Network Infrastructure

01:07 pm
December 06, 2019
Four analysts from Black Book, Chilmark, KLAS and PwC offer their expert advice for healthcare CIOs and other IT leaders seeking to make cloud technology work for their organizations.
12:05 pm
November 25, 2019
Virtual Care Provider Inc., which provides hosting and IT services to post-acute care facilities nationwide, was hit by the Ryuk variant, locking access to patient data at 110 nursing homes.
10:02 am
November 25, 2019
The partnership will allow staff to remotely manage blood donor and collection information via handheld devices.
11:27 am
November 21, 2019
Developing tools to separate and automatically control Internet of Things traffic is one important way to safeguard medical device security.
09:38 pm
November 20, 2019
The technology is being piloted at six NSW Health public hospitals in a range of clinical settings including hospital EDs, wards, clinics and pathology collection centres.
02:31 pm
November 20, 2019
Erik Decker, chief security and privacy officer at University of Chicago Medicine, describes the value of HHS' Health Industry Cybersecurity Practices framework, which offers workable best practices for the management and mitigation of prevalent threats.
02:05 pm
November 19, 2019
The Google Cloud Healthcare Data Protection Toolkit can help healthcare organizations chart strategies for HIPAA-aligned data management, the company says.
10:36 am
November 15, 2019
Just under half (49 percent) of all post-acute providers surveyed said the state of their staff's health information technology proficiency is either "extremely poor" or "non-existent," a new Black Book report shows.
02:18 pm
November 05, 2019
The network-based cybersecurity technology acts as an early warning system, giving the CISO and his team a high degree of visibility into network activity.
12:29 pm
October 30, 2019
A security expert says discover assets on a network, perform vulnerability assessments, embrace identity governance, perform privileged access management, hire white hat ethical hackers and more.