Healthcare Analytics, Population Health Management, Healthcare Big Data

Data Security Resources

Curating Compliance: Implementing Cybersecurity Measures without Disrupting Healthcare Workflow

As the old saying goes, when it comes to hacks, it’s not a matter of if, but when. Every single healthcare organization is at risk for a potential data breach. As reported in a recent KPMG survey of C-level information technology stakeholders... Download white paper

Enabling Fast, Secure EPCS, Remote Network Access, and Other Clinical Workflows

Franciscan Missionaries of Our Lady Health System (FMOLHS) is one of the largest health systems in Louisiana, with nearly 1,800 beds. The challenge for the IT team at FMOLHS is how to achieve the best care possible while also ensuring security... Download white paper

The Top 10 HIPAA Compliance Fails: Lessons Learned for 2018

Healthcare providers, from a small physician practice to the largest hospitals, there are serious consequences a covered entity faces when it suffers a data breach — specifically the potential for regulatory penalties and other negative... Download white paper

2018 Ransomware Hostage Rescue Manual

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.... Download white paper

Cloud Security: The Honeypot Project

Protecting sensitive data no longer means simply safeguarding on-premises infrastructure. The cloud is gaining tremendous momentum as organizations are feeling the gravitational pull of faster-go-to-market, flexibility and pricing advantages... Download white paper

Finding a Solution to Healthcare’s Patient Matching Problem

Patient matching errors can cause unnecessary harm to individuals trying to access care by hindering effective care coordination and utilization of care services. A multitude of common problems — ranging from incorrect and missing information... View webcast

Healthcare Ransomware Attacks – Don’t Become a Statistic

In 2017, ransomware rocked the healthcare industry. Six of the top ten HIPAA breaches reported to the US Department of Health and Human Services (HHS) stemmed from ransomware, and with cybercriminals becoming stealthier, more skilled, and zealous... View webcast

Top 5 Strategies to Prevent Ransomware

New ransomware strains are accelerating and there is no end in sight. Healthcare information systems have proven to be an especially attractive target for cybercriminals. These systems are a virtual trove of identity-related data, payment information,... View webcast

Creating a Comprehensive Incident Detection, Response Plan

Cybersecurity threats are continuously emerging and increasing in sophistication, and organizations in healthcare have traditionally not always been the “top of the pile” in terms of offering the best types of protection.  Other... Download white paper

Game-Changing Patient Matching Case Study

Read this case study to see how the nation’s largest public HIE automatically resolves its potential match tasks. They are able to achieve real-time, high-accuracy patient matching – performing over 1,000,000 match decisions per day... Download white paper

Creating a Comprehensive Incident Detection, Response Plan

Risk-based, enterprise-wide information security programs are becoming more critical for providers as cybersecurity threats continue to evolve and grow more sophisticated. Prevention, mitigation, and detection are crucial, but what happens in... View webcast

Protecting Data in the Healthcare Industry

Data breaches are becoming too common,  Stealing healthcare records is a lucrative business.  These records can contain personal, medical, and financial information that a criminal requires for identity theft. Despite all of the... Download white paper

Protect Endpoints Everywhere, Your First and Last Line of Defense for Today’s Threats

Today, you need deep visibility into what users are doing on their endpoints, what’s happening with the files located there, and where that endpoint is trying to connect to on the internet. And you need the control to stop malicious behavior... Download white paper

Take Your Security to New Heights: The Cloud

The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. The increase in mobile devices and cloud applications has changed everything, from where we work, to how... Download white paper

Six Ways Hospitals can Prepare for a Catastrophe

The CEO’s of two hospitals in Texas recently were largely affected by the devastation brought along by Hurricane Harvey. They were dedicated to staying open for their patients and in turn have offered other healthcare organizations and... Download white paper

Cybersecurity Across the Continuum of Care: Real-World Experiences from Three Healthcare Providers

Today, healthcare organizations are more connected than ever before. Digital technology opening up a new world of opportunities, increasing access to quality care and reducing costs. To take advantage of the opportunities digitization brings,... Download white paper

Gartner Competitive Landscape: Secure Web Gateways

The secure web gateway market is still transforming toward SaaS deployments as CASB and DNS services capabilities add new challenges to traditional providers. Technology strategic planners must pay attention to these new concepts to compete effectively... Download white paper

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges

In this paper, we identify 10 threat vectors common to all healthcare organizations along with a number of suggestions on how to mitigate these security challenges. Download white paper

How Healthcare Benefits from Cloud-Delivered Security

Healthcare IT professionals are swimming upstream to overcome security challenges. Cloud-delivered solutions may represent a life preserver in their efforts to reduce risk, simplify management and control costs. In this paper, we take a look... Download white paper

The Complexities of the Secure DIY Cloud

Private and do-it-yourself clouds — or the DIY cloud — have the potential to add considerable value to the organizations adopting them, but they also present challenges from implementation and management perspectives — particularly... Download white paper


Join 25,000 of your peers

Register for free to get access to all our articles, webcasts, white papers and exclusive interviews.

Our privacy policy

no, thanks

Continue to site...