ComputerWeekly.com Research Library

Powered by Bitpipe.com

HIPAA Compliance White Papers

  • Strengthen Health IT Security, Maintain HIPAA Compliance

    Sponsored by: PatientKeeper

    Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.

  • Get Smart About Cloud Storage and HIPAA

    Sponsored by: TechTarget Health IT

    This handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.

  • Get Smart About Cloud Storage and HIPAA

    Sponsored by: TechTarget Health IT

    HIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.

  • How Healthcare Organizations are Tackling IoT Device Management

    Sponsored by: Cisco Umbrella

    Connected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.

  • Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security

    Sponsored by: Optum

    In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • How to guard secure data

    Sponsored by: Optum

    IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.

  • How to Prevent Healthcare Cybersecurity Attacks

    Sponsored by: ServiceNow

    In this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.

  • Protecting Patient Data in the Mobile Era

    Sponsored by: TechTarget Health IT

    The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.

  • Learn the new definition of Revenue Cycle Management and what it means to you

    Sponsored by: TechTarget Health IT

    Technology advancements and the ICD-10 transition have expanded the scope of revenue cycle management, challenging IT to keep up. Find tips on decreasing revenue risk, strengthening your revenue cycle strategy and more, in our expert handbook.

  • Addressing HIPAA privacy compliance on hospital wireless networks

    Sponsored by: Absolute

    In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.

  • The HIPAA Omnibus Effect on Data Security, Business Associates

    Sponsored by: TechTarget Health IT

    Under the HIPAA omnibus rule, business associates and healthcare providers face increased liability over data security -- requiring changes to health IT operations.

  • Lake Health Enhances Patient Experience with HP ArcSight

    Sponsored by: Hewlett Packard Enterprise

    Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!

  • Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals

    Sponsored by: TigerText, Inc.

    This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.

  • Simplify implementation of the HITRUST Common Security Framework

    Sponsored by: Symantec Corporation

    Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.

  • Industry Perspectives: The Impact of HIPAA and HITECH

    Sponsored by: Symantec Corporation

    This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.

  • Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act

    Sponsored by: Absolute

    This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.

  • October 2013 Health IT E-Zine

    Sponsored by: TechTarget Health IT

    In this issue of Pulse, readers will get the latest pros and cons of signal extension systems like distributed antenna systems and femtocells and best practices for implementing technologies to support 2014's health IT initiatives and big data projects.

  • Handbook: Medical Image Archiving

    Sponsored by: TechTarget Health IT

    As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.

  • Strategies for Writing a HIPAA-friendly BYOD Policy

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com provides expert advice for modeling a HIPAA-friendly BYOD policy. Read now for expert tips and advice on how you can manage consumer devices in your hospital.

  • Selecting the right EHR for the Life of your Practice and Your Patients

    Sponsored by: HP & Intel®

    If we are at or approaching a technological tipping point in the history of healthcare, then it has never been more important for physician practices to select the right electronic health record (EHR) – and there are tangible reasons to believe so. This white paper discusses criteria for selecting the right EHR solution.

  • Managing the Explosion of Medical Data

    Sponsored by: HP & Intel®

    This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.

  • EHR Usability Testing Key to Clinician Buy-In, Meaningful Use

    Sponsored by: HP & Intel®

    This e-guide from SearchHealthIT.com demonstrates how EHR usability testing can function as a key ingredient to clinician buy-in and meaningful use. Read now to learn how usability testing can help with a quicker return on your EHR investment.

  • How to Comply with the HIPAA Security Rule

    Sponsored by: Thawte Inc.

    In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications.

  • Using EHRs to Achieve Meaningful Use

    Sponsored by: TechTarget Health IT

    As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.