HIPPA Reports

E-Book: Encryption - What, Where and How
sponsored by TechTarget Health IT
EBOOK: This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!
Posted: 27 Oct 2010 | Published: 26 Oct 2010

TechTarget Health IT

Five Steps to Meaningful Use with Workspace Virtualization
sponsored by RES Software
WHITE PAPER: Healthcare IT pros face 3 obstacles when trying to align with meaningful use standards: clinician experience, security and compliance, and legacy infrastructure management. In this expert guide, discover 5 key benefits healthcare organizations will realize when they deploy workspace virtualization.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

RES Software

Managing the Explosion of Medical Data
sponsored by HP & Intel®
WHITE PAPER: This timely white paper takes an in-depth look at the enormous growth of health care data and offers ways to overcome the challenges associated with it. Specifically, uncover how you can manage and secure the increasingly large data sets every organization is coping with.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP & Intel®

When Cyberthieves Attack, Technologies Have Your Back
sponsored by TechTarget Health IT
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

TechTarget Health IT

HIPAA Compliance in a BYOD Environment
sponsored by Imprivata
EGUIDE: Access this expert e-guide from SearchHealthIT.com to explore the mHealth survey results to see how your peers are faring with HIPAA compliance given their latest BYOD implementations.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Case Study: Computrace Helps HealthSpring Comply with HIPAA and the HITECH Act
sponsored by Absolute
CASE STUDY: This brief case study explains how the healthcare organization HealthSpring effectively supports and secures its increasingly mobile workforce – all while complying with HIPAA and HITECH regulations. Read on to learn more now.
Posted: 13 Nov 2013 | Published: 31 Dec 2012

Absolute

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

Focused IT Compliance at Barnabas Health
sponsored by Symantec Corporation
WEBCAST: In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.
Posted: 25 Apr 2014 | Premiered: Apr 25, 2014

Symantec Corporation

How to Comply with the HPAA Security Rule
sponsored by Redspin, Inc.
EGUIDE: The HITECH Act has helped to not only increase productivity, but to streamline data exchange. While this increased efficiency, there are also many requirements that must be met in order ensure that these exchanges are HIPAA compliant. In this e-guide, learn how a well implemented security program can secure patient medical records.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Redspin, Inc.