<img height="1" width="1" src="https://www.facebook.com/tr?id=1217917531596620&amp;ev=PageView &amp;noscript=1">

Cyber Security Series: Business Email Compromise

Posted by The HCI Group on January 20, 2017 at 1:29 PM

Share linked in Facebook Twitter Google Plus
Cyber Security Series: Business Email Compromise

EHRs are revolutionizing patient care by greatly increasing the ease in which physicians can deliver care to their patients. A major concern that healthcare organizations that have access to an EHR should have, however, is making sure that the sensitive patient data stored on them is secure. These healthcare facilities need to be aware of both external and internal threat, as well as how to be prepared for them.

Read More

Topics: Cyber Security

Cyber Security: Handling Insider and Outsider Threats (Part 2)

Posted by The HCI Group on December 15, 2016 at 9:00 AM

Share linked in Facebook Twitter Google Plus
Cyber Security: Handling Insider and Outsider Threats (Part 2)

In part one of our series on cyber security, Ryan McDaniel discussed its importance, some examples, and the flaws of some traditional methods of breach prevention. In part two, he will go into detail on User Behavioral Analytics (UBA), and why it can be such a huge benefit to preventing a breach of your information.

Read More

Topics: Cyber Security

Cyber Security: Identifying Insider and Outsider Threats (Part 1)

Posted by The HCI Group on December 14, 2016 at 1:12 PM

Share linked in Facebook Twitter Google Plus
Cyber Security: Identifying Insider and Outsider Threats (Part 1)

Cyber security is critical to healthcare because healthcare, by definition, revolves around information collected from patients. In paper form, patient health information (PHI) can be cumbersome to store and difficult to access.  In response, many healthcare organizations have adopted electronic medical record (EMR) solutions. EMRs have added the benefit of simplifying storage and dramatically increasing ease of access. Unfortunately, the shift to EMRs has also increased the risk that unauthorized parties also have easier access to patient health information.

Read More

Topics: Cyber Security

Contact Us Here
Subscribe to Our Blog Here
Share linked in Facebook Twitter Google Plus
Stay up to Date on the Latest Healthcare IT Trends, Tips and Best Practices

Subscribe by Email

Recent Posts