Skip to main content

Security

Privacy & Security
By Susan Morse | 10:12 am | August 21, 2019
A number one recommendation is to know all of the touch points for data: how it comes in, how it's used, where it's stored and how it goes out.
Privacy & Security
By Jeff Lagasse | 05:58 pm | August 20, 2019
There is an apparent lack of awareness of federal regulations in both the U.S. and Canada to keep patient information secure.
Privacy & Security
By Bill Siwicki | 02:39 pm | August 20, 2019
An identity and access management expert illustrates this critical area of information security and offers tips on how to best control who is accessing protected health information.
Security
By William Scandrett | 05:51 pm | August 16, 2019
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.
Privacy & Security
By Bill Siwicki | 01:05 pm | August 16, 2019
Two healthcare CIOs and one deputy CISO offer their expert advice to their peers, explaining how to ensure security is wrapped up tight when working with public clouds.
Security
By Benjamin Harris | 01:17 pm | August 15, 2019
A new industry survey finds that a lack of network visibility is impairing already overworked cybersecurity teams.
Privacy & Security
By Bill Siwicki | 01:22 pm | August 14, 2019
An expert in the strategies and technologies surrounding identity and access management walks through today’s challenges and discusses how provider organizations can best secure this key area.
Security
By Nathan Eddy | 12:30 pm | August 14, 2019
BluePrint's visualization software coalesces security program data from disparate sources into a central "source of truth" founded on the company's workflow automation and rules engine.
Privacy & Security
By Jeff Lagasse | 12:19 pm | August 14, 2019
The rapid adoption of digital technologies is considered beneficial to providers, but it can lead to cybersecurity gaps.
Security
By Mike Miliard | 01:53 pm | August 13, 2019
Imprivata Identity Governance extends Microsoft’s IAM technology with role-based access controls, streamlined auditing processes and more.