Quantcast
Channel: Intel Health & Life Sciences
Browsing all 168 articles
Browse latest View live

BYOD in EMEA – Part 4 - Five Best Practice Tips for Bring Your Own Device in...

I’ve looked at many aspects of Bring Your Own Device in healthcare throughout this series of blogs, from the costs of getting it wrong to the upsides and downsides, and the effects on network and...

View Article


Top 3 Healthcare Security Takeaways from HIMSS 2015

Security was a major area of focus at HIMSS 2015 in Chicago. From my observations, here are a few of the key takeaways from the many meetings, sessions, exhibits, and discussions in which I...

View Article


Security on the Frontlines of Healthcare

  I recently had the privilege of interviewing Daniel Dura, CTO of Graphium Health recently on the subject of security on the frontlines of healthcare, and a few key themes emerged that I want to...

View Article

Healthcare Breaches from Loss or Theft of Mobile Devices or Media

Health and Human Services Breaches Affecting 500 or More Individuals website shows that there were 97 breaches of this type involving 500 or more patients in 2014, and 46 breaches of this type so far...

View Article

Healthcare Breaches from Insider Risks: Accidents or Workarounds?

In my last blog, Healthcare Breaches from Loss or Theft of Mobile Devices or Media, I looked at breaches resulting from loss or theft of mobile devices containing sensitive patient data. In this blog I...

View Article


Healthcare Breaches from Cybercrime

In my last couple of blogs, Healthcare Breaches from Loss or Theft of Mobile Devices or Media and Healthcare Breaches from Insider Risks: Accidents or Workarounds, I looked at breaches resulting from...

View Article

Healthcare Security is Increasingly About Survival

In the wild, no prey is completely safe from predators. However, it is clear to prey which members of the herd are weak or vulnerable to predators. They certainly also know which one is being pursued,...

View Article

6 Most Common Types of Healthcare Data Security Breaches

With all of the media hype around breaches, and pressure from your stakeholders to avoid being the  next headline, it is easy to focus too much on one or another type of breach, perhaps the one that...

View Article

Browsing all 168 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>