HIPAA White Papers
-
Improving Revenue and Population Health: New Strategies for Health IT
Sponsored by: MedfusionOrlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
-
HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
Sponsored by: OstendioGet insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
-
Strengthen Health IT Security, Maintain HIPAA Compliance
Sponsored by: PatientKeeperDownload this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
-
The Perfect Rx for HIPAA Compliance
Sponsored by: AT&T CybersecurityComplying with HIPAA's Security Rule and demonstrating that security controls are in place and working is no easy task. Explore this white paper to gain a deeper understanding of how to comply with HIPAA and ensure your healthcare organization is secure.
-
When Cyberthieves Attack, Technologies Have Your Back
Sponsored by: TechTarget Health ITAccess this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
-
Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
Sponsored by: XeroxIn early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
-
Get Smart About Cloud Storage and HIPAA
Sponsored by: TechTarget Health ITThis handbook examines cloud storage and backup technology in relation to HIPAA compliance. Learn how business associates and covered entities are preparing for HIPAA audits, how health systems use the cloud for backup storage purposes and DR efforts, and how moving healthcare data into the cloud has changed other aspects of providers' businesses.
-
Get Smart About Cloud Storage and HIPAA
Sponsored by: TechTarget Health ITHIPAA-compliant cloud storage and backup require healthcare organizations to conduct risk assessments of the potential uses of cloud technology.
-
Technology, Training Team Up to Defend Endpoint Security
Sponsored by: TechTarget Health ITAt many healthcare organizations, endpoint devices can become areas for cybercriminals to exploit. In this handbook, learn how you can improve endpoint security through expert tips from the field, including advice from one hospital CIO on preventing HIPAA breaches with stronger endpoint security.
-
How Healthcare Organizations are Tackling IoT Device Management
Sponsored by: Cisco UmbrellaConnected medical devices are becoming more widespread in healthcare, but security and management options are limited for IT teams. This e-guide will teach you how to devise a plan to secure each device from surface attacks and cyberthreats. Plus, see how several vendors are tackling this problem and offering tools to keep patient data safe.
-
Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
Sponsored by: OptumIn this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
-
Healthcare CIOs Address Cybersecurity Vulnerabilities
Sponsored by: OptumAs breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.
-
How to guard secure data
Sponsored by: OptumIT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
-
BYOD and mHealth: Navigating Security and HIPAA
Sponsored by: OptumBYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
-
How to Prevent Healthcare Cybersecurity Attacks
Sponsored by: ServiceNowIn this e-guide, we chat with the former CIO of Community Health Systems as he discusses how to prevent healthcare cyberattacks and lessons learned during his career. Uncover best practices on maintaining proper healthcare security.
-
Protecting Patient Data in the Mobile Era
Sponsored by: TechTarget Health ITThe rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
-
Pulse E-zine: Vol. 3, No. 2
Sponsored by: TechTarget Health ITWhile the health IT spotlight shifts to the release of stage 3 meaningful use guidelines, many providers are still struggling with stage 2 reporting. In this issue of Pulse, learn what's next for meaningful use, how it has affected EHRs, and how to align an analytics plan with the needs of your organization.
-
Five Steps to Meaningful Use with Workspace Virtualization
Sponsored by: RES SoftwareHealthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
-
Addressing HIPAA privacy compliance on hospital wireless networks
Sponsored by: AbsoluteIn this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
-
The HIPAA Omnibus Effect on Data Security, Business Associates
Sponsored by: TechTarget Health ITUnder the HIPAA omnibus rule, business associates and healthcare providers face increased liability over data security -- requiring changes to health IT operations.
-
Voltage Success Story: Envision Pharmaceutical Services
Sponsored by: Voltage Security, Inc.This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI)
Sponsored by: Voltage Security, Inc.This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
Pulse E-zine: Vol. 2, No. 2
Sponsored by: TechTarget Health ITAccess this edition of Pulse e-zine to explore the evolving mobile healthcare trend, and learn how to stay compliant for the dreaded unannounced HIPAA audits.
-
Secure Text Messaging Saves Time and Fosters HIPAA Compliance for Hospitals
Sponsored by: TigerText, Inc.This e-guide from SearchHealthIT.com offers 12 expert tips on how to evaluate vendors for a secure, HIPAA-compliant text messaging system.