Healthcare Analytics, Population Health Management, Healthcare Big Data

White Papers

Why Healthcare Organizations Need a Cloud-Based BCDR Strategy

Healthcare providers can leverage the cloud’s benefits to improve reliability, minimize risk and reduce costs associated with Business Continuity and Disaster Recovery (BCDR). Download white paper

Keep Your Healthcare Systems Up and Running with a BCDR Strategy

Healthcare organizations face a myriad of information technology challenges. With so many competing priorities, Business Continuity and Disaster Recovery (BCDR) sometimes falls to the bottom of the “to-do” list. However, leaders should... Download white paper

How the Latest OCR Enforcement Trends Impact Your HIPAA Compliance: An Auditor’s POV

Are you using the new HIPAA security risk assessment tools? Do you understand the latest Office of Civil Rights (OCR) requirements? Independent auditors Joe Grettenberger and Dan Anderson talk about current health IT security challenges within... View webcast

Healthcare Breaches—The Next Digital Epidemic

Cybercrimes in healthcare have increased at an alarming rate.  Criminal groups have upped the ante to compromise networks and steal data through targeted cyber attack campaigns.  Protecting against cybercrime has been one of the most... View webcast

How can Secure Texting Turbocharge your Workflow?

Healthcare professionals know that every second on the job counts. Physicians' and nurses' time come at a premium and the goal of every healthcare organization is to maximize as much face time with patients as possible. Without an easy... Download white paper

Case Study: Memorial Hospital Improves Collaboration & Saves Thousands of Dollars with TigerText

Memorial Hospital of Golfport (MHG) sought a solution that would enable them to send sensitive information in a HIPAA compliant manner and also help address their communication barriers. TigerText not only addressed these concerns, but also delivered... Download white paper

BYOD Policy Template for Better Security

The use of mobile devices has become commonplace for both our personal and professional lives. Businesses understand that employees often utilize their personal mobile devices in the workplace; however, this raises several safety and privacy... Download white paper

Transitioning to Stage 3 Meaningful Use with TigerText Secure Messaging

The Stage 3 Meaningful Use rule lists several significant changes that will affect eligible professionals (EPs) and hospitals. The program is set up to promote collaborative and less costly patient care through health information exchange... Download white paper

VDI Fundamentals

In this video series you hear Tony D’Ancona, Vice President, VMware EUC for PC Connection Inc., explain the benefits of VDI. You will learn the fundamentals of a VDI, the benefits and functionality, as well as the results you can expect.... View webcast

Flash Storage: A Glimpse into the Complete Solution

In this video, you will learn more about the experts at PC Connection and how our host of services can help you identify exactly what your current infrastructure requires and introduce you to products that best suit your storage needs. Our goal... View webcast

Flash Storage: The Value of Flash Storage

This video will help you on your quest to discover if flash technology is right for your organization. Our experts discuss the methods you should take to prove the value of flash storage and decide the type of solution most beneficial for your... View webcast

Rest Assured Your DR Plan Works Smoothly When Disaster Strikes

Most organizations have a disaster recovery (DR) plan in place. But are they confident in it? Are you confident in yours? Whether you have a simple or complex DR plan in place, testing is one of the most important steps you can take to ensure... View webcast

Flash Storage: Accelerate Your Data Center

In this video, our experts discuss the latest advances in all-flash and hybrid storage and how this new technology helps accelerate your workflow, enables mobility, and solidifies your database infrastructure. View webcast

Disaster Recovery Goes Beyond Simply Planning for Bad Weather

In today's complex IT landscape, things like human error, malicious activity, and equipment failure can all lead to data corruption. Watch this video to learn more about the types of disasters that should be on your Disaster Recovery (DR)... View webcast

Microsoft Azure: Partners in Paving Your Path to the Cloud

Microsoft Azure is a growing collection of integrated services—from compute, storage, data, and networking to apps that can help your organization increase agility, flexibility, and savings. Learn more about the PC Connection, Inc. and... View webcast

Microsoft Azure: Start Small and Win Big

Microsoft Azure is a growing collection of integrated services—from compute, storage, data, and networking to apps that can help your organization increase agility, flexibility, and savings. Learn more about the unique flexible and unique... View webcast

Rock Solid Security Plan - Part 2

Manage a Successful Security Plan - Join Stephen Nardone, Security Practice Director, as he discusses the top considerations for managing a successful security plan. View webcast

Rock Solid Security Plan - Part 1

Building a Rock-Solid Security Management Plan - Join Stephen Nardone, Security Practice Director, as he discusses the top considerations for developing and implementing a security management plan. View webcast

Phishing in the Healthcare ‘Pond’: Going Beyond the Baseline of Social Engineering

Research conducted by RSA has identified a phishing attack every minute with a total global cost of $4.5 billion losses in 2014. The US alone has seen an estimated $655 million in losses with 72% of the global phishing attack volume centered... Download white paper

Proven Strategies for Managing Vendor Risk in Healthcare

According to the Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data conducted by the Ponemon Institute, criminal attacks have become the number one cause of data breaches in healthcare. These type of attacks are up 125%... Download white paper