Health care organizations must take a comprehensive approach to protecting patient data. To comply with HIPAA, everything -- the hardware, the software, the network, even the data itself -- must be secured. This Security School provides health IT professionals with data protection strategies that will cover an organization's entire infrastructure.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Tip: Being a HIPAA-compliant wireless network
Medical devices, tablets, smartphones and RFID are forcing hospital wireless networks open. HIPAA privacy compliance is harder than ever, however. Here's how CIOs can cope.
Tip: Avoiding a patient data breach -- and how to handle one if it does occur
More stringent state and federal laws require a more proactive patient data breach prevention and response by health care providers. Experts from AHIMA 2011 offer tips for both.
Webcast: Securing data, hardware and software with encryption
If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This webcast will cover the basics of encryption and explain why its benefits outweigh its costs.
Podcast: Using identity and access management technology in a health care setting
Automated employee identity management systems can improve data security, reduce vulnerable access points and close security loopholes. That improves workflow and addresses new HIPAA rules that aim to combat data breaches and maintain patient privacy. This expert podcast covers the basics of using identity and access management (IAM) in health care.
Quiz: Data protection strategies for health IT professionals
This Security School provides health IT professionals with data protection strategies that will cover an organization's entire infrastructure.