<img height="1" width="1" src="https://www.facebook.com/tr?id=1217917531596620&amp;ev=PageView &amp;noscript=1">

Cyber Security: Handling Insider and Outsider Threats (Part 2)

Posted by The HCI Group on December 15, 2016 at 9:00 AM

Share linked in Facebook Twitter Google Plus
Cyber Security: Handling Insider and Outsider Threats (Part 2)

In part one of our series on cyber security, Ryan McDaniel discussed its importance, some examples, and the flaws of some traditional methods of breach prevention. In part two, he will go into detail on User Behavioral Analytics (UBA), and why it can be such a huge benefit to preventing a breach of your information.

Read More

Topics: Cyber Security

Cyber Security: Identifying Insider and Outsider Threats (Part 1)

Posted by The HCI Group on December 14, 2016 at 1:12 PM

Share linked in Facebook Twitter Google Plus
Cyber Security: Identifying Insider and Outsider Threats (Part 1)

Cyber security is critical to healthcare because healthcare, by definition, revolves around information collected from patients. In paper form, patient health information (PHI) can be cumbersome to store and difficult to access.  In response, many healthcare organizations have adopted electronic medical record (EMR) solutions. EMRs have added the benefit of simplifying storage and dramatically increasing ease of access. Unfortunately, the shift to EMRs has also increased the risk that unauthorized parties also have easier access to patient health information.

Read More

Topics: Cyber Security

Contact Us Here
Subscribe to Our Blog Here
Share linked in Facebook Twitter Google Plus
Stay up to Date on the Latest Healthcare IT Trends, Tips and Best Practices

Subscribe by Email

Recent Posts