HITInfrastructure

IT Security Resources

How to Make Your Security Awareness Program Stick Year-Round

Did you know that 91% of successful data breaches started with a spear phishing attack? It's more important than ever to make sure your users are trained to spot these attacks before they affect your organization. And while security awa... View webcast

Addressing Vendor Risk Management Through Secured Access

Healthcare relies heavily upon its business associates and third-party vendors to ensure seamless transactions, bolster care quality, and other processes. Covered entities employ systems to support access to data. In doing so, vendors can a... View webcast

Detecting and Responding to Cyber Attacks in Healthcare

Healthcare has become a major target for hackers, and the industry has much work to do to prepare for and respond to attempts to access health IT infrastructure and protected health information. According to a recent Verizon Data Breach Inv... Download white paper

Detecting and Responding to Cyber Attacks in Healthcare

The healthcare sector has remained a prime target for cybercriminals for the last several years. More concerning is that for many health delivery organizations a lot of these network intrusions can remain undetected for long periods of time... View webcast

What Most Computer Security Defenses are Doing Wrong, and How To Fix It

Most companies have huge gaps in their computer security defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: “Assume Breach”. But it doesn’t have to be that way! Join Roger... View webcast

12 Ways to Defeat Two-Factor Authentication

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven De... View webcast

State of Medical Device Cybersecurity and Emerging Technologies for Staying Ahead of Risk

Medical device security has become a much bigger concern for healthcare organizations in recent years. Vulnerable devices not only pose a risk to patients but also to organizations’ networks and systems.   A number of initiatives... View webcast

Levers of Human Deception: the Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.... View webcast

Securing Endpoint Devices Against Unauthorized Access

Medical device security has become a much bigger concern for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. At the same time, there has always been industry and regulato... View webcast

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Expert Advice: How to Stay Off the HIPAA “Wall of Shame”

HIPAA’s “Wall of Shame” lists all breaches that affected at least 500 individuals. In the past two years alone, 394 breaches made the list, almost a half of which was the result of unauthorized access or disclosure. How ca... View webcast

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Cambridge Health Alliance: Improving Patient Safety and Physician Satisfaction with EPCS

View this webinar to hear Cambridge Health Alliance's Arthur Ream III, CISO and Director of IT Applications, discuss the strategies used to integrate a fully DEA compliant solution for electronic prescribing of controlled substances dir... View webcast

Fast, Secure Access to PHI and Seamless EPCS at Peninsula Regional Medical Center

View this webinar to learn how Peninsula Regional Medical Center (PRMC) leverages strong, multifactor authentication to help unlock the full potential of their EMR. Utilizing solutions that are purpose-built for healthcare, PRMC delivered c... View webcast

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy


no, thanks

Continue to site...