Health Care Security

RSS Feed    Add to Google    Add to My Yahoo!
Health Care Security Reports
76 - 100 of 281 Matches Previous Page  |  Next Page
Get the Message: Why Secure Texting in Healthcare Matters
sponsored by SearchHealthIT.com
EBOOK: Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
Posted: 02 Feb 2016 | Published: 29 Jan 2016

SearchHealthIT.com

Delivering Value-Based Healthcare: Episodes of Care Analytics for Providers, Payers, and ACOs
sponsored by SAS
RESEARCH CONTENT: In this interview with J. Peter Chingos, a Senior Industry Consultant of Health Analytics Practice, you will discover the benefits EOC analytics provides, as well as the challenges associated with implementation. Read on now to answer your burning questions about EOC and learn how EOC is enabling more predictive analytics.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SAS

Healthcare Data Access Compliance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, according to this research paper by IS Decisions.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

ComputerWeekly.com

Healthcare Data Security Challenges in a Mobile World
sponsored by SearchHealthIT.com
EBOOK: Mobile devices are increasingly becoming a part of the health IT landscape. In this three-part handbook, SearchHealthIT's writers explore what that means for data protection, HIPAA compliance and more.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

SearchHealthIT.com

Evidence of the Effects of Healthcare IT on Healthcare Outcomes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study by HIMSS Analytics highlights, for the first time, a correlation between the maturity of IT within NHS hospitals and improvements to patient outcomes.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

ComputerWeekly.com

Healthcare Organizations and Data Breach: How to Lower Risk and Reduce Liability
sponsored by Global Knowledge
WHITE PAPER: Access this guide to find detailed steps on lowering the risks of, and recovering quickly from, a healthcare data breach.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Global Knowledge

Providers Aim to Keep Mobile Security on Track
sponsored by SearchHealthIT.com
EZINE: In this issue of Pulse e-zine, explore the challenges health IT pros face when deploying mobile healthcare applications, and how you can protect patient data while still practicing mHealth.
Posted: 08 Jul 2015 | Published: 08 Jul 2015

SearchHealthIT.com

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Internal Segmentation Firewalls for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: Learn how an internal segmentation firewall can benefit your enterprise by addressing internal threats and reducing data breaches in healthcare. View this resource to discover how you can securely deliver platforms that can enhance patient care, improve provider efficiency, and better comply with regulatory mandates.
Posted: 18 Feb 2016 | Published: 29 Oct 2015

Fortinet, Inc.

End-to-End Security for Next-Generation Distributed Healthcare
sponsored by Fortinet, Inc.
WHITE PAPER: Discover an end-to-end network security solution for next-generation distributed healthcare. Learn how to enable patient interaction through mobile devices and apps while protecting data and delivering high-speed performance and universal access.
Posted: 18 Feb 2016 | Published: 11 Jun 2015

Fortinet, Inc.

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Advanced Threat Protection for the Healthcare Industry
sponsored by Fortinet, Inc.
WHITE PAPER: View this white paper to discover how you can prevent, detect, and mitigate security risks in the healthcare industry with an advanced threat protection framework. Learn how you can experience benefits like network protection, endpoint protection, email security, and more.
Posted: 16 Feb 2016 | Published: 24 Jul 2015

Fortinet, Inc.

Secure Patient Records from Cyberattacks
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes the most common kinds of healthcare cyberattacks and presents a way to protect critical systems and patient data. Learn about a strategy to ensure the safety of every patient's medical records without having to choose between performance and security for your applications and networks.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Planning for Wireless Hospital Networks and RTLS Technologies
sponsored by Ekahau, Inc.
EGUIDE: This exclusive e-guide explores critical considerations for planning a hospital wireless network. Learn about planning access points, uncover the impact of real-time location systems (RTLS) for healthcare systems, and more.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

Ekahau, Inc.

EHR Best Practices and Requirements
sponsored by Dimensional Insight, Inc.
EGUIDE: This expert e-guide is your essential checklist to determine if your IT infrastructure and systems are up to the task of taking on EHR software. Uncover the 5 areas you'll need to evaluate.
Posted: 13 Jan 2016 | Published: 13 Jan 2016


Learn the new definition of Revenue Cycle Management and what it means to you
sponsored by SearchHealthIT.com
EBOOK: Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
Posted: 30 Dec 2015 | Published: 22 Dec 2015

SearchHealthIT.com

Futureproofing Workflows
sponsored by McKesson Corporation
WHITE PAPER: This whitepaper considers essential tips when it comes to preparing your existing infrastructure for future additions or changes. Access now to ensure your healthcare IT department is ready and able to handle shifts with ease.
Posted: 13 Nov 2015 | Published: 13 Nov 2015

McKesson Corporation

What to Look for in a Vendor Neutral Archive
sponsored by SearchHealthIT.com
EBOOK: Explore 13 essential considerations your organization should keep in mind before purchasing a VNA. With the advice in this buyer's guide, you will be in a better position to evaluate VNA vendors and determine which products are best for your organization.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

SearchHealthIT.com

Healthcare Cloud Is Rolling In
sponsored by SearchHealthIT.com
EBOOK: Can cloud services be trusted to protect sensitive healthcare data? For some, it's the top barrier to adoption. This three-part guide examines how much – and how effectively – healthcare organizations are venturing into the cloud.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

SearchHealthIT.com

Improving PHI Security Through Better HIPAA Compliance
sponsored by Bit9 + Carbon Black
EGUIDE: This white paper catches you up to speed with the latest HIPAA changes impacting security measures and offers practical steps to take to improve your security and compliance strategy.
Posted: 10 Apr 2015 | Published: 06 Nov 2014

Bit9 + Carbon Black

Achieving Data Security and Compliance in the Healthcare Industry
sponsored by IBM
VIDEO: In this video, Mark Starry, Director of Enterprise Architecture and Security at Capital Region Health Care in central New Hampshire, discusses the technology they leveraged to achieve total network visibility and cost-effectively achieve compliance with security requirements.
Posted: 30 Jan 2015 | Premiered: 11 Jul 2012

IBM

Quickly Scaling Healthcare Applications
sponsored by Array Networks
CASE STUDY: This case study explains how one healthcare organization was able to ensure application availability while consolidating its cloud-hosted application infrastructure in order to improve user experience.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Array Networks

Pulse E-zine: Vol. 3, No. 1
sponsored by SearchHealthIT.com
EZINE: Ready or not, HIPAA audits are about to strike. The first formal round will hit approximately 400 healthcare providers in 2015. In this issue of Pulse, prepare to survive your first audit, discover where security risks stem from, learn why migration planning is critical for EHR data migrations, and more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

SearchHealthIT.com

Addressing Changes in the Healthcare IT Environment
sponsored by Dell
WHITE PAPER: Discover how cloud client computing solutions supported by VDI can help your organization tackle healthcare challenges.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Dell

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight
76 - 100 of 281 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement