Healthcare Analytics, Population Health Management, Healthcare Big Data

Data Security Resources

Preventing Vulnerabilities in Healthcare From Affecting Patient Care

Healthcare organizations have become an attractive target for cyberattackers as patient data has grown in value on the black market. Despite this growing attraction among cybercriminals, the health systems, hospitals, and physician practices... View webcast

Could Decentralizing Healthcare Be Leading to Increased ePHI Security Risks?

Decentralizing and outsourcing healthcare — or moving key healthcare services out of hospitals — is leading to major concerns about electronic patient healthcare information (ePHI) security. More communication means greater risks... Download white paper

5 Ways Your Faxing Might Not Comply with Privacy Laws: and What to Do About it

If your organization continues to require faxing capability, and your IT team is still supporting that need with desktop fax machines, in-house fax servers and analog fax lines, There is good news and bad news. Read this white paper to find out... Download white paper

Why Patient Matching is your EHR’s Achilles’ Heel

Whether you use an EHR from Epic®, Cerner®, McKesson®, eClinicalWorks®, or another vendor, it has one fatal flaw that is costing your organization money, diminishing care quality, and preventing strategic initiatives. Every EHR... View webcast

Case Study: How Healthix Achieved Real-Time High-Accuracy Patient Matching

Healthix, the largest public HIE in the country, covers over 16 million patients. At this scale, accurate and real-time patient matching is a challenge. Learn how Healthix automated its data stewardship and improved its patient matching with... Download white paper

Securing a Compliant Path Through the Healthcare Cloud

Healthcare organizations and health IT developers are looking to new and emerging technology to improve clinical decision-making, care delivery while working to lower costs for healthcare. Supporting innovation in care delivery while maintaining... Download white paper

A blueprint for EPCS success: Achieving full DEA compliance while ensuring workflow efficiency

Like many healthcare organizations, Hartford HealthCare was dealing with the inefficiencies that came with prescribing controlled substances on paper. In June 2017, as Hartford HealthCare considered possible options for improving its prescribing... View webcast

The EHR Imperative: Eliminating Outages and Combating Cyberattacks can Help Improve Patient Care

A comprehensive view of a healthcare organization’s IT is essential to delivering a great patient experience. Visibility into the many systems operating across a network of care sites enables quick and effective remediation of internal... Download white paper

The Top 10 HIPAA Compliance Fails: Lessons Learned For 2018

As businesses embrace digitization — and the Internet of Everything (IoE) begins to take shape — defenders of corporate data will have even more to worry about. The attack surface will only expand, giving adversaries more space to... Download white paper

Cybersecurity, Cybercrime and Data Breaches: Healthcare Under Attack

This paper will discuss how these unique burdens — cybersecurity and regulatory compliance — affect your industry generally and your organization in particular. We will then offer a simple, cost-effective solution that can help you... Download white paper

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack that was successful in infecting their networks with malware.  Over 17%... Download white paper

Curating Compliance: Implementing Cybersecurity Measures without Disrupting Healthcare Workflow

As the old saying goes, when it comes to hacks, it’s not a matter of if, but when. Every single healthcare organization is at risk for a potential data breach. As reported in a recent KPMG survey of C-level information technology stakeholders... Download white paper

Enabling Fast, Secure EPCS, Remote Network Access, and Other Clinical Workflows

Franciscan Missionaries of Our Lady Health System (FMOLHS) is one of the largest health systems in Louisiana, with nearly 1,800 beds. The challenge for the IT team at FMOLHS is how to achieve the best care possible while also ensuring security... Download white paper

2018 Ransomware Hostage Rescue Manual

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention Checklist.... Download white paper

Cloud Security: The Honeypot Project

Protecting sensitive data no longer means simply safeguarding on-premises infrastructure. The cloud is gaining tremendous momentum as organizations are feeling the gravitational pull of faster-go-to-market, flexibility and pricing advantages... Download white paper

Finding a Solution to Healthcare’s Patient Matching Problem

Patient matching errors can cause unnecessary harm to individuals trying to access care by hindering effective care coordination and utilization of care services. A multitude of common problems — ranging from incorrect and missing information... View webcast

Healthcare Ransomware Attacks – Don’t Become a Statistic

In 2017, ransomware rocked the healthcare industry. Six of the top ten HIPAA breaches reported to the US Department of Health and Human Services (HHS) stemmed from ransomware, and with cybercriminals becoming stealthier, more skilled, and zealous... View webcast

Creating a Comprehensive Incident Detection, Response Plan

Cybersecurity threats are continuously emerging and increasing in sophistication, and organizations in healthcare have traditionally not always been the “top of the pile” in terms of offering the best types of protection.  Other... Download white paper

Protecting Data in the Healthcare Industry

Data breaches are becoming too common,  Stealing healthcare records is a lucrative business.  These records can contain personal, medical, and financial information that a criminal requires for identity theft. Despite all of the... Download white paper

Protect Endpoints Everywhere, Your First and Last Line of Defense for Today’s Threats

Today, you need deep visibility into what users are doing on their endpoints, what’s happening with the files located there, and where that endpoint is trying to connect to on the internet. And you need the control to stop malicious behavior... Download white paper