Use this checklist to determine if your policies, procedures and on-going print device security maintenance are vulnerable to threats.
Error - something went wrong!
Other content in this Stream
The Top Four Healthcare Cybersecurity Trends for 2018
In order to explore the likely cybersecurity trends coming our way in 2018, we must first take a quick look back at 2017. Last year was a banner year in about as many ways as one can think of....
HIPAA Enforcement: 2017 Year in Review
2017 will go down as a change year for Health Insurance Portability and Accountability Act (HIPAA) enforcement of the Privacy, Security, and Breach Notification Rules. This comes on the heels of...
HIPAA Enforcement: The 2018 Outlook
Ransomware Focus Limits Healthcare IT Progress in 2017
Stop the Insanity: Physician’s Information Security Practices Must Change to End Cyberattacks
2017 Health Data Breach Tally: An Analysis
Clinical Research: The EHR Can Be Your Friend If You Want It To Be
Uniting Print and Digital Security in Healthcare: Why Your Fancy Cybersecurity Solution Isn’t Enough
8 Lessons Learned on Perimeter Security for all Healthcare Executives
Countdown to 2018: Top Health IT Security Trends
Offshoring PHI: Addressing the Security Issues
'Do's and Don'ts' for Dealing with Regulators
Guide to Proactive Access Monitoring and Auditing Under the HIPAA Security Rule
Monitoring and auditing of access to protected health information by many organizations is prompted by patient complaints or some other event triggering the need to conduct an investigation. This...
GAO: CMS Must Improve Medicare, Medicaid Anti-Fraud Efforts
Insider Allegedly Steals Mental Health Data of 28,000 Patients
What is the NH-ISAC 90-Day DMARC Challenge?
Healthcare organizations are more vulnerable to phishing attacks as the average maturity of security controls and training is less than that of other industries, such as banking. Successful...
Lawsuit: Hospitals Lied About Providing Quick Records Access
Closing the Security Gap: How Many Devices are on Your Network?
How to Prepare for Phishing Attacks
Understand the steps necessary to determine if your employees have the ability to recognize a phishing attack and how to be prepared for one.
$1 Billion Lawsuit Focuses on EHR Data Integrity Concerns