Privacy & Security

By 12:00 pm March 20, 2019
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4'...
Security terms
By 11:00 am March 05, 2019
Cybersecurity and business risks go hand in hand. A major cyber attack can bring down any healthcare organization. Patient safety, security, business operations, and goodwill all hang in the balance. We must be situationally aware and proactively address these cybersecurity and business risks in order to avoid chaos. This webinar will discuss the...
Cybersecurity monitor.
By 01:00 pm February 26, 2019
Regulated industries (federal government, healthcare, finance, energy) require a higher level of cybersecurity than their unregulated peers. This usually results in the purchase and installation of 20 to 50 or more cybersecurity tools to ensure compliance with external regulations, cybersecurity frameworks and internal policies. The challenge of...
By 02:00 pm February 07, 2019
Both the definition and delivery of healthcare is evolving at an exponential rate.  A swift convergence of medical advances, emerging technologies, consumer choices and expectations is accelerating change. Traditional borders are dissolving, and doctors, nurses, medical technicians and others are caring for patients face-to-face and from afar...
By 01:00 pm January 17, 2019
In this webinar, we will take an in-depth look at how the latest attacks work and the psychology and mechanics behind them. We will also discuss defensive measures you can take now to defend your organization against these attacks.
By WelchAllyn 09:35 am December 27, 2018
With the proliferation of medical devices within and outside of the four walls of the healthcare provider's facility, providers must ensure that these devices remain connected, available and secure when a new EMR is implemented. This executive summary will highlight steps to take when developing a strategy to deploy a new EMR.
By 12:00 pm December 12, 2018
The Ponemon Institute’s 2018 Cost of Data Breach Study stated, “Malicious or criminal attacks cause the most data breaches.” With the highest per capita cost of all industries and because healthcare information is the most valuable on the dark web, healthcare organizations are most at risk. Proofpoint helps healthcare better...
By 01:00 pm December 04, 2018
With new software vulnerabilities being discovered every day, it’s not a matter of if, but a question of when hackers will use these vulnerabilities to infiltrate a healthcare organization.
By HIMSS Learning Center 12:00 pm November 30, 2018
Healthcare data breaches have increased 70 percent between 2010 and 2017, according to a new report published in the Journal of the American Medical Association. While healthcare organizations have increased discussions around cybersecurity, hackers have matched their pace, continually targeting the sector.
By 02:00 pm November 28, 2018
veryone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!

Most Read

The Daily Brief Newsletter