Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
1 - 25 of 222 Matches Previous Page  |  Next Page
Get the Message: Why Secure Texting Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

All Stars Panel: Healthcare Security Spotlight
sponsored by Optum
VIDEO: This video of four IT professional explores the top security priorities and projects being grappled with in health IT today, and the strategies that you can adopt to keep your information safe from breach.
Posted: 01 Feb 2016 | Premiered: 22 Jan 2016

Optum

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

Maintaining Data Center Health for Healthcare Providers
sponsored by VMTurbo
BOOK: This e-book discusses the challenges faced by healthcare providers and their IT departments, including the surge in EHR adoption, rapidly increasing storage capacity needs and the impetus towards meeting ICD-10 and HIPPA standards. Read on and learn about a solution to addressing the ever changing needs of modern cloud and virtual environments.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

VMTurbo

Clinical Analytics Jumps in Importance
sponsored by Allscripts Healthcare Solutions
WHITE PAPER: Access this expert e-guide to explore the impact of health data analytics on organizations today, and how your peers are leveraging analytics to improve clinical care quality and compliance.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Allscripts Healthcare Solutions

Smooth transition from ICD-9 to ICD-10
sponsored by Allscripts Healthcare Solutions
EGUIDE: In this white paper, you will read testimonials from sources in the healthcare industry about how and why the transition to ICD-10 was not the catastrophic event some predicted.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

Allscripts Healthcare Solutions

Revolutionizing Remote Secure Access: Adaptive Authentication for Healthcare
sponsored by SecureAuth
WHITE PAPER: In this white paper, you will learn how to use adaptive authentication in your organization to solve the access control challenges that will lead to stronger ePHI protection and safer patient care. Read on to access a security service with stronger data protection, rapid deployment, and friendly integration.
Posted: 20 Jan 2016 | Published: 30 Jun 2015

SecureAuth

EHR Best Practices and Requirements
sponsored by Dimensional Insight, Inc.
EGUIDE: This expert e-guide is your essential checklist to determine if your IT infrastructure and systems are up to the task of taking on EHR software. Uncover the 5 areas you'll need to evaluate.
Posted: 13 Jan 2016 | Published: 13 Jan 2016


Best Practices for Communication and Engagement in Healthcare
sponsored by 8x8, Inc.
EGUIDE: In this expert e-guide, discover how healthcare providers are overcoming the security risks imposed by today's electronic methods of communication – specifically telemedicine – in order to safeguard physician-patient communication.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

8x8, Inc.

The State of Revenue Cycle Management in Healthcare
sponsored by SearchHealthIT.com
EBOOK: Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
Posted: 30 Dec 2015 | Published: 22 Dec 2015

SearchHealthIT.com

Virtualization for Healthcare: 3 Common Myths Debunked
sponsored by Dell, Inc. and Intel®
WEBCAST: Watch this webcast to explore trends and challenges for today's healthcare providers. You'll learn three myths surrounding virtualization and how end-to-end desktop virtualization strategies are helping to alleviate these common myths. Also, two customers share best practices and lessons learned of how they tackled these common myths.
Posted: 11 Dec 2015 | Premiered: Dec 4, 2015

Dell, Inc. and Intel®

Keep Your Patient Records Privacy
sponsored by OptioLabs
WHITE PAPER: This white paper explores the unique challenges of real-life data security and privacy in the healthcare industry. Read on to learn how you can keep all of your sensitive patient data private, even when it's displayed on a screen.
Posted: 08 Dec 2015 | Published: 08 Dec 2015

OptioLabs

Bring Security and Efficiency to Healthcare with Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: This white paper explains how cloud computing can help you more efficiently share patient information without putting any of that sensitive data at risk.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

8x8, Inc.

How to Protect Your Healthcare Communications in a World of Security and Compliance Threats
sponsored by 8x8, Inc.
WHITE PAPER: This white paper discusses how you can maintain security and compliance, especially in an area of healthcare IT that's frequently overlooked: Communications.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

8x8, Inc.

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates and HIPAA Standards
sponsored by IBM
WHITE PAPER: Access this guide to get an overview of how enterprises can accelerate the development of B2B integration solutions that facilitate compliance with the US Affordable Care Act (ACA). Also inside learn how data processing can efficiently process data governed by the evolving body of HIPAA data standard and related mandates.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

IBM

Data Storage Strategies that Work for Healthcare
sponsored by Hitachi Data Systems
VIDEO: This brief video describes how to consolidate access and share patient data with a single, centralized repository. Learn how this is possible while also reducing IT costs and minimizing risk.
Posted: 24 Sep 2015 | Premiered: 31 Dec 2014

Hitachi Data Systems

Urayasu Hospital Case Study: Medical Records Management Made Healthier
sponsored by Kodak
CASE STUDY: Explore how one Japanese hospital was able to achieve their goals of saving space, providing electronic access, and securely storing data. In this case study, discover ways you and your staff can achieve similar results.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Kodak

Case Study: Skin Care Doctors Move to Electronic Medical Records with Better Results for Everyone
sponsored by Kodak
CASE STUDY: In this brief case study, learn how a practice of 10-board certified dermatologists formed an EMR strategy that enabled access for multiple users simultaneously, freed up miles of shelving, and improved workflow.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

Kodak

Evidence of the Effects of Healthcare IT on Healthcare Outcomes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by HIMSS Analytics highlights, for the first time, a correlation between the maturity of IT within NHS hospitals and improvements to patient outcomes.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ComputerWeekly.com

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Federating and Tracking Identities in the Healthcare Industry
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explores how to federate and track user identities across devices, systems, and applications. Continue reading to learn the three critical components to managing identities in a newly consolidated or merged healthcare organization.
Posted: 25 Aug 2015 | Published: 12 Aug 2015

Radiant Logic, Inc.

Case Study: Infirmary Health System Secures Endpoints
sponsored by IBM
WHITE PAPER: This case study examines how Infirmary Health Systems, the largest non-government healthcare team in Alabama, effectively and efficiently address the full range of endpoint and event management requirements to meet HITECH regulations.
Posted: 30 Jul 2015 | Published: 08 Jul 2015

IBM

Futureproofing Workflows
sponsored by McKesson Corporation
WHITE PAPER: This whitepaper considers essential tips when it comes to preparing your existing infrastructure for future additions or changes. Access now to ensure your healthcare IT department is ready and able to handle shifts with ease.
Posted: 13 Nov 2015 | Published: 13 Nov 2015

McKesson Corporation

Healthcare Data Security Challenges in a Mobile World
sponsored by SearchHealthIT.com
EBOOK: Mobile devices are increasingly becoming a part of the health IT landscape. In this three-part handbook, SearchHealthIT's writers explore what that means for data protection, compliance and more.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

SearchHealthIT.com
1 - 25 of 222 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement