Health Care Security Research
-
Preventing Ransomware Threats to Health Data in 10 Steps
Sponsored by: Cisco UmbrellaHealth data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
-
How Healthcare Organizations are Tackling IoT Device Management
Sponsored by: Cisco UmbrellaConnected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
-
Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
Sponsored by: OptumIn this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
-
Former Healthcare CIO Talks Cybersecurity in Healthcare
Sponsored by: OptumGary Seay, former vice president and CIO of Community Health Systems, was one of the earliest victims of a healthcare data breach back in 2014. In this e-guide, Seay shares what he believes every healthcare organization should do to ward off cyberattacks and shares specific technologies involved in maintaining cybersecurity for healthcare.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
How to guard secure data
Sponsored by: OptumIT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
-
BYOD and mHealth: Navigating Security and HIPAA
Sponsored by: OptumBYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
-
Security Tips for HIPAA-Compliant Cloud Storage and Texting
Sponsored by: OptumUnderstanding the rules of HIPAA is only the first step. But then, you must ensure your practices – and your vendors – are compliant. Access this e-guide to gain tips and criteria for evaluating cloud storage vendors and texting systems for sensitive healthcare information.
-
How to Prevent Healthcare Cybersecurity Attacks
Sponsored by: ServiceNowIn this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
-
Healthcare Cybersecurity Best Practices
Sponsored by: ServiceNowIn this expert e-guide, find out what CIOs attending HIMSS 2016 had to say on how to best identify and protect against healthcare cybersecurity vulnerabilities. Plus, learn why one CIO believes network monitoring is the key to cybersecurity in healthcare.
-
What Healthcare Executives Must Know About Data Breaches
Sponsored by: CoalfireBYOD and complex medical devices are forcing CIOs and IT departments to update their data security protocols to avoid violating HIPAA, patient privacy, and more. Explore the vulnerabilities created by this influx of devices, and dig into data on past healthcare data breaches so that you can prevent repeat scenarios.
-
Virtualization Making a Real Impression on Health IT
Sponsored by: TechTarget Health ITIn this handbook, our health IT experts closely examine the benefits of virtual desktop infrastructures in healthcare. Access now for advice on you can avoid the common virtualization installation traps, plus 5 reasons you should consider desktop virtualization for your healthcare organization.
-
Security Challenges in Healthcare Social Media Usage
Sponsored by: ActianceIn this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
-
Optimize Patient Documentation with Enterprise Content Management
Sponsored by: ActianceIn this e-guide, healthcare industry expert Reda Chouffani discusses how to enhance patient documentation with an enterprise content management platform. Discover a platform that offers features like: customization, advanced workflow functions, security and HIPAA compliance, and more.
-
How to Keep Cloud Services Compliant with HIPAA Standards
Sponsored by: ActianceIn this expert e-guide, health IT consultant Reda Chouffani explores how your healthcare organization can keep cloud services compliant with HIPAA standards.
-
Protecting Patient Data in the Mobile Era
Sponsored by: TechTarget Health ITThe rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
-
Get the Message: Why Secure Texting in Healthcare Matters
Sponsored by: TechTarget Health ITTexting is convenient -- but HIPAA regulations require organizations to consider the security of PHI. Get tips for instituting secure texting in healthcare.
-
Learn the new definition of Revenue Cycle Management and what it means to you
Sponsored by: TechTarget Health ITTechnology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.
-
Futureproofing Workflows
Sponsored by: McKesson CorporationThis whitepaper considers essential tips when it comes to preparing your existing infrastructure for future additions or changes. Access now to ensure your healthcare IT department is ready and able to handle shifts with ease.
-
Healthcare Data Security Challenges in a Mobile World
Sponsored by: TechTarget Health ITMobile devices are increasingly becoming a part of the health IT landscape. In this three-part handbook, SearchHealthIT's writers explore what that means for data protection, HIPAA compliance and more.
-
What to Look for in a Vendor Neutral Archive
Sponsored by: TechTarget Health ITExplore 13 essential considerations your organization should keep in mind before purchasing a VNA. With the advice in this buyer's guide, you will be in a better position to evaluate VNA vendors and determine which products are best for your organization.
-
Providers Aim to Keep Mobile Security on Track
Sponsored by: TechTarget Health ITIn this issue of Pulse e-zine, explore the challenges health IT pros face when deploying mobile healthcare applications, and how you can protect patient data while still practicing mHealth.
-
Healthcare Cloud Is Rolling In
Sponsored by: TechTarget Health ITCan cloud services be trusted to protect sensitive healthcare data? For some, it's the top barrier to adoption. This three-part guide examines how much – and how effectively – healthcare organizations are venturing into the cloud.
-
Pulse E-zine: Vol. 3, No. 1
Sponsored by: TechTarget Health ITReady or not, HIPAA audits are about to strike. The first formal round will hit approximately 400 healthcare providers in 2015. In this issue of Pulse, prepare to survive your first audit, discover where security risks stem from, learn why migration planning is critical for EHR data migrations, and more.
-
Addressing Changes in the Healthcare IT Environment
Sponsored by: DellDiscover how cloud client computing solutions supported by VDI can help your organization tackle healthcare challenges.