The following is a guest article by Dan Yerushalmi, CEO at AU10TIX In the ever-evolving world of healthcare, the shift from traditional paper records to...
Data Breach
The following is a guest article by Steve Weber, Professor of the Graduate School at UC Berkeley, and AJ Grotto, Director, Program on Geopolitics, Technology...
The following is a guest article by Dr. Richard Searle, Vice President of Confidential Computing at Fortanix, Inc. Today’s world is increasingly driven...
The following is a guest article by Oliver Patterson, Director of Product Management, VIPRE Security Group In the digital era, email has become an...
The following is a guest article by Ameesh Divatia, Co-Founder and CEO at Baffle Healthcare organizations were early adopters for protecting data in the modern...
Long-time readers of Healthcare IT Today will know that we love good infographics here at the office. There is nothing better than interesting statistics...
You’ve no doubt heard it. The healthcare industry has the dubious distinction of having had the three of the top six IT related security breaches this...
We’ve posted about it earlier on this blog as well, and it’s a point worth reiterating – most data breaches are not the result of hordes of...
Another example of a lost laptop storing sensitive information: A file containing identifying information for every physician in the country contracted with a...