Electronic Health Records

Data Security Resources

How to Write a Cloud Fax RFI for Healthcare

A study by HIMSS Analytics* found that healthcare organizations are tripling the use of cloud services using the cloud for just about every aspect of their business communications, storage and workflow operations, including patient empowerment.... View webcast

The Top 10 HIPAA Compliance Fails: Lessons Learned For 2018

As businesses embrace digitization — and the Internet of Everything (IoE) begins to take shape — defenders of corporate data will have even more to worry about. The attack surface will only expand, giving adversaries more space to... Download white paper

Moving Fax to the Cloud in Healthcare: A Practical Guide to Cloud Migration in Healthcare

In the digital era of unified cloud communication and collaboration services, where document sharing is instantaneous and virtual, — it can be difficult for business and IT professionals to understand the persistence of an analog technology... Download white paper

Safeguarding Health Information 2017: Ensuring HIPAA Privacy & Security

The healthcare industry this year has been a prime target for cyber criminals. With the patient healthcare market the most sought after data for hackers to target. Healthcare IT professionals face a dual burden of safeguarding the most sought... View webcast

20 Practical Tips on Single Sign-On and Strong Authentication from Healthcare IT Professionals

You know your care providers need faster access to patient data, and that accessing applications and searching for patient data is time consuming and frustrating for them. Security requirements get in the way and cause disruption to their workflows.... Download white paper

3 Steps to Faster EMR Adoption with Desktop Virtualization and SSO

The Meaningful Use objectives in the HITECH Act are creating new urgency for hospitals to implement Electronic Health Records (EHRs) and Computerized Physician Order Entry (CPOE). As hospitals deploy new applications, they must take steps to... Download white paper

Top 5 Strategies to Prevent Ransomware

New ransomware strains are accelerating and there is no end in sight. Healthcare information systems have proven to be an especially attractive target for cybercriminals. These systems are a virtual trove of identity-related data, payment information,... View webcast

Creating a Comprehensive Incident Detection, Response Plan

Cybersecurity threats are continuously emerging and increasing in sophistication, and organizations in healthcare have traditionally not always been the “top of the pile” in terms of offering the best types of protection.  Other... Download white paper

Game-Changing Patient Matching Case Study

Read this case study to see how the nation’s largest public HIE automatically resolves its potential match tasks. They are able to achieve real-time, high-accuracy patient matching – performing over 1,000,000 match decisions per day... Download white paper

Creating a Comprehensive Incident Detection, Response Plan

Risk-based, enterprise-wide information security programs are becoming more critical for providers as cybersecurity threats continue to evolve and grow more sophisticated. Prevention, mitigation, and detection are crucial, but what happens in... View webcast

Protecting Data in the Healthcare Industry

Data breaches are becoming too common,  Stealing healthcare records is a lucrative business.  These records can contain personal, medical, and financial information that a criminal requires for identity theft. Despite all of the... Download white paper

Protect Endpoints Everywhere, Your First and Last Line of Defense for Today’s Threats

Today, you need deep visibility into what users are doing on their endpoints, what’s happening with the files located there, and where that endpoint is trying to connect to on the internet. And you need the control to stop malicious behavior... Download white paper

Take Your Security to New Heights: The Cloud

The cloud — at one point it was a revolution in the workplace. Now it is simply accepted as an efficient way to get business done. The increase in mobile devices and cloud applications has changed everything, from where we work, to how... Download white paper

Six Ways Hospitals can Prepare for a Catastrophe

The CEO’s of two hospitals in Texas recently were largely affected by the devastation brought along by Hurricane Harvey. They were dedicated to staying open for their patients and in turn have offered other healthcare organizations and... Download white paper

Cybersecurity Across the Continuum of Care: Real-World Experiences from Three Healthcare Providers

Today, healthcare organizations are more connected than ever before. Digital technology opening up a new world of opportunities, increasing access to quality care and reducing costs. To take advantage of the opportunities digitization brings,... Download white paper

Gartner Competitive Landscape: Secure Web Gateways

The secure web gateway market is still transforming toward SaaS deployments as CASB and DNS services capabilities add new challenges to traditional providers. Technology strategic planners must pay attention to these new concepts to compete effectively... Download white paper

Securing Digital Healthcare Communities — Addressing 10 Common Security Challenges

In this paper, we identify 10 threat vectors common to all healthcare organizations along with a number of suggestions on how to mitigate these security challenges. Download white paper

How Healthcare Benefits from Cloud-Delivered Security

Healthcare IT professionals are swimming upstream to overcome security challenges. Cloud-delivered solutions may represent a life preserver in their efforts to reduce risk, simplify management and control costs. In this paper, we take a look... Download white paper

The Complexities of the Secure DIY Cloud

Private and do-it-yourself clouds — or the DIY cloud — have the potential to add considerable value to the organizations adopting them, but they also present challenges from implementation and management perspectives — particularly... Download white paper

Inside the 6 Principal Layers of the Cloud Security Stack

What’s really inside a fully integrated secure cloud infrastructure? It’s not a myriad of point security tools bolted on in a haphazard manner. A truly secure cloud is designed from the ground by security experts and engineers. Go... Download white paper

X

EHRIntelligence

Sign up to continue reading and gain Free Access to all our resources.

Sign up for our free newsletter and join 60,000 of
your peers to stay up to date with tips and advice on:

EHR Optimization
EHR Interoperability
EHR Replacement

White Papers, Webcasts, Featured Articles and Exclusive Interviews

Our privacy policy

no, thanks

Continue to site...