Health Care Security Research
-
Examining Identity and Access Management's Function in Healthcare
Sponsored by: XtelligentMedia HealthcareIdentity and access management is a crucial component of any healthcare organization's security strategy.
-
Recognizing lawsuits against manufacturers of pharmaceuticals and medical devices
Sponsored by: XtelligentMedia HealthcareUnderstanding the surge in litigation against drug and medical device manufacturers is crucial for navigating legal complexities and ensuring patient safety.
-
How to use denial data to understand revenue cycle health
Sponsored by: Inovalon, Inc.The root causes of claims denials often stem from admissions, HIM/coding, or billing. However, obtaining a complete view of denials—to identify these root causes—and revenue health is a common roadblock. Watch this webcast as Inovalon VP Lori Zindl shares strategic ways to leverage denial data to understand revenue cycle health.
-
Survey Highlights Issues with Revenue Cycle Management for 2024
Sponsored by: XtelligentMedia HealthcareAs challenges persist, half of healthcare leaders plan to invest in new revenue cycle management technology in the next 12 to 18 months.
-
Top Healthcare Cybersecurity Predictions For 2024
Sponsored by: XtelligentMedia HealthcareIndustry experts predicted a focus on AI and supply chain security as ransomware threats continue to threaten healthcare cybersecurity in 2024. Read more about it in this eGuide.
-
Trust Emerges as Cybersecurity Issue for 42% of Security Decision-Makers
Sponsored by: XtelligentMedia HealthcareWith cyberattacks on the rise, trust in teams and technology is crucial. However, 42% of security leaders see a trust deficit as their biggest hurdle, a new survey showed. Some trust is also misplaced, with 66% of security leaders trusting employees to prevent cyberattacks more than their own teams. Download the article to read more.
-
Computer Weekly - 16 February 2021: How Covid-19 has hit IT salaries and job prospects
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our salary survey reveals the impact of the coronavirus pandemic on IT professionals' wages and job security. A potentially deadly cyber attack on a US water plant highlight the risks to critical infrastructure. And we find out how NHS Scotland is using tech to support its vaccine roll-out. Read the issue now.
-
Royal Holloway: Man proposes, fraud disposes
Sponsored by: TechTarget ComputerWeekly.comIn May 2017, a strain of ransomware called WannaCry infected 32 NHS trusts in England. The NHS's report on the incident noted that all English local authorities reported being unaffected, despite also being connected to the NHS's own national network.
-
Shore up your cybersecurity resilience: A guide for ANZ businesses
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
-
CIO Trends #8
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.
-
The journey to digital healthcare
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at how the NHS shared care records projects are progressing, and the European Commission's plans to share health data across borders. We also look at how one NHS trust has created a social media platform to help mental health service users, and examine Scotland's digital health and care strategy.
-
Computer Weekly – 22 May 2018: GDPR is here – are you ready?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the EU's new GDPR rules come into force this week – we ask if companies are ready and look at what happens if you're not compliant. Our latest buyer's guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now.
-
Focus: Health IT
Sponsored by: TechTarget ComputerWeekly.comAt a time when the NHS is faced with unprecedented pressure, new technological solutions can help ease some of the strain. From apps to electronic records and artificial intelligence, technology is playing an increasingly important part in transforming the health service.
-
CW EMEA - May 2023: The future of work
Sponsored by: TechTarget ComputerWeekly.comIn this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
-
Improving Revenue and Population Health: New Strategies for Health IT
Sponsored by: MedfusionOrlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
-
HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
Sponsored by: OstendioGet insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
-
A Guide to Navigating the Modern Health IT Infrastructure
Sponsored by: Cisco UmbrellaRansomware is one of the most common attacks used to hold data hostage, especially in healthcare, and that helped increase the use of digital currencies like Bitcoin. In this e-guide, learn how to defend against threats like ransomware and cryptojacking and how deception technology can help.
-
Deploy Healthcare Cybersecurity Tools to Protect Vital Data
Sponsored by: TechTarget Health ITHealth IT buyers need security tools to protect against potentially devastating cyberattacks. Compare the leading products and learn about what they each can offer.
-
CIO Trends #8
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, take a look at some of our most popular articles on issues faced by IT decision makers, such as how to create a strategy that works for the business in a digital age and tips on how to take advantage of opportunities to lead your organization to unprecedented success.
-
The Emergence of Digital Transformation in Healthcare
Sponsored by: ServiceNowDownload this e-guide to learn why technology isn't infallible for patients and healthcare organizations and has the potential to change the healthcare industry for the better.
-
Strengthen Health IT Security, Maintain HIPAA Compliance
Sponsored by: PatientKeeperDownload this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
-
Complete Guide to Cloud Security in Health IT
Sponsored by: VirtustreamIn this e-guide, uncover 4 ways that cloud service providers offer advanced protection. You'll also learn about the benefits and drawbacks of considering a cloud-based EHR system.
-
Healthcare Security: How You Can Ward Off Insider Threats
Sponsored by: Cisco UmbrellaOne of the greatest healthcare security threats comes from users within an organization. In this expert handbook, John Nye shares recommendations for technologies that healthcare organizations can use to fight against insider security threats.
-
Healthcare Cloud Concerns: What is Holding up Adoption?
Sponsored by: VirtustreamInside this expert guide, you'll learn about 5 common concerns of cloud services in healthcare, how to tackle the concern, and the well-known benefits of using the cloud.
-
SAP Cloud Platform pushes to break new ground, extend ERP
Sponsored by: TechTarget Health ITSAP Cloud Platform is the key technology in SAP's plan to drive digital transformation by linking legacy applications and data with next-generation technology.