HealthITSecurity.com > Health IT Security White Papers

Health IT Security White Papers

Health IT Security, HIPAA, Health Information Exchange Security White Papers

In this webcast, Director of IT and HIPAA Security Officer, Michael Archuleta, from Mt. San Rafael Hospital discusses the following topics: How healthcare security measures more »

Risk analysis…..risk assessment…..compliance assessment. Are these concepts as confusing to you as they are for most IT professionals? The answer could differ based on a specific more »

Organizations are at a crossroads when deciding on the proper course of action for compliance with regulations applicable to the healthcare industry and how to more »

Michigan Health Information Network (MiHIN) has had tremendous success in connecting not only healthcare organizations and providers in the state but also payers and regional more »

Beyond simply protecting the privacy of individuals, there is also a compelling business case for de-identification.  In this white paper, we present this case by more »

We live in a world today where our personal information is continuously being captured in a multitude of electronic databases. Details about our health, financial more »

The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The more »

As applications and threats continue to evolve, it becomes increasingly difficult for some organizations to secure their networks without getting in the way of their more »

With all of the renewed attention, potentially shifting priorities, media and political activity surrounding cybersecurity, it is important for enterprises not to lose sight of the more »

This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best more »

The application and threat patterns discussed within this report place an appropriate emphasis on the need to continually detect and assess the applications traversing your more »

When increasing complexity limits or slows the decision making process, it’s almost always helpful to “Focus on the fundamentals” as a means of addressing the more »

While advancements such as mobility are available, many healthcare organizations struggle to adopt, integrate and benefit from this technology. In this presentation you will learn more »

Michael Frederick, Vice President of Assurance Services & Product Development at HITRUST, provides an overview during this webcast of the HITRUST Common Security Framework (CSF). more »

HIPAA regulations have undergone major changes in the last few years, giving both the federal and state Governments new powers and enhanced resources to pursue more »

The question is not whether healthcare consumers will ultimately get the right to learn of disclosures of their data, but when. Senior IT leaders and more »

Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and protected health information (PHI), security and more »

Phil Alexander, Information Security Officer at UMC Health System, explains in this webcast the best ways in which organizations can strengthen their security programs on more »

Learn how healthcare organizations can balance the need for extended care teams to have rapid access to complete patient information with the need to safeguard more »

Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children’s accelerated Citrix launch times more »

McKesson Managed Services deployed ExtraHop to improve its ability to deliver hosted applications to hospitals. With ExtraHop, McKesson identified the root cause of slow Citrix more »

Learn all key aspects of a solution including technical requirements, key functionality concerns, and how to determine a vendor’s proven success record with case studies more »

With the recent changes to the HIPAA Omnibus Rule, organizations and their business associates must address how they’re compliant and what changes to make to more »

The rise of mobile devices in the workplace, specifically healthcare facilities, has forced providers to look for ways to utilize mobile technology to increase efficiency, more »

Text messaging via mobile devices has become a general means of communication within our culture and workplace. However, traditional text messaging methods have severe security limitations more »

12»
HealthITSecurity
x

Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

  • HIPAA
  • BYOD
  • Data Security
  • VDI
  • Cloud Security

no, thanks

Our privacy policy