By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

health information management
The Evolving Role and Stature of Health Information Management (HIM)
Why You Should Ask Your Doctor To Show You Any “Alerts” In Your Electronic Medical Record
Three Asks: One Blog
Beyond the Buzz: ‘Tis the Season to Get Social
Doctors 2.0 & You: Interview with @pharmaguy


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

ADHD in adulthood
ADHD In Adulthood And Its Lasting Effects
Health
January 27, 2026
3d printing in modern medicines
From Concept To Care: How 3D Printing Is Reshaping Modern Medicine
Infographics Technology
January 27, 2026
titanium importance in healthcare
Why Titanium Matters In Modern Medicine
Health Infographics
January 27, 2026
Beautiful woman manager communicates with the client in the work
Can We Lower Healthcare Costs Outsourcing to the Philippines?
Health
January 24, 2026

You Might also Like

Assuring Safe Patient Health Information (PHI) in Radiology

August 14, 2014
Medical Records

4 Innovative Ways Healthcare Can Use Big Data to Improve Patient Diagnoses

February 2, 2017
Social Media

Social Media: Pharma Industry Considers Patient Engagement a Must

February 12, 2012
WomanonLaptop2.jpg
Social Media

A Primer to Personalization in Physician Marketing

June 10, 2016
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?