Health Care Compliance

RSS Feed   
Health Care Compliance Reports
1 - 25 of 249 Matches Previous Page  |  Next Page
Healthcare Digital Edge Playbook
sponsored by Equinix
WHITE PAPER: Healthcare organizations have unique IT challenges: not only is there the pressure to stay relevant and up-to-date from your clients, but there are strict regulations and demands to keep up with as well. Inside this Equinix playbook, find strategies to deliver the best care while staying compliant and connected.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

Equinix

Technology Enables Healthcare Providers to Deliver More Frequent At-Home Care
sponsored by Comcast Business
RESOURCE: In response to the COVID-19 pandemic, healthcare technology leaders quickly partnered with telecommunications companies to ramp up data capabilities and network infrastructures to support a telehealth system. Download this blog post to learn more about the technology that enables healthcare providers to deliver more frequent at-home care.
Posted: 17 Sep 2020 | Published: 23 Jun 2020

Comcast Business

Technology Supporting People
sponsored by Advizex
CASE STUDY: In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

Cybersecurity Compliance Guide
sponsored by Arctic Wolf Networks, Inc.
EGUIDE: Consumer data protection has become so heavily regulated that compliance is now a key part of any cybersecurity program. In order to better understand the various regulations and their implications, Arctic Wolf created this Cybersecurity Compliance Guide, which explores relevant regulations across industries and geography.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Arctic Wolf Networks, Inc.

Rx For Risk: ERM In the Healthcare Industry
sponsored by riskconnect
RESOURCE: Healthcare systems today are under tremendous pressure to get it right every single time.
Posted: 01 Sep 2020 | Published: 01 Sep 2020


A Guide To Using Root Cause Analysis
sponsored by Risk Fighter
RESOURCE: ROOT CAUSE ANALYSIS (RCA) gets to the bottom of an issue so that action can be taken to fix it permanently.
Posted: 01 Sep 2020 | Published: 01 Sep 2020


Customer Case Bergman Clinics
sponsored by Zivver
CASE STUDY: In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Zivver

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

How Object Storage Can Help Stop Ransomware
sponsored by Cloudian
DATA SHEET: With Cloudian and Veeam write once read many (WORM) storage, data is made immutable, preventing malware from encrypting data and locking the victim out. Access this data sheet to learn more about Cloudian and Veeam’s WORM storage system including its key feature: Object Lock.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Cloudian

8 ways Cloudian + Veeam Manages and Protects Healthcare Data and Applications
sponsored by Cloudian
WHITE PAPER: Cloudian and Veeam are up to the task and have collaborated on a healthcare data and applications management and protection solution. Access this white paper to learn 8 reasons why healthcare IT professionals are choosing it to protect their sensitive data.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Cloudian

A Practitioner’s Guide to Cloud Workload Security, Compliance, and Visibility for Healthcare
sponsored by Checkpoint Software Technologies
EBOOK: With modern cloud workloads, healthcare organizations can now adopt the cloud and take advantage of all its benefits without jeopardizing security or compliance. Tap into A Practitioner’s Guide to Cloud Workload Security, Compliance, and Visibility for Healthcare to learn more.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Checkpoint Software Technologies

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

How Healthcare Providers and Payers Drive Outcome-Based Analytics with Snowflake and Tableau
sponsored by Snowflake
WHITE PAPER: Access this paper to learn how, with Snowflake Cloud Data Platform and Tableau, healthcare providers and payers can ensure governance by building a single source of truth to power visual analytics across their organizations.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Snowflake

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

Improve Patient Experience and Health Outcomes with Fractal Analytics
sponsored by Fractal
WEBCAST: How do you improve patient experience and health outcomes? The journey is significantly easier to navigate with data science tools—like Fractal's Automated insights for digital evolution (AIDE). Watch this brief video to learn how their solution can help you become more agile and save time while providing high-quality patient insights.
Posted: 06 Apr 2020 | Premiered: Apr 6, 2020

Fractal

Satellite Case Study
sponsored by BlackBerry
CASE STUDY: In this case study learn how BlackBerry Cylance was able to help Satellite Healthcare meet their security requirements and ensure uninterrupted access to electronic medical record (EMR) and clinical desktop systems healthcare professionals rely upon to provide quality care.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

BlackBerry

InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk
sponsored by CI Security
WHITE PAPER: In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

CI Security

Why Mitel in Healthcare
sponsored by Mitel Networks Limited
PRODUCT OVERVIEW: Providing patient-centered care has become more important throughout digital transformation. As a result, healthcare organizations are increasingly investing in technology that can help them respond efficiently and knowledgeably to patients. Learn about Mitel’s solution and how it can help you in this white paper.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Mitel Networks Limited

Case study: Across Health Care’s Experiencing Working with Mitel
sponsored by Mitel Networks Limited
WEBCAST: Across Health Home Care needed a phone system that would allow communication between coworkers and patients. In this short video, listen as Jessica Reva, CEO and Administrator of Across Health Home Care, discusses their experience using Mitel.
Posted: 05 Feb 2020 | Premiered: Feb 5, 2020

Mitel Networks Limited

How Video is Shaping the Future of Telemedicine
sponsored by Pexip
WHITE PAPER: As healthcare organizations embrace modern workplace trends, they need flexible collaboration tools that meet their needs both today and tomorrow. In this white paper, learn about the benefits and challenges of modern video conferencing technologies in the healthcare industry.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Pexip

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper

How Healthcare Organizations Can Combat Security Threats
sponsored by Arctic Wolf
EGUIDE: Learn how your organization can meet compliance obligations while maintaining an optimal security strategy that detects and responds to advanced security threats.
Posted: 10 Jan 2019 | Published: 28 Dec 2018

Arctic Wolf
1 - 25 of 249 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info