Essential Guide to HIPAA Compliance and Data Protection Strategies
By: TechTarget Health IT and TechTarget Security View more from TechTarget Health IT and TechTarget Security >>
Download this next:
How to get started with HITRUST CSF Certification
By: Coalfire
Type: White Paper
The HITRUST CSF was developed by IT and healthcare professionals to provide a highly prescriptive framework for managing the security requirements inherent in HIPAA.
The purpose of this e-guide is to provide key information with respect to the HITRUST CSF and illustrate the steps involved in starting the HITRUST CSF certification process so organizations can approach this rigorous framework with greater ease, expertise, and efficiency. Read on to get started.
These are also closely related to: "Essential Guide to HIPAA Compliance and Data Protection Strategies"
-
Frequently Asked Questions About HITRUST CSF® Certification
By: Coalfire
Type: White Paper
The Health Information Trust Alliance (HITRUST) is a necessary roadmap for organizations that process, transmit, and store Protected Health Information (PHI).
The HITRUST Common Security Framework (CSF) was developed by IT and healthcare professionals to provide a framework for managing the security requirements inherent in the Health Insurance Portability and Accountability Act (HIPAA).
As with any complex framework, there are often questions regarding different aspects, such as how to obtain certification, some of the issues surrounding the CSF and the relationship between HIPAA and HITRUST
Access this white paper to discover the answers to these frequently asked questions.
-
Secure texting: The next great healthcare communications frontier
By: AVST
Type: eGuide
The lack of secure texting and communications is a primary factor in healthcare data risk. It is also a quick way for a hospital or healthcare organization to find itself in violation of HIPAA compliance, with swift and costly implications.
In this expert e-guide, learn why the first step to secure communications technology (like texting) is convincing leaders and clinicians to recognize the risks to health data.
Find more content like what you just read:
-
Securing patient data in the cloud
By: Symmetry Systems
Type: Case Study
Protecting patient data is critical; every healthcare organization knows this to be true. But in the face of rising cyberattacks, doing so is no easy task. Symmetry Systems developed DataGuard, a data security posture management solution, to help. Check out this case study to learn all about it.
-
Providing data security for healthcare
By: SSH Communications Security Corp.
Type: Case Study
For healthcare organizations, data is crucial to their sustainability. Healthcare organizations look to accelerate their data management and improve security, all while needing to fully comply with GDPR and maintain health data integrity. Download this case study to see how SSH heled this healthcare organization improve their data security.
-
The Omnibus Bill: Reshaping Medical Cybersecurity
By: Cybellum
Type: White Paper
With the passing of the Omnibus bill, the FDA now oversees medical devices, which are increasingly connected and top targets for cybercriminals. What does this change mean for the future of medical-device cybersecurity? Download this white paper for an answer.
-
App protection for connected medical devices
By: Digital.ai
Type: Case Study
To counteract the cyber vulnerabilities in medical devices, organizations are using a new two-part approach. Part one focuses on protecting application code at the binary level without disrupting the SDLC. Part two emphasizes implementing data protection for sensitive and critical elements. See what this two-part approach looks like in action here.
-
Leading private hospital boosts email security to protect user data
By: Barracuda
Type: Case Study
Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
-
SSM HEALTH DEPLOYS GAME-CHANGING SAFE HOSPITALS ECOSYSTEM FOR HIGHLY EFFICIENT OPERATIONS AND PROACTIVE THREAT MANAGEMENT
By: Motorola, Inc.
Type: Case Study
Like many large medical centers, SSM Health’s 11 hospitals in the Greater Midwest Region face heightened and constant safety and security challenges. Download this case study to learn why this organization is deploying the Safe Hospitals unified ecosystem from Motorola Solutions to safeguard its employees, property and the patients it serves.
-
How Unit 42 MDR helped this medical center fight ransomware
By: Palo Alto Networks
Type: Case Study
After suffering from a ransomware attack, Enloe Medical Center realized they needed to rethink their security. By partnering with Palo Alto, and implementing Unit 42 Managed Detection and Response (MDR), they were able to fully revamp their security, saving time and mitigating risk through constant SOC monitoring. Read on to learn more.
-
Why is a Zero Trust Security Model Critical for Keeping Healthcare Email Secure?
By: Paubox
Type: Webcast
Email threats are evolving and becoming more sophisticated. Attacks are no longer just malicious links and downloads but now include social engineering attacks that are targeted and nuanced. These attacks lack easily identifiable malicious content which means they can easily bypass most email defenses.
-
Secure sensitive data with ML and AI-fueled data tracing
By: Symmetry Systems
Type: Case Study
Seven Bridges offers customers genomic and bioinformatic data analytics and insights. With supply chain attacks rising, Seven Bridges decided to make a change. With Symmetry Sytems’ DataGuard, they were able to secure their clients’ personal information through the use of ML and AI-fueled data tracing. Read on to learn more.
-
Are Your People Ready to be Hacked?
By: Concord Technologies
Type: Webcast
Whether it is ransomware or the exfiltration of patient records, the impact of cyber attacks on healthcare organizations can be catastrophic. Hackers continue to focus on the weakest link in the security chain: your employees.