Use this checklist to ensure you have the required supporting documentation for a Meaningful Use Audit.
Error - something went wrong!
How to Prepare for Phishing Attacks
Understand the steps necessary to determine if your employees have the ability to recognize a phishing atta...
Other content in this Stream
What Can Healthcare Learn from the Marriott Data Breach?
DDoS protection, mitigation and defense: 8 essential tips
Phishing Scams in Healthcare: A Persistent Threat
Another Healthcare Website Security Issue Revealed
Attack on Billing Vendor Results in Massive Breach
Zero Days vs. Standard Ways
A few days ago, a new vulnerability was found that affects the security of encrypted data, specifically on full-disk encrypted drives using hardware encryption protocols. For some time now, it has...
3 Major Misconceptions About Managed Print Services in Healthcare
FDA Reacts to Critique of Medical Device Security Strategy
Mac McMillan Speaks to the Troubling Trend that Hospitals Still Aren’t Prioritizing Security
HHS Tries Again: New Cyber Coordination Center Launched
PODCAST: Managing the Aftermath of a Cyber Incident with a Strategic Incident Response feat. David Finn
Cyber Incidents in Healthcare: How Much Would You Pay?
Medicaid Data Breach Trends: An Analysis
Texas Retirement Agency Portal Breach Affects 1.25 Million
Analysis: Did Anthem's Security 'Certification' Have Value?
A CIO guide to building a dashboard for cybersecurity
IBM's cybersecurity semi is rolling into Austin
Obamacare System Breach Affects 75,000
Can't afford a security chief? Here are the alternatives
Anthem Mega-Breach: Record $16 Million HIPAA Settlement