Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
1 - 25 of 251 Matches Previous Page  |  Next Page
How To Approach Mobile Healthcare Security And Data Breaches
sponsored by Absolute Software
EGUIDE: In this expert e-guide, Reda Chouffani, industry expert and cofounder of Biz Technology Solutions, presents 7 best practices for protecting mHealth data from loss. Also inside, Don Fluckinger, Senior Content and Media Strategist at Schwartz MSL Boston, explores the aftermath of a breach.
Posted: 26 May 2015 | Published: 29 Apr 2015

Absolute Software

Healthcare Risk Management: Best Practices for Creating an Effective Program
sponsored by Auxilio
WHITE PAPER: This expert e-guide outlines the 5 common mistakes healthcare organizations make when creating a comprehensive security risk management program. Continue reading to uncover a 3 step strategy for ensuring security risk management success.
Posted: 26 May 2015 | Published: 20 May 2015

Auxilio

CHIME & SearchHealthIT ICD-10 Survey Brief
sponsored by Allscripts Healthcare Solutions
EGUIDE: Learn from industry experts why so many healthcare organizations need to ramp up ICD-10 preparations for the delayed October 1st and gain insights into the advantages and challenges of the new coding system.
Posted: 14 May 2015 | Published: 30 Sep 2014


Mobile First Healthcare
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn about a simpler way to implement healthcare mobility that eliminates any compliance difficulties.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

How to Turn Your C-Suite into Your A-Team
sponsored by RES Software
WHITE PAPER: Access the following white paper to learn how RES Software can help you improve quality care and deliver easier access to IT services at a lower cost, all while protecting security and compliance.
Posted: 06 May 2015 | Published: 06 May 2015

RES Software

Million Dollar HIPAA Penalties for Healthcare
sponsored by Absolute Software
WEBCAST: The additions of HITECH and OFR extend HIPAA's reach to business associates and partners. This webcast explores the consequences of a downstream violation and the penalties you will receive if a breach occurs. View now to learn why encryption isn't enough for your security and compliance strategy.
Posted: 05 May 2015 | Premiered: Oct 22, 2014

Absolute Software

Compliance Penalties + Class Action Damages = Healthcare Budget Crisis
sponsored by Absolute Software
WEBCAST: Examines the cost of a breach in the healthcare sector and why you need to go beyond encryption to protect your organization. View this webcast now for strategies to limit the exposure of your organization to security risks.
Posted: 05 May 2015 | Premiered: Mar 19, 2014

Absolute Software

When Data Breaches Don't Have To Be Reported
sponsored by Absolute Software
WEBCAST: Join Jeff Pelot, CIO at Denver Health, for a QA&A session on data security in healthcare organizations, how to stay on top of regulations, remain compliant, and how to prove that patient data on mobile devices is not at risk.
Posted: 04 May 2015 | Premiered: Feb 18, 2015

Absolute Software

Healthcare Data Breaches - Lessons Learned
sponsored by Absolute Software
WEBCAST: Find out about data breach trends and statistics, including the cost of a breach and common attack strategies, in this webcast. View now to learn the steps to take to mitigate and respond to a breach.
Posted: 04 May 2015 | Premiered: Jan 22, 2015

Absolute Software

What You Should Do Today to Protect Endpoint Devices in Healthcare
sponsored by Absolute Software
WEBCAST: With only roughly 50% of healthcare endpoints being secure with encryption, it's obvious that healthcare security pros need to revamp strategies.  View this webcast to take an in-depth look at the current threat landscape for healthcare organizations how to protect endpoint devices using five design principles. Watch now to learn more.
Posted: 04 May 2015 | Premiered: Feb 2, 2015

Absolute Software

Optimal care for patients and their data
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to learn how FastMed Urgent Care combined leading encryption technology to encrypt all endpoint devices with file-level encryption in order to protect patient data with the highest level of encryption.
Posted: 30 Apr 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute Software
RESOURCE: In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 30 Apr 2015 | Published: 11 Sep 2014

Absolute Software

HIPAA Violations Incur Multi-Million Dollar Penalties
sponsored by Absolute Software
WHITE PAPER: Follow the evolution of HIPAA-HITECH regulations over the past few years, learn why compliance is more important than ever before, and gain knowledge on how to avoid violations inside this resource.
Posted: 29 Apr 2015 | Published: 31 Dec 2013

Absolute Software

Mobile Device Management for Healthcare
sponsored by IBM
WHITE PAPER: Access this white paper now to learn why a mobile device management (MDM) solution is the best option for you to take advantage of mobility in healthcare.
Posted: 28 Apr 2015 | Published: 26 Dec 2014

IBM

The C-Suite Battle Plan for Cyber Security Attacks in Healthcare
sponsored by Imprivata
WHITE PAPER: This white paper examines why passwords are the top vulnerability that healthcare hackers exploit . Uncover what techniques and tools your enemies are using and how to defend yourself by improving your key management strategy. Read on now to learn more.
Posted: 27 Apr 2015 | Published: 15 Apr 2015

Imprivata

Could HIPAA Make Criminals Out of People You Know?
sponsored by 8x8, Inc.
WHITE PAPER: This white paper teaches you how to evaluate telecom providers for storing important data such as faxes, voicemail, and other PHI. View now to learn when to trust an organization as an associate and when to realize red flags are being raised.
Posted: 17 Apr 2015 | Published: 18 Aug 2014

8x8, Inc.

How HIPPA Changes are Affecting Business Associates
sponsored by Auxilio
EGUIDE: Find out how the nature of business associates' relationships with providers has changed due to the HIPAA omnibus rule, and how HIPAA-covered entities and business associates should secure protected health information to reduce the risk of data breaches.
Posted: 17 Apr 2015 | Published: 31 Jul 2013

Auxilio

How to comply with the HIPAA Security Rule
sponsored by GeoTrust, Inc.
EGUIDE: This white paper teaches you how to stay up to date with HIPAA and HITECH regulations to protect PHI. Additionally, read on now to learn the three keys to effective partner management for compliance.
Posted: 15 Apr 2015 | Published: 04 Dec 2014

GeoTrust, Inc.

Webinar Transcript: How Shannon Medical Center is Scaling VDI
sponsored by Imprivata
TRANSCRIPT: Discover how Shannon Medical Center implemented virtual desktop infrastructure (VDI) by overcoming early challenges, and learn what tools they used throughout the process in order to make their VDI project a success.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Imprivata

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
sponsored by Imprivata
WHITE PAPER: Access this white paper to learn about the regulations surround the prescribing of controlled substances, and how to make sure you're complying with regulations.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Keeping Healthcare Data Protected
sponsored by HP Security Voltage
EGUIDE: This expert e-guide lays out the steps to take to align payers and providers to reduce the costs of care and protect sensitive data. Additionally, read on to learn more about the Anthem data breach.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

HP Security Voltage

A Quick Guide to EPCS
sponsored by Imprivata
WHITE PAPER: This white paper outlines how to put EPCS efforts and planning into action and what to include in your compliance strategy.
Posted: 08 Apr 2015 | Published: 05 Nov 2014

Imprivata

Compliance Does Not Equal Security: Risk-Based Plan for ePHI Protection
sponsored by HP Security Voltage
WEBCAST: View this in depth webcast to learn how to establish a security-based strategy for data protection and how you can meet and go beyond healthcare regulation requirements. Watch now to learn more.
Posted: 03 Apr 2015 | Premiered: Aug 20, 2014

HP Security Voltage
1 - 25 of 251 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement