CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

patient security

Results 26 - 36 of 36Sort Results By: Published Date | Title | Company Name
Published By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : 
online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex, remote access, compliance
    
WebEx Communications
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information, patient, privacy, confidential, protect, security, healthcare industry, access control, application security, authentication, business continuity, disaster recovery, identity management
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
When Daniel Shuler joined Phoenix Children’s Hospital (PCH) as CISO in 2016, he knew the hospital would be a tempting target for cyber criminals due to the massive troves of sensitive data it collects to diagnose and treat patients. Over the next three years, Shuler spearheaded a complete overhaul of PCH’s security fabric. First, he decommissioned the legacy AV and engaged BlackBerry Cylance’s ThreatZERO™ consultants to deploy CylancePROTECT® on over 4,000 endpoints. Soon after, CylancePROTECT stopped a ransomware attack that could have disrupted patient care by preventing access to electronic medical record data. Next, he engaged a BlackBerry Cylance Red Team to perform annual penetration testing assignments. Says Shuler, “Our relationship is unique in my experience. BlackBerry Cylance has proven repeatedly that they have our best interests at heart and that they share our commitment to provide the best care possible for children and their families.” Read the case study for the full s
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jul 09, 2014
To gain fast access to patient records, Kochi Medical School Hospital in Japan struggled to use aging mobile devices that were unreliable and expensive to repair. Read the case study to learn how the hospital used IBM Mobility Services and desktop cloud to deploy hundreds of mobile devices at a lower per-device cost in a security-rich cloud environment. IBM helped the hospital achieve anywhere, anytime access to patient records; maintain the confidentiality of patient medical information; improve patient care coordination; and increase staff productivity.
Tags : 
ibm, mobile computing, mobile computing system, cloud services, productivity, technology services, cloud platform, mobility, it management
    
IBM
Published By: Symantec Corporation     Published Date: Oct 03, 2013
This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata, network security, access control, application security
    
Imprivata
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Dell Storage     Published Date: Aug 14, 2012
The importance of healthcare providers to assure their patients the utmost security, confidentiality and integrity of their sensitive information cannot be understated. This means being HIPAA compliant within every aspect of their practice, with a particular emphasis on the components of their healthcare IT infrastructure This white paper described elements and best practices of a HIPAA compliant data center. This comprehensive guide spans the administrative, physical, and technical safeguards of the HIPAA Security rule from the physical security and environmental controls necessary of the facility itself, to the requirements needed between a Covered Entity (CE) and the data center provider when outsourcing. Detailing both the benefits and risks of a third-party partnership, this white paper provides answers to key questions such as what exactly makes a data center HIPAA compliant, what to look for when choosing a service provider to work with, and why a Business Associate Agreement (BAA) is important for establishing accountability with these partners.
Tags : 
hipaa, compliant, data, center, centers, healthcare, providers, assure, patients, utmost, security, confidentiality, integrity, sensitive, information, compliant, compliance, practice, particular, emphasis
    
Dell Storage
Published By: Great Bay Software     Published Date: Jan 09, 2019
"Only 51% of device makers follow guidance from the FDA to mitigate or reduce inherent security risks. See how hospitals can harness the benefits of connected medical devices to achieve operational efficiencies, provide better patient care and reduce the overall risk to patient safety. Watch this on-demand webinar to discover: • Emerging issues and trends that are risky to healthcare IT systems and can directly affect patient safety, violate their trust and impact revenue • Best practices for shoring up network security blind spots with real-time asset inventory, network authentication and automated enforcement controls • Why real-time endpoint visibility is the key to achieving an effective and proactive cybersecurity strategy"
Tags : 
    
Great Bay Software
Published By: Cox Business     Published Date: Dec 19, 2016
Exposing data or suffering downtime not only creates risks to patient safety, supports identity theft and damages the hospital's reputation, but can also result in signi?cant HIPAA penalties. The costs include the time your staff spends responding to the attack and lost productivity when systems are unavailable or work needs to be redone. Investing in computer and network security is a smart ?nancial decision for hospitals.
Tags : 
    
Cox Business
Published By: Lenovo - APAC     Published Date: Sep 27, 2019
Your patients demand excellent quality care. With single patient ID, medical grade hygiene and robust data security from Lenovo, you can offer them the very best outcomes.
Tags : 
    
Lenovo - APAC
Previous    1 2     Next   
Search