Healthcare Information Security

IT Security Resources

What Every Healthcare Executive Needs to Know About Identity and Access Management (IAM)

Economic and regulatory challenges are affecting how providers and payers are able to care for patients. New technologies are critical to enabling the transition from transactional care to long-term patient relationships; however, on-boarding... View webcast

Supporting Clinician Mobility and Ensuring Data Security

Clinicians enjoy the ease of use their mobile devices afford them to access and use relevant health data at the point of care as well as coordinate care with other members of the care team. To support mobile preferences of clinicians, healthcare... View webcast

Study Results: Email Vulnerability in Healthcare

In a recent study to understand Dark Web email vulnerabilities, Evolve IP and ID Agent reviewed over 1,000 healthcare industry organizations. The findings? 68% of all analyzed covered entities and their business associates have employees with... Download white paper

10 Minute Guide: Healthcare Ransomware Protection

Ransomware can be stopped dead in its tracks with the proper preparation. While most companies have some type of backup or DR plan, the news tells us that many are regrettably learning too late just how unprepared they are to recover from cyberattacks... Download white paper

Eliminating the Pain of Epic Upgrade Testing

Solution Brief: Epic Systems, one of the leading healthcare IT systems providers, is always looking to keep their product up to date as they adapt it to the ongoing changes in the healthcare industry. This means a rigorous upgrade cycle process... Download white paper

Case Study: Protecting Consumer Well-Being with the Always-On Infrastructure

Trillium Health Resources is a local governmental agency (LME/MCO) that manages mental health, substance use and intellectual/developmental disability services in a 24-county area in eastern North Carolina. Trillium connects individuals and families... Download white paper

What Constitutes Effective Security Awareness Training

Employees are a critical part of an organization’s defense against many IT security threats. Just as having the correct technology solutions is important, training personnel to recognize security threats is a critical part of any security... Download white paper

Best Practices for Dealing With Phishing and Ransomware

Phishing and ransomware are serious problems that can steal data or disable access to your organization’s network. Both ransomware and phishing are increasingly common and are having devastating impacts on businesses of all sizes. The FBI... Download white paper

[Crash Course]: 5 Steps to Protect PHI and Pass HIPAA with Less Effort

Analytics have named 2017 “the year of the healthcare breach” — which is exactly what they called 2016. As the threats continue to grow, you need strategies for protecting your organization. In this hands-on session, experts... View webcast

Endpoint Protection Ransomware Effectiveness

It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. In this report we examined who is at risk, what the scope and cost of an attack is, how... Download white paper

Securing Health IT Infrastructure to Avoid the Breach

Healthcare providers and their patients are increasingly becoming a target of cyberattacks. A recent Accenture survey found that 26 percent of consumers had their personal medical information stolen, with half of those cases leading to identity... View webcast

Forrester Total Economic Impact Study: Security Awareness Training and Simulated Phishing Platform

KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing the KnowBe4 Security Awareness Training and Simulated... Download white paper

Preventing and Mitigating Ransomware Infections

Not a week goes by without hearing about a network breach of some major corporation, agency or public figure, including government officials! This webinar we will describe today's threat landscape and offer some practical, every-day protections... View webcast

Forrester Total Economic Impactâ„¢ (TEI) Webinar

KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact™ (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing KnowBe4. How does 127% ROI with a one-month payback... View webcast

Ransomware Hostage Rescue Guide Part 2 of 2

In part 2 of this webinar, we will cover the final 3 sections of the very popular KnowBe4 Ransomware Hostage Rescue Manual in depth. Including actionable items you can use like, if you should negotiate or pay the ransom, a ransomware prevention... View webcast

Ransomware Hostage Rescue Guide Part 1 of 2

2016 was a “Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight for 2017. We will... View webcast

Healthcare M&A Best Practices: How to Restructure Active Directory with ZeroIMPACT

Market and regulatory changes such as the Affordable Care Act are fueling a historic period of consolidation in the healthcare sector. Independent health systems are struggling to survive on their own due to reduced payouts, driving healthcare... View webcast

Six Texting Mistakes Hospitals Make With Consumer Texting Apps

Not all messages are created equal. Care providers need secure texting that integrates with clinical systems and directory/on-call info. Learn the reasons consumer texting apps aren’t hospital grade. Download white paper

Case Study: When Health is at Stake: Disaster Recovery for Epic with Zerto Virtual Replication

The Yakima Valley Farm Workers Clinic (YVFWC) re-architected their electronic health records system in 2014. The team deployed Epic to handle medical records and behavioral health. The system is significant because it is the application that... Download white paper

Make Your Enterprise Network a Top Priority for Hybrid IT

Hybrid IT has become a vital element in enterprises’ digital transformation strategy. But putting in place a hybrid IT framework is one thing, and actually achieving it is another altogether. Smart organizations pay close attention to their... Download white paper