ComputerWeekly.com Research Library

Powered by Bitpipe.com

Health Care Security Research

  • Preventing Ransomware Threats to Health Data in 10 Steps

    Sponsored by: Cisco Umbrella

    Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security

    Sponsored by: Optum

    In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.

  • Former Healthcare CIO Talks Cybersecurity in Healthcare

    Sponsored by: Optum

    Gary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • How to guard secure data

    Sponsored by: Optum

    IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.

  • Security Tips for HIPAA-Compliant Cloud Storage and Texting

    Sponsored by: Optum

    Understanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.

  • How to Prevent Healthcare Cybersecurity Attacks

    Sponsored by: ServiceNow

    In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.

  • Healthcare Cybersecurity Best Practices

    Sponsored by: ServiceNow

    In this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.

  • What Healthcare Executives Must Know About Data Breaches

    Sponsored by: Coalfire

    BYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.

  • Virtualization Making a Real Impression on Health IT

    Sponsored by: TechTarget Health IT

    In this handbook, our health IT experts closely examine the benefits of virtual desktop infrastructures in healthcare. Access now for advice on you can avoid the common virtualization installation traps, plus 5 reasons you should consider desktop virtualization for your healthcare organization.

  • Security Challenges in Healthcare Social Media Usage

    Sponsored by: Actiance

    In this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.

  • Optimize Patient Documentation with Enterprise Content Management

    Sponsored by: Actiance

    In this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.

  • How to Keep Cloud Services Compliant with HIPAA Standards

    Sponsored by: Actiance

    In this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.

  • Protecting Patient Data in the Mobile Era

    Sponsored by: TechTarget Health IT

    The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.

  • Get the Message: Why Secure Texting in Healthcare Matters

    Sponsored by: TechTarget Health IT

    Texting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.

  • Learn the new definition of Revenue Cycle Management and what it means to you

    Sponsored by: TechTarget Health IT

    Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.

  • Futureproofing Workflows

    Sponsored by: McKesson Corporation

    This whitepaper considers essential tips when it comes to preparing your existing infrastructure for future additions or changes. Access now to ensure your healthcare IT department is ready and able to handle shifts with ease.

  • Healthcare Data Security Challenges in a Mobile World

    Sponsored by: TechTarget Health IT

    Mobile devices are increasingly becoming a part of the health IT landscape. In this three-part handbook, SearchHealthIT's writers explore what that means for data protection, HIPAA compliance and more.

  • What to Look for in a Vendor Neutral Archive

    Sponsored by: TechTarget Health IT

    Explore 13 essential considerations your organization should keep in mind before purchasing a VNA. With the advice in this buyer's guide, you will be in a better position to evaluate VNA vendors and determine which products are best for your organization.

  • Providers Aim to Keep Mobile Security on Track

    Sponsored by: TechTarget Health IT

    In this issue of Pulse e-zine, explore the challenges health IT pros face when deploying mobile healthcare applications, and how you can protect patient data while still practicing mHealth.

  • Healthcare Cloud Is Rolling In

    Sponsored by: TechTarget Health IT

    Can cloud services be trusted to protect sensitive healthcare data? For some, it's the top barrier to adoption. This three-part guide examines how much – and how effectively – healthcare organizations are venturing into the cloud.

  • Pulse E-zine: Vol. 3, No. 1

    Sponsored by: TechTarget Health IT

    Ready or not, HIPAA audits are about to strike. The first formal round will hit approximately 400 healthcare providers in 2015. In this issue of Pulse, prepare to survive your first audit, discover where security risks stem from, learn why migration planning is critical for EHR data migrations, and more.

  • Addressing Changes in the Healthcare IT Environment

    Sponsored by: Dell

    Discover how cloud client computing solutions supported by VDI can help your organization tackle healthcare challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.