Healthcare Information Security

IT Security Resources

Security Awareness Training Strategies for Account Takeover Protection

It’s a common misconception that emailborne attacks come only from outside the organization. While most attacks start from the outside, attackers will typically look to land and expand once they are inside. One way they gain this foot... Download white paper

Case Study: Premera Elevates Level of Organizational Energy with HITRUST, Facilitating Communication and Collaboration

Premera Blue Cross wanted to apply a risk-based approach to IT security that would map to its capabilities for identifying risks, protecting assets, detecting attacks, responding to breaches, and restoring systems. The organization also wan... Download white paper

Case Study: PDHI Proves IT Security Posture to Clients by Leveraging HITRUST CSF

A number of years ago, key customers requested PDHI obtain a third-party attestation regarding the strength of the PDHI wellness platform's security posture in protecting personal health information. To take on this challenge, PDHI turn... Download white paper

Case Study: UPMC Turns to the HITRUST CSF Assessment to Help Manage Third-Party Risk

UPMC is partnering with an ever-increasing number of vendors—many of which are moving their applications and data services to the cloud. As a result, UPMC found that it was ineffective to individually assess the information security a... Download white paper

The Value of a HITRUST CSF Certification

In today's precarious threat landscape, the ability to provide assurances that sensitive data is being responsibly managed and adequately protected is no longer a nicety, but a necessity. Based on the market-leading security, privacy, a... Download white paper

Solving the Third-Party Risk Management Problem

While breaches related to third parties continue to increase, the state of third-party risk management has remained relatively stagnant. Why does this matter? To stay competitive, an organization must actively manage its supply chain, inclu... Download white paper

How Do I Know if an Assurance Report is ‘Rely-Able’?

The need to be able to understand and ultimately rely on the assurances provided by an organization, usually in the form of an information security and privacy control assessment report, is essential. Learn about the key areas to consider w... Download white paper

The New Playbook for Medical & Hospital Device Security

Medical device security has never been more important given a global pandemic and rising cyber attacks. The age of connected healthcare delivery is here, driving better patient care, reduced costs, and a wider attack landscape. Ransomware a... View webcast

The New Perimeter: Redefining the Healthcare Security Framework with Identity and Access Management

Traditional perimeter defenses are no longer enough for today’s healthcare organizations.   In a world of remote workers, cloud-based applications, and external resources, a new type of perimeter must be secured—user identi... View webcast

Preparing for the Next Surge: Resiliency Lessons for Healthcare Providers

As healthcare organizations brace themselves for a new surge, it’s a good time to look back on the early days of the health crisis for lessons in business resiliency. In this on demand webcast, we'll share the results of a su... View webcast

Cybersecurity For Healthcare - Enabling the Latest Advances in Patient Care While Protecting Against Cyber Attacks

The new healthcare security landscape has created multiple challenges in cybersecurity that are coming from multiple directions which will impact your healthcare business, as well as critical applications needed for lifesaving care. Di... Download white paper

Executive Summary: The Cybersecurity Remedy: How Healthcare Security Professionals Can Reduce Risk

While healthcare professionals are putting themselves on the frontline to protect and serve patients throughout the COVID-19 pandemic, bad actors are taking advantage of the current events to ramp up their efforts to cause harm. At the same... Download white paper

Infographic: Looking for the ideal security partner for healthcare?

Take a moment to review how Fortinet meets the unique and critical security needs of today’s healthcare organizations worldwide. Download white paper

[Panel] The Cybersecurity Remedy: How Healthcare Security Professionals can Reduce Risk

Healthcare professionals are putting themselves on the frontline, protecting and serving patients throughout the COVID-19 pandemic, but unfortunately, bad actors have been leveraging these events as a catalyst to ramp up their efforts to ca... View webcast

Best Practices for Medical Device Security

Advances in medical device technology help you deliver top-notch care, but who’s making sure those devices are healthy too? Hidden inside things like MRI and x-ray machines, infusion pumps, and patient monitors are vulnerabilities tha... View webcast

Kubernetes in Healthcare – Scale HIPAA Workloads Faster on AWS

Orchestrating disparate pieces of container architecture can be difficult, especially when you throw HIPAA in the mix. Kubernetes solves this problem, but introduces several new ones. Because Kubernetes requires a notoriously complex set up... View webcast

Key Business Continuity Topics: A Conversation on Practical Strategies To Improve Healthcare Organization’s Capabilities in Providing Care During Unanticipated Events

The current situation in healthcare provides a magnifying glass to critical aspects of healthcare organizations’ ability to continue business and clinical operations in all circumstances.  Healthcare IT leaders are always ch... View webcast

Securing Remote Access to Sensitive Patient Information While Minimizing Friction

Watch what Houston Methodist Hospital did when they needed to provide secure remote access to sensitive patient, physician and employee information while protecting access to a wide range of applications that include both on-premise and clo... View webcast