Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
51 - 75 of 269 Matches Previous Page  |  Next Page
4 Tips for HIPAA-Compliant Cloud Storage
sponsored by Pure Storage
EGUIDE: Healthcare cloud storage requires more layers of data security and compliance strategies, making some CIOs reluctant to engage the services of third parties. But in this e-guide, find 4 key tips to evaluate cloud storage vendors to ensure patient data protection and HIPAA compliance.
Posted: 01 Jun 2016 | Published: 20 May 2016

Pure Storage

How Shannon Medical Center is Scaling VDI
sponsored by Pure Storage
WEBCAST: In this webcast, Mike Russell, Assistant IT Director at Shannon Medical Center, explains how VDI has enabled them to boost IT efficiency and patient care. Watch now to learn how you can utilize flash storage to overcome the VDI challenge and secure provider access to your desktops, clinical apps, and patient information.
Posted: 26 Apr 2016 | Premiered: Apr 26, 2016

Pure Storage

Virtualization Making a Real Impression on Health IT
sponsored by SearchHealthIT.com
EBOOK: In this handbook, our health IT experts closely examine the benefits of virtual desktop infrastructures in healthcare. Access now for advice on you can avoid the common virtualization installation traps, plus 5 reasons you should consider desktop virtualization for your healthcare organization.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

SearchHealthIT.com

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Delivering Value-Based Healthcare: Episodes of Care Analytics for Providers, Payers, and ACOs
sponsored by SAS
RESEARCH CONTENT: In this interview with J. Peter Chingos, a Senior Industry Consultant of Health Analytics Practice, you will discover the benefits EOC analytics provides, as well as the challenges associated with implementation. Read on now to answer your burning questions about EOC and learn how EOC is enabling more predictive analytics.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SAS

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Former Healthcare CIO Talks Cybersecurity in Healthcare
sponsored by Optum
EGUIDE: Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

Healthcare CIOs Address Cybersecurity Vulnerabilities
sponsored by Optum
EGUIDE: As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

Optum

How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

Security Tips for HIPAA-Compliant Cloud Storage and Texting
sponsored by Optum
EGUIDE: Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
Posted: 13 Jul 2016 | Published: 12 Jul 2016

Optum

HITRUST CSF Certification – Frequently Asked Questions
sponsored by Coalfire
WHITE PAPER: What do you know about the HITRUST Common Security Framework (CSF) Assurance Program? Access this resource now to obtain answers to 20 FAQs about HITRUST CSF – including its relationship with HIPAA – and bolster the security posture of your healthcare organization.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

Coalfire

How to Prevent Healthcare Cybersecurity Attacks
sponsored by ServiceNow
EGUIDE: In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

ServiceNow

Healthcare Cybersecurity Best Practices
sponsored by ServiceNow
EGUIDE: In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

ServiceNow

What Healthcare Executives Must Know About Data Breaches
sponsored by Coalfire
EGUIDE: BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.
Posted: 10 Jun 2016 | Published: 02 Jun 2016

Coalfire

Jumpstart HITRUST CSF Certification with a Proven Methodology
sponsored by Coalfire
WEBCAST: Has your organization received a letter requiring you to be HITRUST CSF certified or is your organization considering HITRUST validation? This webinar educates you about the HITRUST CSF certification process and provides clarification for any questions you might have.
Posted: 09 Jun 2016 | Premiered: Sep 30, 2015

Coalfire

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Security Challenges in Healthcare Social Media Usage
sponsored by Actiance
EGUIDE: In this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

Optimize Patient Documentation with Enterprise Content Management
sponsored by Actiance
EGUIDE: In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

How to Keep Cloud Services Compliant with HIPAA Standards
sponsored by Actiance
EGUIDE: In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
Posted: 29 Mar 2016 | Published: 28 Mar 2016

Actiance

Get the Message: Why Secure Texting in Healthcare Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

EHR Best Practices and Requirements
sponsored by Dimensional Insight, Inc.
EGUIDE: This expert e-guide is your essential checklist to determine if your IT infrastructure and systems are up to the task of taking on EHR software. Uncover the 5 areas you'll need to evaluate.
Posted: 13 Jan 2016 | Published: 13 Jan 2016


Learn the new definition of Revenue Cycle Management and what it means to you
sponsored by SearchHealthIT.com
EBOOK: Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
Posted: 30 Dec 2015 | Published: 22 Dec 2015

SearchHealthIT.com
51 - 75 of 269 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement