All resources sponsored by:

Absolute Software

1 - 25 of 30 Matches
When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST:Encryption can be used to qualify healthcare organizations for a "safe harbor" that exempts them from the need to report certain incidents, but there are some steps to take first.  This webcast explores a holistic approach to healthcare security strategies. View now to learn how to qualify for the HIPAA safe harbor and avoid costly penalties.
Posted: 04 May 2015 | Premiered: Feb 18, 2015
Get This Now


Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST:This webcast lays out the data breach trends and statistics including the cost of a breach and common attack vectors. View now to learn about the common vulnerabilities and the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015
Get This Now


What You Should Do Today to Protect Endpoint Devices in Healthcare
sponsored by Absolute Software
WEBCAST:With only roughly 50% of healthcare endpoints being secure with encryption, it's obvious that healthcare security pros need to revamp strategies.  View this webcast to take an in-depth look at the current threat landscape for healthcare organizations how to protect endpoint devices using five design principles. Watch now to learn more.
Posted: 04 May 2015 | Premiered: Feb 2, 2015
Get This Now


A Legal Practitioner's Guide To Mobility Risk
sponsored by Absolute Software
WHITE PAPER:This white paper explroes the challenges of mobile computing for legal organizations and offers 8 tips for securing mobile devices and data to avoid penalties.  View now to learn more.
Posted: 04 May 2015 | Published: 13 Nov 2014
Get This Now


Top 10 Data Security Tips to Mitigate Threats
sponsored by Absolute Software
WHITE PAPER:This white paper outlines the top 10 security tips and best practices to secure your data and fend off the barrage of incoming attacks.
Posted: 01 May 2015 | Published: 30 Oct 2014
Get This Now


uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER:In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014
Get This Now


Financial Services Security: Recent Attacks, Trends, and Best Practices
sponsored by Absolute Software
WEBCAST:This presentation discusses some of the recent high-profile breaches and uses them to draw conclusions about overall cybersecurity trends and best practices for the financial industry.
Posted: 01 May 2015 | Premiered: May 1, 2015
Get This Now


Enterprise Mobility: Security Strategies and Challenges
sponsored by Absolute Software
WEBCAST:In this webcast, you will uncover the top enterpise mobility challenges today.  View now to learn the four phases of BYOD to strengthen your security strategy and discover tips and best practices to minimize data loss risk.
Posted: 01 May 2015 | Premiered: Jan 2, 2014
Get This Now


The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER:This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 30 Apr 2015 | Published: 29 Dec 2014
Get This Now


Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER:In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015
Get This Now


Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE:In this report, you will discover the major findings drawn from the HIPAA-HITECH debate between keeping patient information accessible or disclosed. Read on now to uncover two recommendations from healthcare industry leaders and business executives to get a handle on this dilemma.
Posted: 30 Apr 2015 | Published: 11 Sep 2014
Get This Now


Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER:In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014
Get This Now


Critical Capabilities for Client Management Tools
sponsored by Absolute Software
WHITE PAPER:This white paper lists the eight critical capabilities of good end user management tools. In addition, it presents reviews and ratings of fourteen different end user management platforms.
Posted: 30 Apr 2015 | Published: 13 Jun 2014
Get This Now


HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER:This white paper reveals the evolution of HIPAA-HITECH regulations over the past few years, and explains what type of information needs to be locked down.
Posted: 29 Apr 2015 | Published: 31 Dec 2013
Get This Now


The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER:This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website as a result of stolen or misplaced devices. Read on now to learn the key requirements for healthcare leaders to ensure endpoint IT compliance.
Posted: 29 Apr 2015 | Published: 19 Jan 2015
Get This Now


Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
VIDEO:Access this video for data breach trends and statistics. Watch and learn how to avoid data breaches in the future.
Posted: 22 Jan 2015 | Premiered: 22 Jan 2015
Get This Now


Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT:Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014
Get This Now


Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER:Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014
Get This Now


The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER:This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014
Get This Now


The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER:With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015
Get This Now


Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER:This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014
Get This Now


Forrester Brief: Stolen And Lost Devices Are Putting Personal Healthcare Information At Risk
sponsored by Absolute Software
WHITE PAPER:The following white paper discusses the current state of endpoint data loss in healthcare organizations using the current breach data to highlight the need for a data-centric approach to endpoint security on all employee devices. In addition, this paper intends to illustrate an approach that can lead to fewer compliance violations and reduced risk.
Posted: 21 Oct 2014 | Published: 04 Sep 2014
Get This Now


Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE:In this report conducted by Gartner, discover the major findings drawn from the debate between keeping patient information accessible or disclosed.
Posted: 01 Oct 2014 | Published: 27 Sep 2013
Get This Now


Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST:This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014
Get This Now


Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE:In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014
Get This Now


1 - 25 of 30 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement