Electronic Health Records

IT Security Resources

HIPAA Data Security Best Practices

Even as healthcare record breaches are growing at an alarming rate, organizations don’t have to stay vulnerable to security risks. Putting technical safeguards in place can protect your organization against data breaches and ransomwar... Download white paper

Implementing Best Practices for Securing Patient Data

Cybercriminals are putting more time and resources into exploiting and monetizing patient data, with medical record information proving more valuable than Social Security numbers and other personally identifiable information (PII). As a res... View webcast

Top 5 Reasons to Choose FlashStack for Healthcare

New IT service delivery methodologies are revolutionizing how hospital IT departments function and how IT staff and clinicians access the applications that make them successful. Demands on IT have necessitated a change to on-demand services... Download white paper

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast

Case Study: SCCA – Providing Secure & Convenient Access To Patient Information

Seattle Cancer Care Alliance (SCCA) is a world-class cancer treatment and research center that combines the power of science with the power of collaboration. Together with the devoted healthcare professionals at its partner organizations, t... Download white paper

Best Practices Guide to Strong Identity Access Control for Healthcare

The evolution of healthcare technology has helped physicians provide optimal care and engage patients with well-being and preventive services. Yet, as technology evolves – and as access to critical applications becomes more widespread... Download white paper

Increasing Identity Security without Increasing User Disruptions: A Case for Adaptive Authentication for Healthcare Organizations

Healthcare organizations are subject to a higher standard of scrutiny with regard to security and privacy requirements, due to regulations such as HIPAA and HITECH. These organizations cannot only rely on preventive methods to keep att... Download white paper

6 Users to Put on Your Security Watch List

Are you protecting your organization from the inside out? As an administrator, you may have processes in place to deal with security threats, like malware, spam emails, port vulnerabilities, and brute-force attacks. But though we wish it wa... Download white paper

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Cloud Fax Changes the Game for Compliance

This enormous volume of faxing creates endless opportunities for privacy and security compliance issues. Download this whitepaper to explore the fax compliances challenges that IT professionals face, how other companies have successfully ov... Download white paper

How Cloud Faxing Lowers Costs and Strengthens Data Security

Stand-alone machines and inhouse fax servers can leave conspicuous security and compliance gaps if not properly managed. The cost and effort required to bridge these gaps begs the question: is there a less expensive, more secure way to main... Download white paper

eBook: Protect Your Online Business From Credential Stuffing

Fraudsters use bots to validate stolen login credentials by the thousands, often stealthily – on websites like yours. Bots are responsible for between 30% and 70% of the total traffic to websites today, and yet most companies have ina... Download white paper

Two Pager: Application Security & Performance – Web Attacks & DDoS

Web application and DDoS attacks hit organizations without warning or reason. Attackers can breach data, take control of site resources, slow site response, and take the site offline. Responsible organizations proactively block web attacks ... Download white paper

Infographic: Does My Enterprise Need Web Application Security

Web application security can be a hassle that many organizations don’t have the resources to address. And attackers know this. They use a hoard of bots to constantly scan websites for vulnerabilities. And when they find one, they targ... Download white paper

The GoAnywhere Book of Secure File Transfer Project Examples

Every organization has a process for sharing files. Some use scripts, others use a tool like Drobox. But is your method secure? And is it efficient? Download the eBook and be inspired with 20 real-life examples of how organizations of all s... Download white paper

How Managed File Transfer Addresses HIPAA Requirements for ePHI

As the healthcare industry transitions from primarily using paper documents and patient charts to electronic health records, many clinics, hospitals, and organizations are looking for a more secure, reliable method of sharing electronic pro... Download white paper

Five Ways to Improve ePHI for HIPAA/HITECH with Managed File Transfer

The healthcare industry is under building pressure to make health information more accessible to both patients and healthcare providers, while also ensuring that patient data remains private and secure. Managed File Transfer (MFT) solutions... Download white paper

Beyond FTP: Securing and Managing File Transfers

FTP first made its appearance in 1971, and it hasn’t changed much since. Poor FTP implementation has left many businesses with severe security and management issues. Download the eBook to learn why typical FTP implementation puts your... Download white paper

Secure Managed File Transfer: 2018 Ultimate Buyer’s Guide

We know finding the right file transfer solution for your organization isn’t an easy process. There are dozens of details to consider, from industry and compliance concerns to critical cybersecurity needs, and they can make choosing a... Download white paper

X

EHRIntelligence

Sign up to continue reading and gain Free Access to all our resources.

Sign up for our free newsletter and join 1000,000 of
your peers to stay up to date with tips and advice on:

EHR Optimization
EHR Interoperability
MACRA

White Papers, Webcasts, Featured Articles and Exclusive Interviews

Our privacy policy

no, thanks

Continue to site...