Freshly Gathered Healthcare and Cybersecurity Articles

Share on linkedin
Share on twitter
Share on facebook

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you.

Want to know more about IAM for healthcare, or in general? Peruse our resources section for webinars, infographics, and educational videos. Keep your inbox feed fresh for summer, and keep the articles coming all year round. Subscribe to receive the biweekly dose of helpful Healthcare Cybersecurity Articles, delivered Tuesdays at 8 PM ET.

Fresh Autumnal Reads for Healthcare IAM Professionals

 

Healthcare Organizations Remain at Risk Despite Proper HIPAA Compliance via MedCity News

Patients expect their healthcare providers to meet compliance regulations and keep their valuable information safe. Just because an organization is HIPAA compliant, doesn’t necessarily mean your data is secure. Read how better email practices can keep patient data secure.

Ransomware is Rampant: Is Your Health Care Business Safe? via Medical Economics

In the battle against ransomware, the challenge is that essentially any health care business with older PCs, networks, firewalls, or operating systems is vulnerable, particularly those that do not immediately update to the latest software to “patch” security issues.

How to Create an Effective Incident Response Plan for Healthcare via HealthTech Magazine

Defending against cybersecurity threats is now a top priority for healthcare organizations. But what steps are necessary to design and implement an effective IR plan? (Hint: Idenhaus can help you there.)

How Healthcare Practices Can Teach Us Cybersecurity Wellness via SC Media Magazine

It’s no wonder that many terms in cyber security coincide with healthcare – good hygiene and healthy habits are integral to both systems. Perhaps cybersecurity can learn more from the healthcare system than previously thought.

Making The Case For Zero Trust via Idenhaus

Still wondering what the fuss is about for Zero Trust? See why the older models of perimeter security aren’t good enough these days, in the age of the cloud and work-from-anywhere. With new frontiers come new threats, and also the chance to expand horizons and create new and wondrous things.

 

Check out our previous digest of articles for healthcare cybersecurity professionals, 7 Fascinating Reads for Healthcare IAM Professionals.

Subscribe to our biweekly Healthcare IAM and Cybersecurity Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.


forbes technology council


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published. Required fields are marked *

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top