A Multifaceted Approach to Healthcare Breach Prevention
Listen in as Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI), discusses her multifaceted breach prevention efforts.
Aligning Cloud Security and Privacy Tactics to Meet Cloud Compliance
The cloud has come a long way since its introduction, as have the tactics used to establish compliance, security, and privacy. So what’s changed? Find out in this post.
Achieving Full Interoperability in Healthcare: 6 Pathways For Forward-Thinking Organizations
The report 'Sharing Data, Saving Lives: The Hospital Agenda for Interoperability' offers six pathways for accelerating interoperability at your organization.
9 Quotes About Creating a Drug Diversion Program at Your Healthcare Facility
These insightful quotes from the webinar, "Addressing Drug Diversion in Healthcare: Where Do I Start?" can help you craft or further develop your drug diversion program.
How to prepare for an OCR HIPAA audit proactively
An OCR audit can happen at any time. Find out how to prepare for a HIPAA audit and strengthen your privacy and compliance program.
6 Ways to Prevent Data Theft From Departing Employees
Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.
6 Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 1 of 2)
As a care provider, you can instill trust through a strong data privacy and security program. Here are six considerations for creating a comprehensive patient data privacy and security plan.
6 Cloud Security Challenges Facing CISOs in 2018 (and How CISOs are Surmounting The Challenges)
What must security and IT professionals look out for when managing their organizations’ cloud landscape? What cloud security challenges are CISOs facing in 2018? Find out in this blog post.
5 Ways to Gain Executive-Level Support for Building a Cybersecurity Program
You'll need executive buy-in if you want to successfully fund and build a robust cybersecurity program. Discover how you can gain leadership support in this blog post.
5 Ways One Financial Firm Strengthened Salesforce Data Security
United Capital was able to bolster their Salesforce security to protect sensitive customer financial data using these five methods. Find out what they are and how you can replicate their success here.
5 Types of Insider Threats in Healthcare – and How to Mitigate Them
Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.
5 sobering statistics related to drug diversion: What does it mean for Healthcare privacy and security?
Drug diversion is a severe concern in the healthcare industry. These statistics demonstrate the devastation this problem can have on communities and organizations.
5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud
Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.
5 Predictions for Healthcare Data Security and Privacy in 2019
2019 is slated to be a big year for healthcare data security and privacy. Explore our predictions for the coming year and what we think the most impactful trends will be in the industry.
5 More Considerations for Healthcare Organizations Building a Patient Data Privacy and Security Plan (Part 2 of 2)
When devising a patient data privacy and security plan, healthcare organizations need to consider these five things to ensure they leave no gaps.
5 Hospital Cybersecurity Considerations to Make During a Merger and Acquisition
What do hospital cybersecurity teams need to consider during a merger and acquisition? Find out in this post, which highlights five top considerations for teams to keep in mind during big changes.
5 Common Social Engineering Tactics and How to Identify Them
Explore the 5 most common social engineering tactics and learn the telltale signs to identify them and avoid attacks in this post.
5 Business Benefits of Monitoring Salesforce Login Activity
What are the top 5 business benefits of monitoring Salesforce login activity? You might catch someone logging in when they shouldn't be and stealing data. Find out more in this post.
4 Things You Can Quickly Learn From Monitoring Salesforce Data Exports
What can monitoring Salesforce data exports tell you? For one, the user might be departing your organization soon. Find out other insights you can learn from monitoring in this post.
4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do
To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.