Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
1 - 25 of 275 Matches Previous Page  |  Next Page
Achieve HIPAA compliance while keeping data secure
sponsored by SearchHealthIT.com
EBOOK: There are conflicts between maintaining data security in healthcare and meeting HIPAA requirements. IT pros must convince clinicians to use technology.
Posted: 20 Feb 2017 | Published: 10 Feb 2017

SearchHealthIT.com

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco

Why Ransomware Attacks Are A Growing Threat To Health IT
sponsored by Cisco
EGUIDE: Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
Posted: 16 Feb 2017 | Published: 15 Feb 2017

Cisco

APIs and The Cures Act
sponsored by Medfusion
WHITE PAPER: Access this white paper to learn how Medfusion's API solution meets the 3 important requirements for certified vendors put forth by the Cures Act.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

Medfusion

Securely Retrieve and Consolidate Medical Records in Minutes
sponsored by Medfusion
WHITE PAPER: Access this white paper to learn how to securely gather and organize medical data from multiple providers and EMRs, solving an interoperability dilemma.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

Medfusion

8 Things You Should Ask Before Switching Patient Portals
sponsored by Medfusion
WHITE PAPER: Now that you already have a patient portal in place, what happens if you want to switch vendors? Can you? Should you? Access this white paper to uncover the top 8 questions you should be asking before switching patient portals.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Medfusion

Ransomware: What every healthcare organization needs to know
sponsored by Cisco
EBOOK: In the healthcare industry, information security is critical. It's also a tremendous challenge, now more than ever before. In this e-book, you'll learn about the impact of ransomware on the myriad of networkable devices being used to improve patient care today.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

Cisco

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

Ransomware: Defending the healthcare perimeter
sponsored by Cisco
RESOURCE: Get the facts on ransomware attacks targeting the healthcare industry in this infographic — how they work, your first line of defense against them, and how to protect PHI.
Posted: 07 Feb 2017 | Published: 12 Dec 2016

Cisco

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco

University of Kansas Hospital Case Study
sponsored by Cisco
CASE STUDY: Unlike many standard hospitals, a university hospital has to protect student data and large quantities of intellectual property alongside patient data. Access this case study to learn how The University of Kansas Hospital did all this while shortening investigation time and increasing visibility.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

How a global medical manufacturer routs out ransomware
sponsored by Cisco
CASE STUDY: Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

Pulse, January 2017, Volume 5, Number 1
sponsored by SearchHealthIT.com
EZINE: Acess now to, gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. Also in this issue of Pulse Magazine, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

Provide Better Patient Outcomes with Accelerated and Affordable Storage
sponsored by Citrix and Pure Storage
RESOURCE: The linchpin of clinical application performance lies in the storage that supports it, which may be lagging if you're still reliant on legacy infrastructure. Access this resource to learn how Citrix and Pure Storage provide flash storage for virtual desktop infrastructures to enable better patient care.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Citrix and Pure Storage

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

The Total Economic Impact of Pure Storage FlashArray Storage Solutions for VDI
sponsored by Citrix and Pure Storage
ANALYST REPORT: Download Forrester's Total Economic Impact study to examine the potential ROI that health IT customers may realize by deploying Pure Storage FlashArray storage solutions for VDI environments.
Posted: 06 Dec 2016 | Published: 31 Mar 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Neurosurgery Leader Improves Efficiency, Compliance And Security
sponsored by RES Software
CASE STUDY: Discover how Carolina Neurosurgery & Spine Associates (CNSA) adopted a digital workspace program that allowed them to not only improve their security, but also the effectiveness of their IT as a whole. Discover how they were able to increase clinician efficiency, reduce the risk of non-compliance, and improve cybersecurity.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

RES Software

Data Analytics Used to Combat the Opioid Epidemic
sponsored by SAS
RESOURCE: Find out how the utilization of predictive analytics contributes to the development of better treatment protocols for the opioid epidemic. Learn how to take action with the comprehensive data management approaches outlined, such as automating data assembly and streamlining report generation.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

Transforming Technology Delivery in Healthcare with Virtualization
sponsored by Citrix and Pure Storage
VIRTUAL SEMINAR: Tune in to hear technology leaders from the nation's leading health systems discuss how technology is reshaping care delivery and security.
Posted: 04 Nov 2016 | Premiered: 09 Nov 2016

Citrix and Pure Storage

5 Data Management Issues Challenging The HealthCare Industry
sponsored by Commvault
RESOURCE: Market and technology-driven advances have dramatically increased data volume, risk, and access needs for many organizations across all industries. Access this slide presentation to understand 5 data management challenges that healthcare must overcome in order to provide excellent patient care.
Posted: 26 Oct 2016 | Published: 29 Aug 2016

Commvault

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

AVST
1 - 25 of 275 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement