Health Care Security

RSS Feed   
Health Care Security Reports
1 - 25 of 257 Matches Previous Page  |  Next Page
AT&T Business: Customer Stories – NHS Management, LLC
sponsored by AT&T Cybersecurity
CASE STUDY: In this case study, see how NHS Management, a healthcare provider that supports 50 nursing homes, was able to address the growing security needs of their patients and establish a threat detection and incident response program that allowed them to protect and prevent unwanted access to patient data – read on for the full story.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

AT&T Cybersecurity

Protecting Healthcare Data With Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: Healthcare professionals are facing the growing challenge of balancing the security of patient data with ease of authorized access. Read this case study to see how one healthcare institution was able to achieve effective data management across various devices without sacrificing functionality.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Telehealth ROI Worksheet
sponsored by RingCentral
RESOURCE: Are you trying to calculate the ROI of your telehealth program, but aren’t sure where to start? Calculating ROI might seem complicated, but it doesn’t have to be. In this resource, explore a checklist that explains what to keep in mind when calculating the ROI on your telehealth communications platform.
Posted: 22 Dec 2020 | Published: 22 Dec 2020

RingCentral

Leading private hospital boosts email security to protect user data
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Business Continuity and Disaster Recovery in Healthcare
sponsored by Zerto
WHITE PAPER: With Zerto’s IT Resilience Platform, organizations can recover their health systems from ransomware and other malware through 5 thorough methods. Access this white paper to gain access to 3 case studies explaining why leading health systems and provider organizations are implementing Zerto.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

Zerto

Leeds And York Partnership NHS Foundation Trust Safeguards Patient Services and Data
sponsored by arcserve
DATA SHEET: Access this data sheet to discover the benefits of implementing Arcserve UDP, a solution that provides comprehensive disaster recovery and data protection to safeguard the availability of patient data and continuity of healthcare services.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

arcserve

University Hospitals Of Derby And Burton NHS Trust Ensures Continuity Of Patient Care
sponsored by arcserve
CASE STUDY: Checkout this case study to learn more about the results that the Burton NHS Trust experienced with Arcserve, including faster data recovery, reduced backup times, minimized downtime, and instant access to systems and data at a secondary location, all of which helped to safeguard patient care.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

arcserve

The 2020 Spotlight Report on Healthcare
sponsored by Vectra AI
WHITE PAPER: With the healthcare industry already being one of the most vulnerable in terms of information security and privacy, the year 2020 has been something of a nightmare. By reading this report, you can see specifically where risk has increased and how Cognito’s Network Detection and Response (NDR) can help mitigate this risk.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Vectra AI

NHS Counts On Vectra To Stop Cyberattacks
sponsored by Vectra AI
CASE STUDY: After falling victim to a ransomware attack in 2017, NHS, a healthcare provider in England, wanted to bolster their security against future attacks and ensure that patient data was protected and compliance ready. Read this case study to see their journey.
Posted: 03 Dec 2020 | Published: 03 Dec 2020

Vectra AI

Extreme Networks Helps Madrid Digital Put Patient Care First
sponsored by Extreme Networks
CASE STUDY: The future of healthcare and social services is digital, and Madrid Digital needed a strong, reliable and advanced network that could support the move to a more accessible and virtual way to provide patients with the best possible care. In this case study, learn how Madrid Digital was able to achieve this with the help of Extreme Networks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Extreme Networks

Case Study: Medical Devices & Securing the Healthcare Industry
sponsored by Rezilion
CASE STUDY: The healthcare industry has been a prime target of cyberattacks for several years, however COVID-19 brought most of these issues into the public eye. This case study highlights where the vulnerabilities lie and provides an overview of how Rezilion is working with healthcare device companies to prioritize and mitigate these risks.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Rezilion

Privileged Access in Healthcare
sponsored by Hitachi ID
DATA SHEET: The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and disruption to healthcare delivery at worst. Because of this high risk, healthcare organizations need to carefully manage privileged access. View this data sheet to learn more.
Posted: 27 Oct 2020 | Published: 27 Oct 2020

Hitachi ID

Healthcare Organizations: Securing Your Data in the Cloud
sponsored by Ionic Security
EBOOK: How can healthcare organizations embrace the benefits of the cloud while minimizing the impact of its risks? Download this guide for insights that define the scope of your responsibilities in cloud security and best practices to follow in your journey to the cloud.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Ionic Security

Technology Supporting People
sponsored by Advizex
CASE STUDY: In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

Is Your Workflow Management System Working for You?
sponsored by Advizex
EBOOK: When employees don’t use a technology solution as intended, it often leads to a sub-optimal ROI and ineffective workflow management. That’s what one major healthcare provider was dealing with—and what drove them to work with Advizex. Learn about their experience with Advizex, and the benefits of modern workflow management in this eBook.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Advizex

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Royal Holloway: Man proposes, fraud disposes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 07 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Improving the Health of Healthcare Cybersecurity
sponsored by Cisco Umbrella
EBOOK: The revolution in medical devices, software, and mobile technology is making it possible to deliver more efficient and effective patient care. But these technologies have generated new opportunities for cyberattackers. In this e-book, learn how to gain the visibility, control and protection you need to secure your users and data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cisco Umbrella

Understanding and Fighting Cybersecurity Threats in Telemedicine
sponsored by BlackBerry
WHITE PAPER: The recent spread of COVID-19 has created a surge in demand for increasingly popular telemedicine services. Unfortunately, cybercriminals caught wind of this lucrative new vector, putting practitioners and patients at risk. Download this white paper for an overview of the cybersecurity risks in telemedicine and how to overcome them.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

BlackBerry

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

Medical Device Encryption & Security
sponsored by NetLib Security
RESOURCE: Read how NetLib Security’s Encryptionizer can help manage and defend your personal health information and electronic health records to maintain business stability, reputation and compliance.
Posted: 10 Apr 2020 | Published: 10 Apr 2020

NetLib Security

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio
1 - 25 of 257 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info