Network Infrastructure
Privacy & Security
7993
181
An identity and access management expert illustrates this critical area of information security and offers tips on how to best control who is accessing protected health information.
2803
92
Underlying weaknesses in common OS’s are slowing hospitals down. Software can help fix them.
8018
194
The communications system, integrated with the provider’s Epic EHR, is used throughout most of the medical center, and it has helped the organization boost HCAHPS scores in almost every measure.
Security
9845
232
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.
Security
2655
114
A new industry survey finds that a lack of network visibility is impairing already overworked cybersecurity teams.
Privacy & Security
7103
192
An expert in the strategies and technologies surrounding identity and access management walks through today’s challenges and discusses how provider organizations can best secure this key area.
Security
3646
185
BluePrint's visualization software coalesces security program data from disparate sources into a central "source of truth" founded on the company's workflow automation and rules engine.
Security
5351
177
The Healthcare and Public Health Sector Coordinating Council has developed a guide to building a robust cybersecurity workforce, offering four suggestions for developing skills.
Security
5603
255
BlueKeep? Dridex? A state of emergency in Louisiana? Healthcare security pros find themselves living in interesting times. But with new threats emerging each day – and old ones, like phishing, not going away – some tried and true lessons are still useful.
SPONSORED
3024
136
Failing to invest in the right technologies at the right time can eventually force patients to look elsewhere for their health services.