Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
1 - 25 of 278 Matches Previous Page  |  Next Page
Achieve HIPAA compliance while keeping data secure
sponsored by SearchHealthIT.com
EBOOK: There are conflicts between maintaining data security in healthcare and meeting HIPAA requirements. IT pros must convince clinicians to use technology.
Posted: 20 Feb 2017 | Published: 10 Feb 2017

SearchHealthIT.com

Why Ransomware Attacks Are A Growing Threat To Health IT
sponsored by Cisco
EGUIDE: Health data is some of the most valuable data on the black market right now, but that's not the only reason the healthcare industry is such a target for ransomware attacks. Discover 4 more risk factors in this expert e-guide.
Posted: 16 Feb 2017 | Published: 15 Feb 2017

Cisco

How to Prevent and Respond to a Healthcare Ransomware Infection
sponsored by Cisco
EGUIDE: In this e-guide, consultant Ernie Hayden shares tips on preparing for ransomware attacks through measures like managing account privileges, as well as how to handle infections once they've happened.
Posted: 16 Feb 2017 | Published: 02 Feb 2017

Cisco

APIs and The Cures Act
sponsored by Medfusion
WHITE PAPER: Access this white paper to learn how Medfusion's API solution meets the 3 important requirements for certified vendors put forth by the Cures Act.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

Medfusion

Securely Retrieve and Consolidate Medical Records in Minutes
sponsored by Medfusion
WHITE PAPER: Access this white paper to learn how to securely gather and organize medical data from multiple providers and EMRs, solving an interoperability dilemma.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

Medfusion

8 Things You Should Ask Before Switching Patient Portals
sponsored by Medfusion
WHITE PAPER: Now that you already have a patient portal in place, what happens if you want to switch vendors? Can you? Should you? Access this white paper to uncover the top 8 questions you should be asking before switching patient portals.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

Medfusion

Ransomware: What every healthcare organization needs to know
sponsored by Cisco
EBOOK: In the healthcare industry, information security is critical. It's also a tremendous challenge, now more than ever before. In this e-book, you'll learn about the impact of ransomware on the myriad of networkable devices being used to improve patient care today.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

Cisco

Preventing Ransomware: Healthcare CIO Discusses Top Technologies
sponsored by Cisco
EGUIDE: In this expert e-guide, David Reis, a former CISO and current senior vice president and CIO at Lahey Health in Burlington, Mass., discusses specific technologies healthcare organizations can use to prepare for all sides of a ransomware attack, including technologies to detect, prevent and recover from them.
Posted: 07 Feb 2017 | Published: 02 Feb 2017

Cisco

Ransomware: Defending the healthcare perimeter
sponsored by Cisco
RESOURCE: Get the facts on ransomware attacks targeting the healthcare industry in this infographic — how they work, your first line of defense against them, and how to protect PHI.
Posted: 07 Feb 2017 | Published: 12 Dec 2016

Cisco

Case Study: University of Kansas Hospital's Security Team Fights Ransomware
sponsored by Cisco
VIDEO: In this video, Henry Duong, Infrastructure Security Manager at University of Kansas Hospital, explains how his team fights ransomware and keep patients and researchers secure.
Posted: 07 Feb 2017 | Premiered: 27 Oct 2016

Cisco

Methods for Preventing Hospital Ransomware Infections and Cyberattacks
sponsored by Cisco
EGUIDE: The threat of ransomware attacks on hospitals continues to rise and has become one of the biggest priorities for IT to prepare for and protect against. In this expert e-guide, health IT expert Reda Chouffani shares 6 top-recommended methods for preventing ransomware infections and attacks.
Posted: 06 Feb 2017 | Published: 02 Feb 2017

Cisco

University of Kansas Hospital Case Study
sponsored by Cisco
CASE STUDY: Unlike many standard hospitals, a university hospital has to protect student data and large quantities of intellectual property alongside patient data. Access this case study to learn how The University of Kansas Hospital did all this while shortening investigation time and increasing visibility.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

How a global medical manufacturer routs out ransomware
sponsored by Cisco
CASE STUDY: Access this case study to learn how Octapharma's decision to adopt Cisco's Umbrella security program helped them to secure their expanding network.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

Cisco

Pulse, January 2017, Volume 5, Number 1
sponsored by SearchHealthIT.com
EZINE: Acess now to, gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot. Also in this issue of Pulse Magazine, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SearchHealthIT.com

Best Practices for Healthcare Data Breach Prevention
sponsored by Absolute
WHITE PAPER: As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.
Posted: 16 Dec 2016 | Published: 30 Nov 2016

Absolute

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: Whether it is from human error or malicious outsiders, a diligent IT department can diminish the risk of lost or stolen data. Learn 7 best practices healthcare organizations can put in place to ensure the safety of patient information on mobile devices.
Posted: 15 Dec 2016 | Published: 31 Dec 2015

Absolute

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

Provide Better Patient Outcomes with Accelerated and Affordable Storage
sponsored by Citrix and Pure Storage
RESOURCE: The linchpin of clinical application performance lies in the storage that supports it, which may be lagging if you're still reliant on legacy infrastructure. Access this resource to learn how Citrix and Pure Storage provide flash storage for virtual desktop infrastructures to enable better patient care.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Citrix and Pure Storage

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

The Total Economic Impact of Pure Storage FlashArray Storage Solutions for VDI
sponsored by Citrix and Pure Storage
ANALYST REPORT: Download Forrester's Total Economic Impact study to examine the potential ROI that health IT customers may realize by deploying Pure Storage FlashArray storage solutions for VDI environments.
Posted: 06 Dec 2016 | Published: 31 Mar 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Neurosurgery Leader Improves Efficiency, Compliance And Security
sponsored by RES Software
CASE STUDY: Discover how Carolina Neurosurgery & Spine Associates (CNSA) adopted a digital workspace program that allowed them to not only improve their security, but also the effectiveness of their IT as a whole. Discover how they were able to increase clinician efficiency, reduce the risk of non-compliance, and improve cybersecurity.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

RES Software

Before Tackling Secure Texting In Healthcare, Change Your Company Culture
sponsored by AVST
EGUIDE: In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

AVST
1 - 25 of 278 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement