Healthcare Information Security

Data Security Resources

Supporting Clinician Mobility and Ensuring Data Security

Clinicians enjoy the ease of use their mobile devices afford them to access and use relevant health data at the point of care as well as coordinate care with other members of the care team. To support mobile preferences of clinicians, healthcare... View webcast

10 Minute Guide: Healthcare Ransomware Protection

Ransomware can be stopped dead in its tracks with the proper preparation. While most companies have some type of backup or DR plan, the news tells us that many are regrettably learning too late just how unprepared they are to recover from cyberattacks... Download white paper

Best Practices for Dealing With Phishing and Ransomware

Phishing and ransomware are serious problems that can steal data or disable access to your organization’s network. Both ransomware and phishing are increasingly common and are having devastating impacts on businesses of all sizes. The FBI... Download white paper

[Crash Course]: 5 Steps to Protect PHI and Pass HIPAA with Less Effort

Analytics have named 2017 “the year of the healthcare breach” — which is exactly what they called 2016. As the threats continue to grow, you need strategies for protecting your organization. In this hands-on session, experts... View webcast

Securing Health IT Infrastructure to Avoid the Breach

Healthcare providers and their patients are increasingly becoming a target of cyberattacks. A recent Accenture survey found that 26 percent of consumers had their personal medical information stolen, with half of those cases leading to identity... View webcast

Enhancing Security With SQL Server 2016: How to balance the risks and rewards of using big data

With big data comes both great reward and risk. Every company needs to secure and manage internal and customer data while also realizing its benefits and opportunities. No matter the size of the business, security professionals are challenged... Download white paper

Case Study: When Health is at Stake: Disaster Recovery for Epic with Zerto Virtual Replication

The Yakima Valley Farm Workers Clinic (YVFWC) re-architected their electronic health records system in 2014. The team deployed Epic to handle medical records and behavioral health. The system is significant because it is the application that... Download white paper

Compliance Does Not Equal Security: 3 Emerging Security Themes in Healthcare

Ninety-six percent of industry IT security experts feel vulnerable to a data breach, and 63 percent report having suffered one. Despite these concerns, 69 percent feel that meeting compliance requirements is “very” or “extremely”... Download white paper

Remote Locations put Health Information at Risk: 4 Ways to Improve Security

Data breaches not only compromise the confidentiality of protected health information, they can also adversely affect the continuity of care, impacting patients’ lives. As healthcare organizations incorporate more virtual care tools that... Download white paper

Data Breach Incident Response Workbook

The consequences of data breaches are higher than ever, and are no longer limited to the privacy department – accountability has moved to C-level executives and board members. Greater consequences mean that businesses need to be prepared... Download white paper

Lean Healthcare Information Services: Oh, Say, Can You See?

You can't eliminate what you can't see, so when it comes to adopting Lean methodology in information services organizations, visibility is obviously a key factor. In this white paper, former healthcare CIO Drex DeFord offers a first-hand... Download white paper

Preventing the Next Generation of Healthcare Security Attacks

Today we are faced with a high-threat world, where cybercriminals are constantly targeting healthcare organizations. And as attackers grow more sophisticated in their methodologies, your security strategies and defenses must grow more sophisticated... View webcast

Your Security Strategy Should Revolve Around Customers, Not Technology

Technology is a key component of any security strategy, but even the best tech will not prevent a data breach. A new report from Forrester Research advises building a risk management framework that that keeps organizations secure, while also... Download white paper

Is Your Team Prepared for a Data Breach?

As data breaches increase in scale and frequency, businesses must prepare today to ensure an effective, high-quality, and swift response. Consumers, regulators, and the media want a well-orchestrated response launched just days after a data breach,... Download white paper

Find Out the Trust Cost of a Data Breach – and How to Prepare

There’s no doubt the cyber threat landscape is vast and complex. These days, it’s not a question of whether a company will experience a data breach – it’s when and how extensive. Understanding the true cost of a breach... Download white paper

Focus on Human Nature to Respond More Effectively During a Breach

To execute an effective breach response, organizations must consider the significant role that human emotions can play during a crisis. The most thorough preparation pre-breach won’t matter if your response team is derailed by emotions... Download white paper

Get Your Ransomware Hostage Rescue Manual

In the last five years, cybercrime has gone pro. Healthcare has increasingly become a lucrative target for ransomware cybercrime placing more pressure on IT to keep networks secure.  Get the most informative and complete Ransomware... Download white paper

Why Data Awareness and Protection Matters More Than Ever to Healthcare

The threat of data attacks, implementation of new technologies and the continuing need to provide value to patients have imposed significant security risks on healthcare organizations, infrastructures, IT and the day to day activities of... View webcast

Where Does VDI Fit into the Healthcare Organization?

Virtual desktop infrastructure (VDI) has become an increasingly popular option for healthcare organizations as a way to create a secure and viable health information environment.  View this on demand webcast and learn some of the finer points... View webcast

Case Study: McKesson Makes Application Hosting for Hospitals Faster, More Efficient

McKesson Managed Services deployed ExtraHop to improve its ability to deliver hosted applications to hospitals. This case study will guide viewers through McKesson’s process of adopting a more proactive IT operations model, outlining their:... Download white paper