Healthcare Revenue Cycle Management, ICD-10, Claims Reimbursement, Medicare, Medicaid

Data Security Resources

How to Make Your Security Awareness Program Stick Year-Round

Did you know that 91% of successful data breaches started with a spear phishing attack? It's more important than ever to make sure your users are trained to spot these attacks before they affect your organization. And while security awa... View webcast

Detecting and Responding to Cyber Attacks in Healthcare

Healthcare has become a major target for hackers, and the industry has much work to do to prepare for and respond to attempts to access health IT infrastructure and protected health information. According to a recent Verizon Data Breach Inv... Download white paper

Defining the Roadmap in the Age of Intelligence: Matching Mind and Machine

Artificial intelligence (AI) is rewiring the way we think about healthcare. And rewiring the way doctors predict, diagnose and treat disease, how exams are carried out and how health systems are run. Is AI a game-changer? Absolutely, and th... Download white paper

Levers of Human Deception: the Science and Methodology Behind Social Engineering

No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.... View webcast

Securing Endpoint Devices Against Unauthorized Access

Medical device security has become a much bigger concern for healthcare organizations since ransomware attackers began using vulnerable medical devices in their attack campaigns. At the same time, there has always been industry and regulato... View webcast

Taking a Proactive Approach to Healthcare Vendor Security

Healthcare providers and vendors struggle with some of the same IT security challenges. Providers need to work with the vendors who are willing to improve their security so that both groups are more secure. When working with vendors around ... View webcast

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast

Ransomware in the Healthcare Industry: Fighting the Infection

In the healthcare industry, ransomware infections are their own medical emergency. Ransomware is the most common type of malware according to the 2018 Verizon Data Breach Investigations Report. Ransomware found in malware-related data breac... View webcast

Case Study: How Healthix Achieved Real-Time High-Accuracy Patient Matching

Healthix, the largest public HIE in the country, covers over 16 million patients. At this scale, accurate and real-time patient matching is a challenge. Learn how Healthix automated its data stewardship and improved its patient matching wit... Download white paper

Fast, Secure Access to PHI and Seamless EPCS at Peninsula Regional Medical Center

View this webinar to learn how Peninsula Regional Medical Center (PRMC) leverages strong, multifactor authentication to help unlock the full potential of their EMR. Utilizing solutions that are purpose-built for healthcare, PRMC delivered c... View webcast

X

Join 30,000 of your peers and get free access to all webcasts and exclusive content

Sign up for our free newsletter:

Our privacy policy


no, thanks

Continue to site...