By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

Making Health Addictive: Use Unpredictable Rewards
Social Media and Doctors: Q&A with Doximity CEO Jeff Tangney
Conquering Mental Illness: New Technology Options
Mobile Health Around the Globe: Monitoring Melanoma with a Mobile
Social-Business Intranet Empowers and Engages Geisinger Health Employees


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

care settings
The States Leading on Nurse Practice Authority and Why It Matters for Your Career
Career Nursing
April 14, 2026
brain food matters
Brain Food Matters: How Nutrition Shapes Early Development
Health Infographics
April 14, 2026
understanding the teens burnout
Understanding Teen Burnout And Its Lasting Effects
Health Infographics
April 14, 2026
hearing loss issue
How Technology Supports Children With Hearing Loss
Infographics Technology
April 14, 2026

You Might also Like

negative online doctor reviews
eHealthSocial Media

How to Think About Negative Online Reviews

October 19, 2013

Two Truths and a Lie about Physicians and Social Media

April 2, 2016
Physician Social Media Infographic via Nicola Ziady
BusinesseHealthHospital AdministrationSocial Media

What Social Media Site Is Your Doctor Networking on?

June 8, 2013

Interview with Liza Bernstein: ePatient, Breast Cancer Survivor, and Social Media Person

April 6, 2013
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?