|
doc
|
12/12/2012 |
Fifth Annual HIMSS Security Survey |
|
This survey reports the opinions of information technology (IT) and security professionals from healthcare provider
organizations across the U.S. regarding the tools and policies they have in place to secure electronic patient data. |
|
|
|
|
11/05/2012 |
Data Breach Case Study of Lessons Learned from the Field |
|
Data breaches just don't quit, and, for the most part, that's bad news for consumers and businesses. But there's good news too, in the lessons learned from recent events. The business community now has multiple points of reference about what works and what doesn't in breach preparedness and response. |
|
|
|
|
10/11/2012 |
Cyber Insurance and Your Data Breach Response Plan |
|
In recent months, several entities have publicly announced being affected by cyber incidents. Almost daily, online accounts are hacked, external hard drives are stolen and thumb drives are lost. |
|
|
|
webinarid
|
08/14/2012 |
Webinar: Data Breach Compliance and Response: Preparing for the First 24 Hours of a Data Breach and Beyond |
|
Today, more than ever, healthcare companies are at risk for the potential loss of medical records for reasons that vary from employee negligence to the ill-intent of a hacker who stands to gain a premium for medical information on the black market. So how will your organization conquer the hurdles and consequences of a data breach especially in the most important first 24 hours? |
|
|
|
|
06/25/2012 |
Ponemon Institute: Third Annual Study on Medical Identity Theft |
|
This annual study on medical identity theft is designed to determine how pervasive this crime is in the United States and how it has affected consumers. |
|
|
|
doc
|
06/06/2012 |
Ponemon Institute: 2012 Consumer Study on Data Breach Notification |
|
The new 2012 Consumer Study on Data Breach Notification by the Ponemon Institute finds consumers are critical of the notification letters they receive. |
|
|
|
doc
|
05/22/2012 |
Security as Business Risk: How Data Breaches Impact Bottom Lines |
|
Security is a business risk which must be accounted for in every organization¿s enterprise risk management plan. Find out how to protect your business. |
|
|
|
webinarid
|
05/10/2012 |
Webinar: The State of Healthcare Information Security Today |
|
HealthcareInfoSecurity conducted the Healthcare Information Security Today survey to provide an in-depth assessment of the effectiveness of data protection efforts. |
|
|
|
doc
|
05/07/2012 |
Data Breach Response Guide - Recently Updated |
|
Data breaches are hitting business in nearly every industry. If you aren't prepared, you're already behind - even if you've never experienced a breach. Learn how to develop your response plan and build your response team before you need them.
Recent updates include information directed toward entities dealing with healthcare related information and the complexities they might encounter in fielding a data breach.
|
|
|
|
doc
|
04/25/2012 |
Infographic: Unlock Data Breach Facts |
|
According to the Ponemon Institute, the norm is for organizations to experience not just one but a handful of breaches. These incidents weigh heavily on organizations long after they've occurred. The Unlock Data Breach Facts Infographic explores how. |
|
|
|
doc
|
03/06/2012 |
A Survey on Healthcare Information Security |
|
This survey reveals that 43 percent of healthcare organizations grade their ability to counter information security threats as poor, failing or in need of improvement. This can lead to an increased risk of a data breach. Learn what preparing for a data breach means and the steps that need to be taken from our industry experts.
|
|
|
|
doc
|
03/06/2012 |
Ponemon Institute: The Aftermath of a Data Breach |
|
The Aftermath of a Data Breach study by the Ponemon Institute shares the insights of IT professionals with actual experience dealing with a breach. |
|
|
|
doc
|
03/06/2012 |
Ponemon Institute: The Reputation Impact of a Data Breach |
|
According to this study, fifty-four percent of companies believe it can take 10 months to more than two years to restore a company's reputation following a breach of customer data. Find out what else executives are saying about how a data breach can affect the reputation and image of an organization.
|
|
|
|
doc
|
08/09/2011 |
Best Practices in case of a Healthcare Data Breach |
|
Customer turnover in response to a data breach continues to be a dominant factor in data breach costs. Learn what steps to take during the first 72 hours of a breach incident.
