ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Research

  • Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences

    Sponsored by: DivvyCloud

    In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.

  • Achieving HIPAA Compliance with Alcide Kubernetes Security

    Sponsored by: Alcide

    The need better security patient PHI in the US led to the inception of HIPAA. The following white paper outlines the key objectives of HIPAA, the challenges of achieving compliance in cloud-native environments, and how to ensure intersectional PHI security between HIPAA and the NIST Cybersecurity Framework.

  • Hunt for Data Protection Ends with Encryptionizer®

    Sponsored by: NetLib Security

    In this case study, discover how a medical device manufacturer (MDM) was able to address the risks targeting their patient data and overcome internal challenges related to protecting PHI, encrypting devices and ensuring compliance with increasingly stringent regulations.

  • Capsule8 For HIPAA Compliance

    Sponsored by: Capsule8

    It’s crucial for healthcare providers to have reliable security controls in place to protect their patient’s data. Tap into this white paper to learn about key capabilities of Capsule8 Protect and how it can help you meet HIPAA compliance on your Linux based ePHI environment.

  • Beginners Guide – Securing Legacy Devices

    Sponsored by: NetLib Security

    Medical devices often have lifespans averaging around 15 years. However, these aging devices are still required to meet the data protection benchmarks outlined by HIPAA. This article overviews how organizations with legacy devices can ensure data protection and meet compliance requirements. Read on to learn more.

  • InfoSec Risk Management in Healthcare Environments a Primer to Assessing Technical Risk

    Sponsored by: CI Security

    In some healthcare organizations, risk assessment and risk management as it relates to cybersecurity are a bit of a mystery. In this white paper, learn how to assess your IT security risks.

  • Achieving HIPAA Compliance

    Sponsored by: Absolute Software Corporation

    Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.

  • Meeting Compliance Requirements with GoAnywhere

    Sponsored by: Help/Systems

    In this on-demand webinar, you will find everything you need to know from the basics of compliance, non-compliance costs, penalties, and fines of several regulations such as PCI DSS, GDPR, HIPAA, FISMA, and more. View now to see how GoAnywhere Security Managed File Transfer can help.

  • Zoom Customer Testimonial: Moffitt Cancer Center

    Sponsored by: Zoom Video Communications

    Moffitt Cancer Center’s mission is simple: contribute to the prevention and cure of cancer. Whether it’s Zoom Meetings or Zoom Rooms or Zoom-enabled operating rooms, Moffitt uses Zoom as its communications backbone to enable doctors, nurses, specialists, and labs to easily collaborate. Watch this short video to learn more.

  • Big Data Analytics - Security and Compliance Challenges in 2019

    Sponsored by: Comforte AG

    There are an increasing number of people, devices and sensors that generate, communicate and share data via the internet. However, there are security and compliance concerns about the way that the data is being used. In this white paper, explore the challenges of using big data in ways that are secure, compliant and ethical.

  • HIPAA Compliance Checklist: The Key to Staying Compliant in 2020

    Sponsored by: Ostendio

    Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.

  • Strengthen Health IT Security, Maintain HIPAA Compliance

    Sponsored by: PatientKeeper

    Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.

  • The Perfect Rx for HIPAA Compliance

    Sponsored by: AT&T Cybersecurity

    Complying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.

  • When Cyberthieves Attack, Technologies Have Your Back

    Sponsored by: SearchHealthIT.com

    Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.

  • Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response

    Sponsored by: Xerox

    In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.

  • Get Smart About Cloud Storage and HIPAA

    Sponsored by: SearchHealthIT.com

    This handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.

  • Get Smart About Cloud Storage and HIPAA

    Sponsored by: SearchHealthIT.com

    HIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.

  • Technology, Training Team Up to Defend Endpoint Security

    Sponsored by: SearchHealthIT.com

    At many healthcare organizations, endpoint devices can become areas for cybercriminals to exploit. In this handbook, learn how you can improve endpoint security through expert tips from the field, including advice from one hospital CIO on preventing HIPAA breaches with stronger endpoint security.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • Improving Revenue and Population Health: New Strategies for Health IT

    Sponsored by: Medfusion

    Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.

  • Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security

    Sponsored by: Optum

    In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • How to guard secure data

    Sponsored by: Optum

    IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.

  • BYOD and mHealth: Navigating Security and HIPAA

    Sponsored by: Optum

    BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.

  • How to Prevent Healthcare Cybersecurity Attacks

    Sponsored by: ServiceNow

    In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.

Browse by Report Type: HIPAA White Papers | HIPAA Multimedia | HIPAA IT Downloads

See more topics related to: HIPAA

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.