Healthcare Information Security

IT Security Resources

12 Ways to Defeat Two-Factor Authentication

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven De... View webcast

State of Medical Device Cybersecurity and Emerging Technologies for Staying Ahead of Risk

Medical device security has become a much bigger concern for healthcare organizations in recent years. Vulnerable devices not only pose a risk to patients but also to organizations’ networks and systems.   A number of initiatives... View webcast

HIPAA Data Security Best Practices

While technical requirements under HIPAA help inform data security best practices, they do not provide detailed prescriptions for covered entities to follow to secure sensitive health data across the continuum of care. Sentara Healthcare Vi... Download white paper

Levers of Human Deception: the Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.... View webcast

Securing Endpoint Devices Against Unauthorized Access

Medical device security has become a much bigger concern for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. At the same time, there has always been industry and regulato... View webcast

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Expert Advice: How to Stay Off the HIPAA “Wall of Shame”

HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How ca... View webcast

Physically Fit: ProfileUnity Boosts Physical Desktop Performance and Compliance for Healthcare Provider

ProfileUnity proved its value for non-virtualized PCs and laptops by helping medical imaging provider Intermountain Medical Imaging (IMI) centrally and securely manage user profiles and patient data for multiple facilities. IMI is a joint v... Download white paper

ProfileUnity and FlexApp with Imprivata OneSign

Many Imprivata and Liquidware healthcare customers are delivering secure virtual and physical desktops with Single Sign On, robust User Environment Management, and Application Layering capabilities. By replacing repetitive manual log-ins wi... Download white paper

Next-Generation Desktops: Meeting the Growing Demands in Healthcare IT

The Healthcare sector continues to accelerate the use of advanced technologies to improve the quality of patient care and to document to agencies that these improvements are real, quantitative, and progressive. Increasingly high tech approa... Download white paper

Liquidware Transforms Desktops in Healthcare

Healthcare providers are increasingly turning to desktop virtualization technologies in order to better address the requirements of HIPAA and Meaningful Use compliance, and to enhance security of patient data. Healthcare organizations today... Download white paper

How to Secure Sensitive Data while Supporting Improvements to Patient Care Delivery

The healthcare industry’s rapid digital transformation has fueled impressive innovation, but has also created numerous challenges related to data management, security, and analytics. Providers, payers, and other healthcare organizatio... Download white paper

HIPAA Data Security Best Practices

Even as healthcare record breaches are growing at an alarming rate, organizations don’t have to stay vulnerable to security risks. Putting technical safeguards in place can protect your organization against data breaches and ransomwar... Download white paper

Implementing Best Practices for Securing Patient Data

Cybercriminals are putting more time and resources into exploiting and monetizing patient data, with medical record information proving more valuable than Social Security numbers and other personally identifiable information (PII). As a res... View webcast

Top 5 Reasons to Choose FlashStack for Healthcare

New IT service delivery methodologies are revolutionizing how hospital IT departments function and how IT staff and clinicians access the applications that make them successful. Demands on IT have necessitated a change to on-demand services... Download white paper

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast

6 Users to Put on Your Security Watch List

Are you protecting your organization from the inside out? As an administrator, you may have processes in place to deal with security threats, like malware, spam emails, port vulnerabilities, and brute-force attacks. But though we wish it wa... Download white paper

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

The GoAnywhere Book of Secure File Transfer Project Examples

Every organization has a process for sharing files. Some use scripts, others use a tool like Drobox. But is your method secure? And is it efficient? Download the eBook and be inspired with 20 real-life examples of how organizations of all s... Download white paper

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...