|
|
|
|
webinarid
|
06/19/2011 |
Medical Identity Theft Trends: The Importance of Securing Healthcare Data |
|
Learn about the findings from the Second Annual Survey on Medical Identity Theft and how it affects American consumers. |
|
|
|
webinarid
|
04/11/2011 |
State Legislation Effects on Data Breach Resolution |
|
This webinar discusses State data breach bills being considered in 2011, data breach incident response, and trends in data security legislation and regulation. |
|
|
|
webinarid
|
04/07/2011 |
Personal Health Information at Risk: Issues and Answers |
|
This webinar discusses consumers' privacy expectations, best practices for protecting data in compliance with HIPAA and HITECH, and what steps to take in the event of a data breach. |
|
|
|
doc
|
03/02/2011 |
Data Security Law in 2011: Responding to a Breach and Security Considerations for Engaging Vendors |
|
Eventually, almost every company may need to respond to a threat or actual data breach. There are steps to prepare and to get through an incident. This paper provides some helpful considerations to responding to a data breach and vendor relationship practices regarding data breach risk. |
|
|
|
doc
|
03/01/2011 |
Second Annual Survey on Medical Identity Theft |
|
This survey reveals the lack of awareness many Americans have about medical identity theft and
the devastating consequences it can have. These include financial loss, incorrect medical records
and harm to their credit scores. Moreover, medical identity theft appears to be an easy crime to
commit. |
|
|
|
webinarid
|
01/01/2011 |
How to Decrease Fraud Losses while Creating Customer Loyalty |
|
Breaches are about more than identity fraud. They are about placing brand equity and customer loyalty at serious risk. |
|
|
|
webinarid
|
01/01/2011 |
How Policy Will Shape Data Privacy in 2011 |
|
This webinar offer a brief overview of the changing landscape in data privacy and a look at how policymakers view the regulatory environment. |
|
|
|
doc
|
12/07/2010 |
Data Security Law in 2011: States Remain the Center of Attention |
|
State laws requiring "reasonable" data security have had a positive impact, but data breach notification laws have had the most profound effect on the improvement of data security. |
|
|
|
webinarid
|
12/07/2010 |
A 360 View of a Data Breach |
|
Find out what to do when there is a data breach, from investigation to notification. |
|
|
|
doc
|
12/01/2010 |
Data Breach Case Studies: From Incident to Resolution |
|
An investigative approach to data breaches. Learn important lessons learned from data breach case studies where some key tactics were applied. |
|
|
|
doc
|
11/19/2010 |
Legislative Update 2010: What's on the Horizon in DC & the States |
|
The new law, called the Dodd-Frank Act, will change the way many large and small financial institutions operate,
likely placing downward pressure on the availability of consumer credit. |
|
|
|
webinarid
|
09/23/2010 |
How to Conduct a HITECH Risk Assessment |
|
View this webinar to learn new insights into what you can do to proactively address HITECH compliance. |
|
|
|
doc
|
09/01/2010 |
Risk Assessment in a HITECH World - Healthcare Privacy and Security |
|
Learn the why and how of conducting a risk assessment for compliance with HITECH. Find out what approaches you should take and who should be involved to minimize vulnerability in healthcare privacy and security issues. |
|
|
|
webinarid
|
08/15/2010 |
Data Breaches in 2010: Causes Consequences, and How to Prepare Your Organization |
|
This webinar discusses do's and don'ts about how to react in the face of sudden data loss and gain key insights into developing a proactive data breach preparedness plan. |
|
|
|
doc
|
06/01/2010 |
Solutions & Best Practices for Addressing a Healthcare Data Breach |
|
Healthcare data breaches are an increasing issue & this paper addresses reasons for that. Find out what you need to know about data breach best practices in healthcare data breach resolution. |
|
|
|
doc
|
04/15/2010 |
Consequences of Medical Identity Theft & Healthcare Data Breaches |
|
An estimated 1.4M Americans were victims of medical identity theft in '09. This white paper addresses the impact of a breach to consumers and the business and provides data to support the conclusions. |
|
|
|
doc
|
03/31/2010 |
About Medical Identity Theft and Healthcare Data Breaches |
|
The frequency of medical identity theft is on the rise. Explore what that means to your company's and your client's risks of a medical data breach and potential loss of customer and brand loyalty. |
|
|
|
doc
|
10/01/2009 |
Combating the Rising Tide of Medical Identity Theft |
|
A data breach can be a gold mine for medical identity thieves. Learn about medical identity theft and how fraud resolution experience can help resolve the damaging consequences. |
|
|
|
doc
|
05/01/2009 |
Data Breach Response Best Practices Prepared for Experian |
|
Data Breaches have become commonplace ? 26% of U.S. consumers have received data breach notifications. This report lists best practices for organizations before, during, and after a data breach. |
|
|
|
doc
|
11/21/0201 |
Data Breaches - 2010 |
|
This paper discusses how data breaches happen and what your organization can do to prepare. |
|
|