Use this checklist to determine if your policies, procedures and on-going print device security maintenance are vulnerable to threats.
Error - something went wrong!
Other content in this Stream
Free Privacy and Security Incident Response Workshop in Kansas City
We invite you to attend our free Privacy and Security Incident Response Workshop on Wednesday, September 12th in Kansas City.
Free Privacy and Security Incident Response Workshop in St. Louis
We invite you to attend our free Privacy and Security Incident Response Workshop on Tuesday, August 21st in St. Louis.
Free Privacy and Security Incident Response Workshop in Denver
We invite you to attend our free Privacy and Security Incident Response Workshop on Thursday, August 16th in Denver.
Investigating and Assessing Incidents Reported by a Vendor
What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially breached your patients’ sens
Software Flaws: Why Is Patching So Hard?
Would More Telehealth Bring New Privacy, Security Concerns?
Humana Notifying Victims of 'Identity Spoofing' Attack
WannaCry, Petya 1 year later: The good, the bad and the ugly
Deception technology applied to pharma cybersecurity
Cyber Crime: Print and Save This Article — You May Not Be Able to After Ransomware Strikes
Selling (or Storytelling) Cybersecurity to the Board
This checklist describes seven tips to keep in mind when presenting cybersecurity to your organization's senior management or Board.
A year after WannaCry, healthcare organizations face mounting cyberthreats
Employees Suspended for Alleged Record Snooping
The 4 Most Commonly Missed Endpoint Devices in Healthcare
“Endpoint” is a term that seems to have a variable definition in many of today’s organizations. Like the name itself suggests an endpoint is simply any connected device capable of processing,...
Are We Solving The Right Problem?
MD Anderson Cancer Center Fined $4.3 M For Data Breach
Planning to Fail? And Did You Know?
Why penetration testing is key to protecting networks
Health System Seeks Patients' Help to Mitigate Email Mishap
Learning The Basics of Biomedical Security…From Ebola