HIPPA Reports

HIPAA Compliance Takes Patient, Employee and Vendor Followup
sponsored by HP & Intel®
EGUIDE: This e-guide highlights ways health care providers improve their mobile device security in the wake of BYOD initiatives. Inside, learn how you can embrace the consumerization of IT while ensuring your facility remains compliant with HIPAA regulations.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

HP & Intel®

Simplify implementation of the HITRUST Common Security Framework
sponsored by Symantec Corporation
WHITE PAPER: Click through to explore the Health Information Trust Alliance (HITRUST) common security framework (CSF) which harmoniously combines compliance management controls for simplified, cost-effective HCO audit preparation.
Posted: 24 Apr 2014 | Published: 31 Mar 2013

Symantec Corporation

Optimize Data Management for Smarter Healthcare E-Book
sponsored by IBM
EBOOK: This e-book will examine the challenges healthcare organizations face today — and how data management techniques can help them deliver better care now and in the future.
Posted: 18 Mar 2011 | Published: 18 Mar 2011

IBM

Wireless LAN Best Practices for Compliant Care
sponsored by Aerohive Networks
WHITE PAPER: Access this white paper to discover how wireless LAN (WLAN) has become a critical part of healthcare network infrastructure.
Posted: 24 Mar 2014 | Published: 31 Dec 2013

Aerohive Networks

Safeguard Your Hospital Against Ransomware to Protect Data, Patient Security
sponsored by Optum
EGUIDE: In this e-guide, CIOs Keith Jennings and Andrew Rosenberg, M.D. share tips on what your organization can do right now to prevent a crippling ransomware attack. They explain new technologies, techniques and past experiences to help improve your healthcare organization's security posture.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

Optum

Driving Clinical Decision Support with Analytics Handbook
sponsored by TechTarget Health IT
EBOOK: Healthcare providers are looking for the right ways to improve care and help their patients, and the industry is turning more consistently to data analytics as a path to that improvement. The tips in this handbook, read in the context of patients, are a great place to start.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

TechTarget Health IT

E-Book: Encryption - What, Where and How
sponsored by TechTarget Health IT
EBOOK: This e-book, brought to you by SearchHealthIT.com, discusses key issues health care IT pros are facing now, including: HIPAA, the HITECH Act and the new frontier for encryption, network and server encryption, using thin clients to keep data secure, and much more!
Posted: 27 Oct 2010 | Published: 26 Oct 2010

TechTarget Health IT

Getting the PACS archive and EHR systems to talk to each other
sponsored by Ciena
EGUIDE: Complying with the HITECH Act involves the exchange of data -- such as medical images -- across interoperable systems. Unfortunately, opening up proprietary images enterprise-wide to patients and their physicians can be complex. Inside this expert e-guide, learn how to plan ahead for this process with preparation and testing strategies.
Posted: 10 Jun 2011 | Published: 10 Jun 2011

Ciena

Pulse E-zine: Vol. 2, No. 2
sponsored by TechTarget Health IT
EZINE: Access this edition of Pulse e-zine to explore the evolving mobile healthcare trend, and learn how to stay compliant for the dreaded unannounced HIPAA audits.
Posted: 07 May 2014 | Published: 07 May 2014

TechTarget Health IT

Technology, Training Team Up to Defend Endpoint Security
sponsored by TechTarget Health IT
EBOOK: At many healthcare organizations, endpoint devices can become areas for cybercriminals to exploit. In this handbook, learn how you can improve endpoint security through expert tips from the field, including advice from one hospital CIO on preventing HIPAA breaches with stronger endpoint security.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

TechTarget Health IT