10:53 am January 30, 2017
(SPONSORED) Prescription 3: Managing Complex Health IT Environments More Simply. With healthcare organizations managing hundreds of applications on myriad platforms within their enterprise, streamlining IT management is critical.
08:00 am January 16, 2017
(SPONSORED) Prescription 2: Leveraging Automation to Resume Mission-Critical Applications. Following a disaster, healthcare organizations need to minimize disruption to patient care delivery by ensuring that mission-critical systems get up and running soon after a disaster.
02:53 pm January 11, 2017
Four security experts discuss how recent cybercriminal activities shed light on the increasing need for better security, due to the severity of attacks and the need to protect valuable patient data.
03:10 pm January 09, 2017
Mix and mingle with the brightest minds in health and IT at HIMSS17, February 19–23, 2017 in Orlando. Experience five days of exceptional education, exhibition and networking to equip you with the resources and collaboration you need to continue to transform health and lives all year long.
11:54 am December 20, 2016
(SPONSORED) When Dave deBronkart learned he had a rare and terminal cancer, he turned to a group of fellow patients online — and found the medical treatment that saved his life.
12:09 pm December 19, 2016
(SPONSORED) Prescription 1: Continuous Availability of All Applications Across the Care Continuum. Develop a disaster recovery plan that enables clinicians to provide patient care without disruption.
01:03 pm December 08, 2016
Many security breaches begin with en email that allows malware enters the organization healthcare institutions begin as a result of phishing. To combat this thread, Mayo Clinic initiated an institution wide No Phishing Campaign based on education and simulated phishing exercises for all employees.
10:50 am December 08, 2016
(SPONSORED) John Summers, Vice President and General Manager of Enterprise at Akamai offers several suggestions relative to access control, provisioning user accounts, and engaging in agile digital transformation that also enables hospital IT departments to better serve customers. Summers also shares his vision of what healthcare organizations...
10:25 am December 08, 2016
Penetration or pen tests are an increasingly popular way to find the access points on a network that can be exploited by hackers. In his presentation at the Healthcare Privacy and Security Forum, Chris Crowley explains the value and the limits of these tests, and how to ensure that you can get the most benefit from a pen test.
09:34 am December 08, 2016
A successful cyber-security program requires a comprehensive approach. Shenny Sheth talks about the management philosophy that Texas Children’s Hospital has taken to creating its blueprint for the successful implementation of a security program.