Search results

Cybersecurity

Cybersecurity, episode 1: identification, authentication, authorization!

Cybersecurity, episode 1: identification, authentication, authorization!

This article is the first in a series on cybersecurity to be discovered on the Evolucare website. Identification, authentication, authorization: what are they? How do they work? As users of computer software, we are increasingly required ...
Cybersecurity in e-health: Evolucare’s commitment

Cybersecurity in e-health: Evolucare’s commitment

E-health cybersecurity: Evolucare's ongoing commitment to excellence At the turn of the new millennium, "cybersecurity" was mostly synonymous with hackers hiding in dark corners of the digital world. At that time, Evolucare was already a ...
EHR and management of access rights to medical records

EHR and management of access rights to medical records

The issue of the authorization policy for access to a patient’s medical record is an extremely broad topic. There are multiple solutions and several factors need to be taken into account due to the complexity of organizations and the plethora ...
Aucun résultat ne correspond à votre recherche.