Health Care Security

RSS Feed   
Health Care Security Reports
1 - 25 of 265 Matches Previous Page  |  Next Page
KVC Health Systems Eliminates Email Security Incidents with Vade Secure
sponsored by Vade Secure
CASE STUDY: In this case study, discover how KVC was able to address the growing concerns around phishing-related attacks and explore how their partnership with Vade Secure enabled them to protect the sensitive healthcare data of their staff and patients.
Posted: 17 Sep 2020 | Published: 17 Sep 2020


Technology Enables Healthcare Providers to Deliver More Frequent At-Home Care
sponsored by Comcast Business
RESOURCE: In response to the COVID-19 pandemic, healthcare technology leaders quickly partnered with telecommunications companies to ramp up data capabilities and network infrastructures to support a telehealth system. Download this blog post to learn more about the technology that enables healthcare providers to deliver more frequent at-home care.
Posted: 17 Sep 2020 | Published: 23 Jun 2020

Comcast Business

Advances in Technology Make Virtual Health a Reality
sponsored by Comcast Business
WHITE PAPER: Virtual health, otherwise known as telehealth, has gained popularity over the last few years. More than video chat with a physician, it has emerged as an extension of, and possibly a replacement for, in-person health services. But the technology behind it must live up to expectation. Read this white paper to learn 4 challenges of virtual health.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Comcast Business

Technology Supporting People
sponsored by Advizex
CASE STUDY: In this case study, discover the results of a healthcare provider’s recent project designed to quantify and better understand the issues they were facing surrounding identity and access management. Read on to discover what led to this project and the outcomes of their partnership with Advizex.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Advizex

Is Your Workflow Management System Working for You?
sponsored by Advizex
EBOOK: When employees don’t use a technology solution as intended, it often leads to a sub-optimal ROI and ineffective workflow management. That’s what one major healthcare provider was dealing with—and what drove them to work with Advizex. Learn about their experience with Advizex, and the benefits of modern workflow management in this eBook.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Advizex

Customer Case Bergman Clinics
sponsored by Zivver
CASE STUDY: In order to ensure scalable data privacy and security as they underwent a massive growth in their workforce, Bergman Clinics, a network of clinics in the Netherlands, turned to Zivver as their trusted partner. Read on to learn what led to this decision and discover the outcomes of their partnership.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Zivver

The Healthcare Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: According to the Ponemon Institute, the average cost of a data breach in the healthcare sector is $6.5 million. For these organizations, cybersecurity is a top priority – especially when it comes to meeting HIPAA compliance requirements. Use the following checklist to develop your cybersecurity strategy, step by step.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Arctic Wolf Networks, Inc.

How Object Storage Can Help Stop Ransomware
sponsored by Cloudian
DATA SHEET: With Cloudian and Veeam write once read many (WORM) storage, data is made immutable, preventing malware from encrypting data and locking the victim out. Access this data sheet to learn more about Cloudian and Veeam’s WORM storage system including its key feature: Object Lock.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Cloudian

8 ways Cloudian + Veeam Manages and Protects Healthcare Data and Applications
sponsored by Cloudian
WHITE PAPER: Cloudian and Veeam are up to the task and have collaborated on a healthcare data and applications management and protection solution. Access this white paper to learn 8 reasons why healthcare IT professionals are choosing it to protect their sensitive data.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Cloudian

Curing the Threat of Ransomware with Veeam and Cloudian
sponsored by Cloudian
DATA SHEET: In this data sheet, discover a ransomware protection solution for healthcare organizations from Veeam and Cloudian and learn the 7 benefits it brings to the table.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Cloudian

The Digital Transformation of Health and Social Care
sponsored by Vodafone
RESOURCE: The health and social care sectors are on a mandated digital journey. Transforming ways of working, communicating and connecting is a key pillar of the UK Government’s policy for delivering frontline services efficiently and cost effectively. In this guide, learn how Vodafone can help make this happen with innovative technology and 5G connectivity.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

Vodafone

A Practitioner’s Guide to Cloud Workload Security, Compliance, and Visibility for Healthcare
sponsored by Checkpoint Software Technologies
EBOOK: With modern cloud workloads, healthcare organizations can now adopt the cloud and take advantage of all its benefits without jeopardizing security or compliance. Tap into A Practitioner’s Guide to Cloud Workload Security, Compliance, and Visibility for Healthcare to learn more.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

Checkpoint Software Technologies

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

Protect Your Hospital from Ransomware in 2020
sponsored by ThreatLocker
WHITE PAPER: Ransomware attacks targeting the healthcare industry have grown substantially over the last few years. It is critical that healthcare organizations begin taking a proactive approach to prevent these attacks from compromising, releasing, and destroying sensitive data. In this white paper, learn how to protect your hospital from ransomware.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

ThreatLocker

Why healthcare leaders should consider platform thinking for fast adaptive innovation to combat COVID-19
sponsored by Philips
RESOURCE: Crises like the Covid-19 pandemic call for rapid evolution. This report discusses an approach based on platform thinking -- starting with flexible, modular soltutions that can adapt quickly.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Philips

Health Cloud Strategic Playbook
sponsored by Philips
RESOURCE: The goal of the Philips Health Cloud Strategic Playbook is to help outline the key considerations and components required to build and run a successful cloud solution, one designed specifically for the healthcare and life science industries.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Philips

How Healthcare Providers and Payers Drive Outcome-Based Analytics with Snowflake and Tableau
sponsored by Snowflake
WHITE PAPER: Access this paper to learn how, with Snowflake Cloud Data Platform and Tableau, healthcare providers and payers can ensure governance by building a single source of truth to power visual analytics across their organizations.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Snowflake

Hunt for Data Protection Ends with Encryptionizer®
sponsored by NetLib Security
CASE STUDY: In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

NetLib Security

Royal Holloway: Man proposes, fraud disposes
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
Posted: 07 Jul 2020 | Published: 14 Jul 2020

ComputerWeekly.com

Improving the Health of Healthcare Cybersecurity
sponsored by Cisco Umbrella
EBOOK: The revolution in medical devices, software, and mobile technology is making it possible to deliver more efficient and effective patient care. But these technologies have generated new opportunities for cyberattackers. In this e-book, learn how to gain the visibility, control and protection you need to secure your users and data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Cisco Umbrella

Understanding and Fighting Cybersecurity Threats in Telemedicine
sponsored by BlackBerry
WHITE PAPER: The recent spread of COVID-19 has created a surge in demand for increasingly popular telemedicine services. Unfortunately, cybercriminals caught wind of this lucrative new vector, putting practitioners and patients at risk. Download this white paper for an overview of the cybersecurity risks in telemedicine and how to overcome them.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

BlackBerry

The Cost of a Data Breach in Healthcare
sponsored by Absolute Software Corporation
WHITE PAPER: Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.
Posted: 28 May 2020 | Published: 28 May 2020

Absolute Software Corporation

Beginners Guide – Securing Legacy Devices
sponsored by NetLib Security
RESOURCE: Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.
Posted: 14 May 2020 | Published: 14 May 2020

NetLib Security

How 1 Healthcare Organization Achieved a Massive Data Migration
sponsored by Hyland
CASE STUDY: When a private, not-for-profit hospital went through an expansion, they knew they needed to convert all documents, images and metadata from their legacy electronic medical records databases to one central information repository. Find out how they achieved this with the help of Hyland’s Data Migration Conversion Services in this case study.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Hyland

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com
1 - 25 of 265 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info