Health Business Systems Admin/Manager

  • The Proliferation of PHI: Securing Patient Data in the Digital Era

    The Proliferation of PHI: Securing Patient Data in the Digital Era

    Technological innovation continues to expand every day in healthcare. New and emerging technologies solve industry challenges, create improvements in patient access, help protect patient data, and...

    Read
  • ×

    All the Latest Healthcare Privacy and Security News, in Your Inbox

    First Name
    Last Name
    Company Name
    Thank you!
    Error - something went wrong!
  • Should You Build or Buy a Salesforce Data Protection Solution?

    Find Out Now
  • 5 Types of Insider Threats in Healthcare – and How to Mitigate Them

    5 Types of Insider Threats in Healthcare – and How to Mitigate Them

    Every healthcare organization needs to defend itself from a major security concern – insider threats. From the malicious worker to the careless employee, these are the insiders you need to thwart.

    Read
  • Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    Canadian Data Privacy Laws, Security Frameworks, and Cloud Compliance

    In an increasingly digital world, personal information is becoming harder to protect. In response, many countries have developed and enacted privacy laws to strike a balance between information...

    Read
  • The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    The Admin’s Guide to Salesforce Visibility: Using Event Monitoring to Boost ROI, Productivity

    Salesforce has quickly become a mission-critical application for organizations of all types. The great news for admins is that Salesforce visibility can show you not only how users are adopting...

    Read
  • How Are Salesforce Customers Building a Reputation of Trust?

    Find Out Now...
  • 4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    4 More Salesforce Event Monitoring Myths: Understanding What Event Monitoring Does (and Doesn’t) Do

    To get the most value from Salesforce Event Monitoring, you must know what the tool does and doesn't do. Uncover the myths and facts and obtain more information by reading this post.

    Read
  • Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    Build or Buy Cloud Security: 5 Key Insights for Choosing a Solution from Salesforce and PURE Insurance Tech Leaders

    In order to build trust and meet compliance standards, it’s essential for financial services firms to protect and secure sensitive data. But it’s not always simple to implement a security...

    Read
  • 3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    3 Salesforce Event Monitoring Facts and Misconceptions: Understanding What it Does (and Doesn’t) Do

    Salesforce Event Monitoring is the only way to obtain your Salesforce user activity log files...true or false? Explore common myths about Event Monitoring in this eye-opening blog post.

    Read
  • The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    The Hidden Threat in Your Organization: Preventing Privileged User Abuse In Salesforce

    Read
  • Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Build vs. Buy Cloud Security Software: 4 Must-Ask Questions During the Decision-Making Process

    Balancing an organization’s immediate needs while considering long-term growth can be challenging, especially when deciding whether to build vs. buy cloud security software. Cloud solutions can...

    Read
  • Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Inspired by Our Customers: FairWarning Year in Review for 2018 — and Vision for 2019

    Customer success is a huge focus for us at FairWarning. Because of that, we are excited to continue making major, 10x improvements in 2019, aimed at delivering more value than ever before for our...

    Read
  • Readers’ Choice 2018: Top 10 Posts on Healthcare Information Security, Privacy, and Compliance

    Readers’ Choice 2018: Top 10 Posts on Healthcare Information Security, Privacy, and Compliance

    Drug diversion, AI and machine learning, social engineering, insider threats: 2018 was a year of growing awareness of advanced healthcare data security threats, privacy considerations, and the...

    Read
  • GDPR and HIPAA Compliance: What are the Differences and How Can I Work Towards Compliance?

    GDPR and HIPAA Compliance: What are the Differences and How Can I Work Towards Compliance?

    Healthcare providers and payors in the United States are no strangers to protecting sensitive data under HIPAA requirements. But with new privacy regulations such as the European Union (EU)...

    Read
  • What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    What to Monitor in the Cloud: 2018 Cloud Visibility Report Reveals Blueprint to Success

    Cloud spending is forecasted to reach $160 billion in 2018 – a 23.2 percent increase over 2017. Businesses around the globe are capturing the benefits of cloud technology to meet consumer demand...

    Read
  • IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM Released Its 2018 Data Breach Study — and Financial Services and Healthcare Organizations are Taking Note to Maintain Customer Trust

    IBM and Ponemon’s latest Cost of a Data Breach Report illustrates the dauntingly true cost of a data breach to an organization, from direct financial impact to reputational damage and churn. Below...

    Read
  • Privileged Users In Your Cloud Applications: Who Are They?

    Privileged Users In Your Cloud Applications: Who Are They?

    Privileged users of Salesforce, Office 365, and other mission-critical cloud applications are necessary to every organization. These are members of your organization who have more advanced...

    Read
  • User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    User Activity Monitoring in Salesforce: 5 Lessons Learned for a Stronger Data Governance Program

    Salesforce has emerged as a mission-critical application for major enterprises. In fact, a single Salesforce customer instance can store vast amounts of regulated, confidential, and proprietary...

    Read
  • FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    FairWarning Accepts $60 Million of Growth Capital to Deliver More Value to the Market, Faster than Ever Before

    Here is Why We Selected Mainsail Partners in a Very Competitive Process for FairWarning  Read the Official Press Release Today, I am thrilled to announce FairWarning’s decision to accept $60...

    Read
  • 5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    5 Reasons Why Privileged User Abuse is a Top Security Concern in the Cloud

    Privileged user abuse is a common insider threat that leads to massive security incidents like data breaches or severe data leakage. Find out why it's a top security concern and how to fight it here.

    Read
  • A Multifaceted Approach to Healthcare Breach Prevention

    A Multifaceted Approach to Healthcare Breach Prevention

    Dai Snyder, Delegated Oversight Program Manager of the Care Coordination Institute (CCI) sat down with Marianne Kolbasuk McGee at Healthcare Info Security to discuss Snyder’s multifaceted breach...

    Read
  • Departing Employees Exit Your Building — But Have They Truly Left?

    Departing Employees Exit Your Building — But Have They Truly Left?

    Although departing employees may exit through a single door of your organization, there is a myriad of potential digital-doors back into your company’s network. If not properly offboarded,...

    Read
  • loading
    Loading More...