• HealthITSecurity.com > Health IT Security White Papers

    Health IT Security White Papers

    Health IT Security, HIPAA, Health Information Exchange Security White Papers

    Michigan Health Information Network (MiHIN) has had tremendous success in connecting not only healthcare organizations and providers in the state but also payers and regional more »

    Beyond simply protecting the privacy of individuals, there is also a compelling business case for de-identification.  In this white paper, we present this case by more »

    We live in a world today where our personal information is continuously being captured in a multitude of electronic databases. Details about our health, financial more »

    The continued, high frequency of successful cyberattacks against today’s enterprises has made it abundantly clear that traditional, perimeter-centric security strategies are no longer effective. The more »

    As applications and threats continue to evolve, it becomes increasingly difficult for some organizations to secure their networks without getting in the way of their more »

    With all of the renewed attention, potentially shifting priorities, media and political activity surrounding cybersecurity, it is important for enterprises not to lose sight of the more »

    This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best more »

    The application and threat patterns discussed within this report place an appropriate emphasis on the need to continually detect and assess the applications traversing your more »

    When increasing complexity limits or slows the decision making process, it’s almost always helpful to “Focus on the fundamentals” as a means of addressing the more »

    While advancements such as mobility are available, many healthcare organizations struggle to adopt, integrate and benefit from this technology. In this presentation you will learn more »

    Michael Frederick, Vice President of Assurance Services & Product Development at HITRUST, provides an overview during this webcast of the HITRUST Common Security Framework (CSF). more »

    HIPAA regulations have undergone major changes in the last few years, giving both the federal and state Governments new powers and enhanced resources to pursue more »

    The question is not whether healthcare consumers will ultimately get the right to learn of disclosures of their data, but when. Senior IT leaders and more »

    Amid a rising tide of compliance pressures, employee mobility, and high black-market values for personally identifiable information (PII) and protected health information (PHI), security and more »

    There’s a lot of buzz about the power of big data to transform healthcare, but many healthcare delivery organizations expect their path to fully aligning more »

    Phil Alexander, Information Security Officer at UMC Health System, explains in this webcast the best ways in which organizations can strengthen their security programs on more »

    Learn how healthcare organizations can balance the need for extended care teams to have rapid access to complete patient information with the need to safeguard more »

    Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. With ExtraHop, the IT team at Seattle Children’s accelerated Citrix launch times more »

    McKesson Managed Services deployed ExtraHop to improve its ability to deliver hosted applications to hospitals. With ExtraHop, McKesson identified the root cause of slow Citrix more »

    Learn all key aspects of a solution including technical requirements, key functionality concerns, and how to determine a vendor’s proven success record with case studies more »

    With the recent changes to the HIPAA Omnibus Rule, organizations and their business associates must address how they’re compliant and what changes to make to more »

    The rise of mobile devices in the workplace, specifically healthcare facilities, has forced providers to look for ways to utilize mobile technology to increase efficiency, more »

    Text messaging via mobile devices has become a general means of communication within our culture and workplace. However, traditional text messaging methods have severe security limitations more »

    Evaluating Secure Text Messaging solutions can cause anyone’s eyes to glaze over in dreaded anticipation. But the process doesn’t have to be laborious, overwhelming, or more »

    Whether your organization has been compliant with the HIPAA Omnibus Rule for months or it’s still shoring up some compliance gaps, there are likely tips more »

    12»

    Sign up for our free HealthITSecurity.com newsletter and stay up to date with tips and advice on:

    • HIPAA
    • BYOD
    • Data Security
    • VDI
    • Cloud Security

    no, thanks

    Our privacy policy