PatientEngagementHIT

IT Security Resources

Detecting and Responding to Cyber Attacks in Healthcare

The healthcare sector has remained a prime target for cybercriminals for the last several years. More concerning is that for many health delivery organizations a lot of these network intrusions can remain undetected for long periods of time... View webcast

What Most Computer Security Defenses are Doing Wrong, and How To Fix It

Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”. But it doesn’t have to be that way! Join Roger... View webcast

5 Best Practices for Mitigating Medical Device Security Risks

Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attack... Download white paper

Webcast: How Medical Devices Risk Patient Safety and Security

Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care a... Download white paper

IoT Risks & Rewards: What Every CXO Should Know

Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, it’s clear there&rs... Download white paper

eBook: Using Secure IoT to Drive Business Growth

IoT adoption is expected to generate a 21% increase in corporate profits by 2022. This business value comes from the ability to automate processes and collect and analyze massive amounts of data—so organizations can make better inform... Download white paper

12 Ways to Defeat Two-Factor Authentication

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven De... View webcast

State of Medical Device Cybersecurity and Emerging Technologies for Staying Ahead of Risk

Medical device security has become a much bigger concern for healthcare organizations in recent years. Vulnerable devices not only pose a risk to patients but also to organizations’ networks and systems.   A number of initiatives... View webcast

HIPAA Data Security Best Practices

While technical requirements under HIPAA help inform data security best practices, they do not provide detailed prescriptions for covered entities to follow to secure sensitive health data across the continuum of care. Sentara Healthcare Vi... Download white paper

Levers of Human Deception: the Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.... View webcast

Securing Endpoint Devices Against Unauthorized Access

Medical device security has become a much bigger concern for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. At the same time, there has always been industry and regulato... View webcast

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Expert Advice: How to Stay Off the HIPAA “Wall of Shame”

HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How ca... View webcast

Implementing Best Practices for Securing Patient Data

Cybercriminals are putting more time and resources into exploiting and monetizing patient data, with medical record information proving more valuable than Social Security numbers and other personally identifiable information (PII). As a res... View webcast

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast

HIPAA Data Security Best Practices

In a healthcare environment increasingly dependent on the sharing of electronic protected health information (PHI), covered entities (CEs) must adopt best practices for safeguarding against unauthorized access to sensitive patient data. As ... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack that was successful in infecting their networks with malware.  Over ... Download white paper

Threat Impact and Endpoint Protection Report

Ransomware is a multi-billion dollar business with the number of new ransomware variants continuing to grow quarter-over-quarter. Despite the many security offerings available, organizations continue to fall victim to ransomware attacks. Fo... Download white paper

Ransomware Hostage Rescue Manual

Get the most complete Ransomware Manual packed with actionable info that you need to have to prevent infections, and what to do when you are hit with ransomware, complete with a Ransomware Attack Response Checklist and Ransomware Prevention... Download white paper

X

Sign up for our free newsletter:

Our privacy policy


no, thanks

Continue to site...