Electronic Health Records

Cybersecurity Resources

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Cloud Fax Changes the Game for Compliance

This enormous volume of faxing creates endless opportunities for privacy and security compliance issues. Download this whitepaper to explore the fax compliances challenges that IT professionals face, how other companies have successfully ov... Download white paper

How Cloud Faxing Lowers Costs and Strengthens Data Security

Stand-alone machines and inhouse fax servers can leave conspicuous security and compliance gaps if not properly managed. The cost and effort required to bridge these gaps begs the question: is there a less expensive, more secure way to main... Download white paper

eBook: Protect Your Online Business From Credential Stuffing

Fraudsters use bots to validate stolen login credentials by the thousands, often stealthily – on websites like yours. Bots are responsible for between 30% and 70% of the total traffic to websites today, and yet most companies have ina... Download white paper

Two Pager: Application Security & Performance – Web Attacks & DDoS

Web application and DDoS attacks hit organizations without warning or reason. Attackers can breach data, take control of site resources, slow site response, and take the site offline. Responsible organizations proactively block web attacks ... Download white paper

Infographic: Does My Enterprise Need Web Application Security

Web application security can be a hassle that many organizations don’t have the resources to address. And attackers know this. They use a hoard of bots to constantly scan websites for vulnerabilities. And when they find one, they targ... Download white paper

Secure Managed File Transfer: 2018 Ultimate Buyer’s Guide

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider, from industry and compliance concerns to critical cybersecurity needs, and they can make choosing a... Download white paper

4 Pillars of Security When Downtime Isn’t an Option and Data Protection Is A Must

The risk of patient-care suffering as a result of unexpected attacks that impact the ability to deliver quality care and keep personally identifiable information secure is enough to keep security professionals up at night. Couple that with ... View webcast

Preventing Vulnerabilities in Healthcare From Affecting Patient Care

Healthcare organizations have become an attractive target for cyberattackers as patient data has grown in value on the black market. Despite this growing attraction among cybercriminals, the health systems, hospitals, and physician practice... View webcast

Could Decentralizing Healthcare Be Leading to Increased ePHI Security Risks?

Decentralizing and outsourcing healthcare — or moving key healthcare services out of hospitals — is leading to major concerns about electronic patient healthcare information (ePHI) security. More communication means greater risk... Download white paper

The EHR Imperative: Eliminating Outages and Combating Cyberattacks can Help Improve Patient Care

A comprehensive view of a healthcare organization’s IT is essential to delivering a great patient experience. Visibility into the many systems operating across a network of care sites enables quick and effective remediation of interna... Download white paper

Safeguarding Health Information 2017: Ensuring HIPAA Privacy & Security

In this webcast, the speakers will review current healthcare cybersecurity threat environments and offer tips & techniques to implement HIPAA privacy and security rules to ensure maximum protection of electronic health information.... View webcast

Cybersecurity, Cybercrime and Data Breaches: Healthcare Under Attack

This paper will discuss how these unique burdens — cybersecurity and regulatory compliance — affect your industry generally and your organization in particular. We will then offer a simple, cost-effective solution that can help ... Download white paper

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack that was successful in infecting their networks with malware.  Over ... Download white paper

Best Practices for Addressing the HIPAA Security Rule

In this webinar, renowned HIPAA consultant David Ginsberg will spotlight best practices for addressing the HIPAA Security Rule, with a focus on the Audit Controls standard. He will explain how meeting this standard can help your organizatio... View webcast

2018 Threat Impact and Endpoint Protection Report

Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Fo... Download white paper

2018 Ransomware Hostage Rescue Manual

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention... Download white paper

Healthcare Ransomware Attacks – Don’t Become a Statistic

In 2017, ransomware rocked the healthcare industry. Six of the top ten HIPAA breaches reported to the US Department of Health and Human Services (HHS) stemmed from ransomware, and with cybercriminals becoming stealthier, more skilled, and z... View webcast

Protecting Data in the Healthcare Industry

Data breaches are becoming too common,  Stealing healthcare records is a lucrative business.  These records can contain personal, medical, and financial information that a criminal requires for identity theft. Despite all of ... Download white paper

Techniques for Dealing with Ransomware, Business Email Compromise, and Spearphishing

Ransomware alone cost organizations an estimated $1 billion in 2016, up from $24 million in 2015 and there is no end in sight for 2017! Ransomware, business email compromise, and spearphishing are serious problems that can steal your data, ... Download white paper

X

EHRIntelligence

Sign up to continue reading and gain Free Access to all our resources.

Sign up for our free newsletter and join 1000,000 of
your peers to stay up to date with tips and advice on:

EHR Optimization
EHR Interoperability
MACRA

White Papers, Webcasts, Featured Articles and Exclusive Interviews

Our privacy policy

no, thanks

Continue to site...