Health IT Security White Papers

Health IT Security White Papers

Health IT Security, HIPAA, Health Information Exchange Security White Papers

Our world has been radically transformed by digital technology – smart phones, tablets, and web-enabled devices have altered our daily lives and the way we more »

Clinicians demand instant, convenient and simple ways to access patient records, prescribe medicine or dictate notes as they roam across locations, devices and networks. How more »

EHR technology has an important role to play in supporting the work of health systems, hospitals, and physician practices toward meeting their goals.This presentation provides more »

The complex notion of interoperability is challenging healthcare organizations across the U.S. as they strive to comply with government mandates and improve patient care. In more »

There is a burgeoning need to collaborate quickly and efficiently within the healthcare industry. Yet unlike in many industries, healthcare data shared among and between more »

Today’s changing healthcare IT environments are generating a greater demand for data and process integration. This trend has led to the introduction of a new more »

Learn more about how clinicians at South Shore Hospital are saving 583 staff-hours per day with Imprivata OneSign® Single Sign-On. Imprivata OneSign is helping to more »

In 2010, the Federal Drug Enforcement Administration (DEA) published an interim final rule as to what vendors and healthcare organizations need to do to support more »

On September 23, 2013, new rules were implemented to ensure that healthcare organizations, as well as their business associates and subcontractors, are compliant with HIPAA more »

IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and more »

Rhode Island Blood Center had no asset tracking on their latptops and began to worry about what would happen if a laptop, and the confidnetial more »

This guide will review how organizations can best approach internal communications and adhere to federal privacy and security requirements, such as HIPAA. Read how organizations are using more »

This infographic outlines how secure messaging is used within a healthcare organization as well as layout the benefits. Download the Infographic

While there are many ways to communicate within a healthcare facility, specific communication technology choices can have a real impact on an organization’s workflow. In many more »

This paper offers guidance for healthcare organizations that are planning for or evaluating their options for ePrescribing for controlled substances. Much of this information is dependent more »

If deployed properly, the right single sign-on (SSO) and strong authentication solution can replace forcing end users to manually enter their names and passwords many times more »

In this webcast, Director of IT and HIPAA Security Officer, Michael Archuleta, from Mt. San Rafael Hospital discusses the following topics: How healthcare security measures more »

Michigan Health Information Network (MiHIN) has had tremendous success in connecting not only healthcare organizations and providers in the state but also payers and regional more »

Beyond simply protecting the privacy of individuals, there is also a compelling business case for de-identification.  In this white paper, we present this case by more »

We live in a world today where our personal information is continuously being captured in a multitude of electronic databases. Details about our health, financial more »

The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The more »

As applications and threats continue to evolve, it becomes increasingly difficult for some organizations to secure their networks without getting in the way of their more »

With all of the renewed attention, potentially shifting priorities, media and political activity surrounding cybersecurity, it is important for enterprises not to lose sight of the more »

This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best more »

The application and threat patterns discussed within this report place an appropriate emphasis on the need to continually detect and assess the applications traversing your more »

  • Featured Resource