Health Care Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Compliance White Papers (View All Report Types)
1 - 25 of 99 Matches Previous Page  |  Next Page
Using Logs to Address Compliance Standards
sponsored by Logentries
WHITE PAPER: In this white paper, learn common log requirements in 3 major industries, what to look for in a log management tool, real-world examples of how to use a log management system for investigative issues, and more.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Logentries

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

Secure Your Connected Medical Devices
sponsored by Zingbox
WHITE PAPER: Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Zingbox

IoT Guardian for the Healthcare Industry
sponsored by Zingbox
WHITE PAPER: Last year, healthcare was the most attacked industry, and 17% of documented attacks were facilitated through IoT medical devices. Download this white paper and discover how to fully protect your network from vulnerable or compromised medical devices – a healthcare organization's weakest link.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Zingbox

4 Ways to Protect and Recover from Ransomware Attacks
sponsored by Commvault
WHITE PAPER: Discover 4 best practices to protect and recover from ransomware attacks with confidence when you download this white paper.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Commvault

The Secure and Compliant Way to Access Protected Health Information From Anywhere
sponsored by Citrix
WHITE PAPER: Explore the features of file sync & share built specifically for healthcare organizations and their compliance needs. Learn how you can gain secure IT oversight, access to a dedicated healthcare cloud, and mobile data access all in one unified platform.
Posted: 31 Aug 2016 | Published: 31 Aug 2015

Citrix

Fortinet Secure Access Solutions for Flawless Wireless Performance
sponsored by Fortinet, Inc.
WHITE PAPER: Wireless healthcare operations means greater vulnerabilities to healthcare networks. With patient records such a hot commodity for cybercriminals, healthcare organizations must be airtight with their remote management. Learn how to deploy end-to-end cybersecurity to ensure uninterrupted care at any sized healthcare facility.
Posted: 25 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

A Guide to Essential Analytics Tools for New Healthcare Models
sponsored by SAS
WHITE PAPER: In this resource, you will compare the differing types of episode analytics, and discover how healthcare providers use these analytics for payment bundling in real-world scenarios. Read on now to discover how to reduce variations that will negatively impact care outcomes and lead to higher costs.
Posted: 06 Jan 2016 | Published: 31 Dec 2014

SAS

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Securing Data Access Within the Healthcare Industry
sponsored by VASCO Data Security International
WHITE PAPER: Access this white paper to better understand the changing role of technology within the healthcare sector and best practices to integrate security without compromising the patient experience.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

Managing Cybersecurity Risk in a HIPAA-Compliant World: HIPAA and HITRUST
sponsored by Coalfire
WHITE PAPER: Should you assess your compliance and risk management posture against HIPAA, or HITRUST? Discover the answers to health IT security professionals' frequently asked questions on the two frameworks to help you identify the best approach to developing a solid security risk and management program for your organization.
Posted: 02 Jun 2016 | Published: 01 May 2016

Coalfire

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Internal Segmentation Firewalls for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how an internal segmentation firewall can benefit your enterprise by addressing internal threats and reducing data breaches in healthcare. View this resource to discover how you can securely deliver platforms that can enhance patient care, improve provider efficiency, and better comply with regulatory mandates.
Posted: 18 Feb 2016 | Published: 29 Oct 2015

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

The Adobe EchoSign advantage for heatlhcare
sponsored by Adobe EchoSign
WHITE PAPER: Access this white paper to learn more about e-signatures in the healthcare sector.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

Adobe EchoSign

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

How to Achieve Scalable, Expandable Clinical Document Creation For Your Healthcare Organisation
sponsored by Nuance
WHITE PAPER: When in the face of the changing NHS landscape and rising information delivery demands, how can health care organizations create the highest-quality patient documentation possible while responding to increasing pressure? Read the following white paper to learn how Dragon Medical 360 can help.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Nuance

Speech Recognition, Structured Reporting Multi-Site Workflow
sponsored by Nuance
WHITE PAPER: How do you provide the radiology department with a reporting system that doesn't require the consultants to change behavior, enables easy creation of structured documents, accurately captures reporting data, integrates a peer review workflow, and consolidates multiple RIS/PACS? Read this report to learn how Dragon Medical can help.
Posted: 22 Sep 2014 | Published: 22 Sep 2014

Nuance
1 - 25 of 99 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement