Health Insurance Portability and Accountability Act of 1996 Reports

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

Getting the PACS archive and EHR systems to talk to each other
sponsored by Ciena
EGUIDE: Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.
Posted: 10 Jun 2011 | Published: 10 Jun 2011

Ciena

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software

The CIO’s Guide to HIPAA Compliant Text Messaging
sponsored by Imprivata
WHITE PAPER: This resource is a guide to ensuring secure texting policies while maintaining compliance with HIPAA and HITECH, and includes best practices and a vendor comparison checklist to use during product evaluation.
Posted: 10 Apr 2014 | Published: 31 Dec 2013

Imprivata

E-Guide: Information Security Essential Guide to Compliance
sponsored by Information Security Magazine
ESSENTIAL GUIDE: Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.
Posted: 06 Jul 2010 | Published: 06 Jul 2010

Information Security Magazine

Protecting and simplifying access to Electronic Health Records
sponsored by DigitalPersona, Inc
WHITE PAPER: Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

DigitalPersona, Inc

How Will the Transition to ICD-10 codes affect Health IT?
sponsored by Virtusa Corporation
EGUIDE: As of Oct. 1, 2015, U.S. health care providers must use ICD-10 codes when they submit medical claims. This FAQ e-guide addresses what the transition means, advantages of using ICD-10, as well as best practices on how providers can prepare and succeed in an ICD 10 conversion.
Posted: 31 Mar 2011 | Published: 29 Mar 2011

Virtusa Corporation

Tips for Thin Provisioning Storage in a Health Care Setting
sponsored by HP & Intel®
EGUIDE: This E-Guide offers expert insight into how today's health care facilities can use thin provisioning to address the ever-present problem of storage underutilization, eliminating the need for additional storage purchases. Additionally, discover essential tips for implementing thin provisioning in you health care facility.
Posted: 25 Feb 2013 | Published: 25 Feb 2013

HP & Intel®

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper