? The fingerprint sensor? Well, what if that mobile fingerprint authentication capability isn’t very accurate? What if it’s spoofable because the technology doesn’t use enough data to authenticate the user with a high degree of assurance?  Given both Apple and Samsung’s …