Health Business Systems Admin/Manager

  • 6 Ways to Prevent Data Theft From Departing Employees

    6 Ways to Prevent Data Theft From Departing Employees

    Departing employees can take information out the door of your organization. You need a proper data protection strategy to prevent data theft.

    Read
  • ×

    All the Latest Healthcare Privacy and Security News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • GDPR and HIPAA: What are the Differences and How Can I Work Towards Compliance?

    GDPR and HIPAA: What are the Differences and How Can I Work Towards Compliance?

    Healthcare organizations are no strangers to protecting sensitive data under HIPAA requirements. But what do privacy regulations like GDPR mean for compliance?

    Read
  • 5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    Data security should prevent external attacks and insider threats because privileged user abuse is a top concern in the cloud. Find out more about preventing insider abuse in this article.

    Read
  • User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    Here are five lessons learned from user activity monitoring in Salesforce – and what to keep in mind when building a data governance program.

    Read
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • The Proliferation of PHI: Securing Patient Data in the Digital Era

    The Proliferation of PHI: Securing Patient Data in the Digital Era

    Technological innovation continues to expand every day in healthcare. New and emerging technologies solve industry challenges, create improvements in patient access, help protect patient data, and...

    Read
  • 5 Types of Insider Threats in Healthcare – and How to Mitigate Them

    5 Types of Insider Threats in Healthcare – and How to Mitigate Them

    Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian data privacy laws are complex – but which should you be most concerned about, and how can you ensure compliance? This post walks you through the top Canadian regulations and standards.

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Find out the five key insights that will help you decide whether you should build or buy cloud security solutions, courtesy of the tech and security leaders at Salesforce and PURE Insurance.

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Customer success is a huge focus for us at FairWarning. Because of that, we are excited to continue making major, 10x improvements in 2019, aimed at delivering more value than ever before for our...

    Read
  • Readers’ Choice 2018: Top 10 Posts on Healthcare Information Security, Privacy, and Compliance

    Readers’ Choice 2018: Top 10 Posts on Healthcare Information Security, Privacy, and Compliance

    Drug diversion, AI and machine learning, social engineering, insider threats: 2018 was a year of growing awareness of advanced healthcare data security threats, privacy considerations, and the...

    Read
  • What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...

    Read
  • IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM and Ponemon’s latest Cost of a Data Breach Report illustrates the dauntingly true cost of a data breach to an organization, from direct financial impact to reputational damage and churn. Below...

    Read
  • Privileged Users In Your Cloud Applications: Who Are They?

    Privileged Users In Your Cloud Applications: Who Are They?

    Privileged users of Salesforce, Office 365, and other mission-critical cloud applications are necessary to every organization. These are members of your organization who have more advanced...

    Read
  • FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    Discover why FairWarning accepted $60 million of growth capital after 13 incredible years of growth and profitability in this article.

    Read
  • A Multifaceted Approach to Healthcare Breach Prevention

    A Multifaceted Approach to Healthcare Breach Prevention

    Listen in as Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI), discusses her multifaceted breach prevention efforts.

    Read
  • loading
    Loading More...