SearchHealthIT TechTarget TechTarget
Sign-up now. Start my free, unlimited access.
Login Register
  • Techtarget Network
  • News
  • Features
  • Tips
  • More Content
    • Answers
    • Buyer's Guides
    • Definitions
    • Essential Guides
    • Opinions
    • Photo Stories
    • Podcasts
    • Quizzes
    • Tutorials
  • Photo Stories
  • SearchHealthIT
  • Topic Health IT compliance
    • EHR systems
    • Health care regulations
    • IT infrastructure
    • Health IT planning
    • Health IT conferences
    • Hospital IT applications
    • All Topics
  • SubTopic Security
    • Privacy
    • Security
    • Safety
    • All Subtopics
  • Follow:
    • Download
  • Share this item with your network:
  • Download

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Download This Issue

Health IT

Storage needs for data backup in health care August 2012
In This Issue
  • TipTip: Developing a HIPAA-compliant storage plan
  • TipMeeting HIPAA disaster recovery requirements tough but possible
  • TipWhat Joplin teaches hospitals about disaster recovery planning
  • Tip: Developing a HIPAA-compliant storage plan

    Establishing HIPAA-compliant storage plans requires a three-pronged approach to meet disaster recovery, data backup and emergency operations criteria.Read More

  • Meeting HIPAA disaster recovery requirements tough but possible

    The HIPAA Security Rule requires all covered entities to create a disaster recovery plan but says little about what should go into such a plan. This tip fills in the gaps.Read More

  • What Joplin teaches hospitals about disaster recovery planning

    Last month's tornado in Missouri left one hospital destroyed and others scrambling to treat patients. A new EHR system, fast vendor support and operational WAN all helped. Read More

Health IT Explore the hottest topics and trends in today’s complex (and competitive) health IT market. Readers get access to major news stories, industry research, on-location conference coverage and exclusive advice from CIOs on the leading-edge.

Latest TechTarget resources

  • Compliance
  • CIO
  • Cloud Computing
  • Mobile Computing
  • Security
  • Storage

SearchCompliance

  • CCPA compliance begins with data inventory assessment

    In this SearchCIO Q&A, multiple experts sound off on major questions businesses have about CCPA compliance ahead of its January ...

  • Security, compliance standards help mitigate BIOS security vulnerabilities

    Cybersecurity vulnerabilities associated with PCs often overlook BIOS. Read for strategies to offset these threats and for ...

  • Risk assessments essential to secure third-party vendor management

    Panelists at Infosec North America advised those charged with third-party vendor management to perform due diligence and assess ...

SearchCIO

  • AI bots: How GE is adapting traditional management to AI

    To get a handle on its AI strategy, GE is making AI more human: It's creating AI bots and assigning them to managers. Challenges ...

  • Should your company hire a chief AI officer?

    Aramark's newly appointed chief AI officer, along with senior IT leaders from Kohl's, eBay and Square, make the case for an AI ...

  • 21st-century CIO job description puts CIOs in vortex of emerging tech

    The ban against pursuing tech for tech's sake -- it's been lifted. CIOs need to dive into emerging tech to extract its business ...

SearchCloudComputing

  • Control the cloud bill and avoid unexpected costs

    Don't get discouraged by high cloud costs. Use these four tips to whip your bill into shape.

  • Back up VMs with Azure snapshots and managed disks

    Follow these steps to take VM snapshots in Microsoft Azure and learn when the technique is -- and isn't -- the right fit for your...

  • IBM's hybrid cloud plans extend AI to users across platforms

    IBM doubles down on its hybrid cloud strategy with tools to help customers funnel data through their chosen cloud platform and ...

SearchMobileComputing

  • Know when to allow mobile device backup

    Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow...

  • Why UEM could overshadow the EMM market

    As IT has been overwhelmed with too many tools to manage devices, UEM attempts to simplify the situation. Here's what to expect ...

  • Samsung's 1 TB internal phone storage means headaches for IT

    Samsung's new embedded Universal Flash Storage brings 1 TB of potential problems for IT.

SearchSecurity

  • Astaroth Trojan returns, abuses antivirus software

    Cybereason's Nocturnus Research team has discovered a new strain of the Astaroth Trojan that attacks antivirus software to steal ...

  • Ponemon study: Poor password practices remain rampant

    More than two-thirds of employees share passwords with colleagues, research reveals. Experts sound off on what's fueling poor ...

  • Dunkin' security alert warns of new credential-stuffing attacks

    Dunkin' sent a security alert to customers warning of potentially malicious access of accounts due to the second credential ...

SearchStorage

  • NetApp founder Dave Hitz steps away after 26 years

    Retiring founder of NetApp Dave Hitz says the vendor is well-positioned for industrywide storage transitions, but recent sales ...

  • RAID levels and benefits explained

    RAID can enable better data storage performance and higher availability, and there are many different types of RAID. Read about ...

  • HPE InfoSight to add support for partners' storage products

    HPE CTO Milan Shetti outlines plans to add support for partners' storage products in its InfoSight predictive analytics platform ...

  • About Us
  • Meet The Editors
  • Contact Us
  • Privacy Policy
  • Advertisers
  • Business Partners
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Archive
  • Site Map
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

All Rights Reserved, Copyright 2009 - 2019, TechTarget

Close