Privacy & Security
03:38 pm October 19, 2017
It's a fine line, engaging patients through portals while placing security as a high priority. As this paper shows, combining the right technology and clear communication is an effective path to both safer data and steadier patient confidence.
03:37 pm October 19, 2017
The EHR is a mission critical application. Even minimal downtime can have a significant impact on your clinical operations and, ultimately, your organization's bottom line. This paper shows best practices to stay current with Epic guidelines.
01:00 pm October 04, 2017
How can IT departments enable prompt sharing of harmonized clinical information for decision support and protect it at the same time? Join this webinar to learn best practices for allowing contextual access – based on the rights the user has been granted to access specific types of data for specific situations.
04:26 pm October 03, 2017
Mobile devices, ad-hoc storage and the expansion of imaging procedures can threaten security and compliance. An enterprise-wide strategy, with a vendor neutral archive (VNA) can address risks and compliance while improving care.
12:00 pm October 02, 2017
In this webinar, CISO of RWJ Barnabas along with Intel and VMware will discuss the key areas of exposure and top 5 security strategies to combat the threat of ransomware.
04:47 pm September 28, 2017
It is vital that health care organizations quickly and thoughtfully address the availability issue. This paper discusses key challenges and solutions for maintaining data access to meet the high digital expectations of next-generation patient care.
01:00 pm September 22, 2017
This presentation will focus on current research that explains the most prevalent cyber attacks plaguing the healthcare industry, while outlining security technology that can best keep healthcare data secure given the increased exposure resulting from ransomware and phishing attacks.
02:00 pm September 21, 2017
Implementing an enterprise communications solution is a highly complex undertaking involving multiple technologies, stakeholders and disciplines. Ensuring your solution succeeds over the long term requires a rigorous and comprehensive implementation plan.
02:00 pm September 20, 2017
Healthcare organizations are waking up to the reality that legacy medical devices are vulnerable entry points into their IT networks and an integrated approach to medical device management is necessary now, more than ever. We will discuss the integration of device management and security across their life cycle.
12:31 pm September 12, 2017
This report analyzes the risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It also looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.