Privacy & Security

By 01:00 pm February 15, 2017
As healthcare providers innovate to provide more effective clinical tools and decision support, application management has become a critical challenge. Learn how to create a successful infrastructure that will support innovation while providing protection against application downtime.
Sponsored by
By Armor 10:59 am February 13, 2017
Unfortunately, many of today’s strategies fail to create a compelling case for action, undermining the CISO’s support and credibility. These six steps create an effective security strategy linked with key business interests and success factors.
Sponsored by
By Armor 10:56 am February 13, 2017
Balancing security and compliance requires a proactive strategy, starting with an understanding the importance of HIPAA compliance, surmising possible threats, and formulating policies that protect data while conforming to the necessary regulations.
Sponsored by
By Armor 10:29 am February 13, 2017
To avoid regulatory fines and a damaged reputation, healthcare organizations turn to a compliance checklist. But that alone doesn't ensure proper security. This whitepaper focuses on safeguarding sensitive data, the intention behind the regulations.
Sponsored by
By Armor 10:23 am February 13, 2017
The Office of the National Coordinator (ONC) for Health IT found through a study that privacy and data loss are very much on patients’ minds--and those attitudes have the potential to impact both treatment outcomes and organizational reputations.
Sponsored by
By Armor 10:08 am February 13, 2017
Compliance alone does not guarantee that a sufficient security program is in place. This paper shows how to conduct internal risk management processes that determine which security controls are necessary to protect the sensitive data they hold.
By Armor 10:01 am February 13, 2017
When your organization is leveraging multiple clouds to power and scale data, services and applications, it's time to evaluate your approach to instant/virtual machine (VM) security, through vulnerability mitigation and attack detection methods.
Sponsored by
By Armor 09:52 am February 13, 2017
Late stage cloud buyers must be fully aware of the nuances of HIPAA compliance before making a final purchase. This article explores the many common mistakes made in doing so while offering valuable tips and suggestions for avoiding these errors.
By CommVault 05:25 pm February 10, 2017
With ransomware a top threat, healthcare systems must have a plan to both protect and recover data in the event of an attack. Using a multi-layer security strategy provides the best protection for prevention and continuing care after an attack.
By CommVault 05:23 pm February 10, 2017
Healthcare systems can now capture, protect and backup MEDITECH EHR data. Snapshot management also provides data protection and recovery and more into one seamless framework.

Most Read

The Daily Brief Newsletter