Health Care Security: Midyear Checkup on Security Trends

Predictions for health care security in 2016 were grim. What can we learn about the industry and its risks at this midyear checkup?

The post Health Care Security: Midyear Checkup on Security Trends appeared first on Security Intelligence.

Continue reading Health Care Security: Midyear Checkup on Security Trends

Safeguard Health Care Identities and Data With Identity Governance and Intelligence

Identity governance and intelligence solutions are poised to help health care organizations secure personal data and electronic medical records.

The post Safeguard Health Care Identities and Data With Identity Governance and Intelligence appeared first on Security Intelligence.

Continue reading Safeguard Health Care Identities and Data With Identity Governance and Intelligence

Strengthening the Health Care Industry’s Security Immune System

A security immune system should comprise multiple layers of defense that work together to protect the entire organism regardless of where threats come from

The post Strengthening the Health Care Industry’s Security Immune System appeared first on Security Intelligence.

Continue reading Strengthening the Health Care Industry’s Security Immune System

Information Security Across Industries: What’s Hot?

There are hot information security topics that are taking hold throughout various industries, and it’s important to have a grasp on these concepts.

The post Information Security Across Industries: What’s Hot? appeared first on Security Intelligence.

Continue reading Information Security Across Industries: What’s Hot?

Mobility NOW: Mobilizing Health Care Delivery for Better Outcomes

Explore the security challenges and productivity benefits of leveraging mobile devices in the health care industry in this episode of Mobility NOW!

The post Mobility NOW: Mobilizing Health Care Delivery for Better Outcomes appeared first on Security Intelligence.

Continue reading Mobility NOW: Mobilizing Health Care Delivery for Better Outcomes

Is It the Breadth of the Breach or the Value of the Volume?

Organizations that suffer a breach face extremely high costs, but cybercriminals don’t have to cough up as much to start building profiles of victims.

The post Is It the Breadth of the Breach or the Value of the Volume? appeared first on Security Intelligence.

Continue reading Is It the Breadth of the Breach or the Value of the Volume?

Breaking Borders: Is HIPAA History in a Post-EHR World?

The rash of cyberattacks on health care organizations has highlighted the need for the industry to move beyond HIPAA to develop stronger security strategies.

The post Breaking Borders: Is HIPAA History in a Post-EHR World? appeared first on Security Intelligence.

Continue reading Breaking Borders: Is HIPAA History in a Post-EHR World?