HIPPA Reports

Strengthen Health IT Security, Maintain HIPAA Compliance
sponsored by PatientKeeper
EGUIDE: Download this expert guide to find out why HIPAA compliance is not guaranteed with ePHI security and uncover how strengthening you cybersecurity strategy can better protect patient data from attacks.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

PatientKeeper

E-Guide: FAQ: What is Health Data Archiving?
sponsored by BridgeHead Software
EGUIDE: Read this E-guide to learn more about the regulations involved in storing health data, how a SAN can improve data archiving and how to weigh the pro's and con's to achieve the most efficient data archiving strategy for your organization.
Posted: 12 Jan 2011 | Published: 05 Jan 2011

BridgeHead Software

E-Guide: Planning for virtualized disaster recovery in a health care setting
sponsored by BridgeHead Software
EGUIDE: Many enterprises have embraced virtualized disaster recovery because it restores functions with minimal hardware. Health care orgs can do this too, if they keep HIPAA in mind. Check out this e-guide for more information about planning your virtualized disaster recovery in a health care setting.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

BridgeHead Software

Imprivata Cortext: HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: This white paper reveals the top 2 best practices to ensure secure, HIPAA-compliant text messaging for the healthcare industry.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

Imprivata

HIPAA Compliance Checklist: The Key to Staying Compliant in 2020
sponsored by Ostendio
EGUIDE: Get insight on HIPAA's two fundamental rules, read up on the major elements of a HIPAA compliance program and review a HIPAA compliance checklist to ensure regulation requirements are satisfactorily met.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Ostendio

IDC White Paper: Imprivata’s Cortext HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: Access this white paper to explore a HIPAA compliant text messaging application that supports encrypted protected health information (PHI) to enable clinicians with rapid communications means, and explore best practices for implementation.
Posted: 06 Nov 2013 | Published: 31 Dec 2012

Imprivata

When Cyberthieves Attack, Technologies Have Your Back
sponsored by TechTarget Health IT
EZINE: Access this issue of Pulse e-zine now to gain insight into cybersecurity technologies such as multifactor authentication, behavioral analytics and honeypot to help prevent cyberthieves from stealing patient data. Also in this issue, we explore five key reasons why healthcare is so vulnerable a target for ransomware attacks.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

TechTarget Health IT

E-Book: New Rules for HIPAA
sponsored by TechTarget Security
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

TechTarget Security

BYOD and mHealth: Navigating Security and HIPAA
sponsored by Optum
EGUIDE: BYOD is almost the new norm for healthcare providers, and it has introduced the challenge of protecting devices and data without restricting employees' mobile capabilities. Find out how you can navigate the complex task of meeting HIPAA regulations while allowing the use of BYOD apps and devices, cloud services, and desktop virtualization.
Posted: 14 Jul 2016 | Published: 13 Jul 2016

Optum

Wireless LAN Best Practices for Compliant Care
sponsored by Aerohive Networks
WHITE PAPER: Access this white paper to discover how wireless LAN (WLAN) has become a critical part of healthcare network infrastructure.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

Aerohive Networks