Feature

Security School: Data protection strategies for health care

Health care organizations must take a comprehensive approach to protecting patient data. To comply with HIPAA, everything -- the hardware, the software, the network, even the data itself -- must be secured. This Security School provides health IT professionals with data protection strategies that will cover an organization's entire infrastructure.

Tip: Being a HIPAA-compliant wireless network

Medical devices, tablets, smartphones and RFID are forcing hospital wireless networks open. HIPAA privacy compliance is harder than ever, however. Here's how CIOs can cope.

Addressing HIPAA privacy compliance on hospital wireless network 

Tip: Avoiding a patient data breach -- and how to handle one if it does occur

More stringent state and federal laws require a more proactive patient data breach prevention and response by health care providers. Experts from AHIMA 2011 offer tips for both.

Avoiding a patient data breach -- and how to handle one if it does occur

Webcast: Securing data, hardware and software with encryption

If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This webcast will cover the basics of encryption and explain why its benefits outweigh its costs. 

Download the presentation slides

Podcast: Using identity and access management technology in a health care setting

Automated employee identity management systems can improve data security, reduce vulnerable access points and close security loopholes. That improves workflow and addresses new HIPAA rules that aim to combat data breaches and maintain patient privacy. This expert podcast covers the basics of using identity and access management (IAM) in health care. 

Using identity and access management technology in a health care setting

Quiz: Data protection strategies for health IT professionals

This Security School provides health IT professionals with data protection strategies that will cover an organization's entire infrastructure.

Take the quiz


This was first published in October 2011

Join the conversation Comment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.