By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

Tell Us YOUR Story – Patient Centered Care
Forecast Looks Clear for Cloud Computing
HealthCare Social Media: Social Networks Lead to Innovation and Quality
7 Reasons You Need Digital Marketing For Your Medical Practice
Video: Why You Should Allow BYOD–Bring Your Own Device–in Healthcare Environments


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

nurse checking her schedule
Managing On-Call Lists for Healthcare Open Shifts
Health
March 26, 2026
outdoor yoga class in sunny park setting
Resveratrol Capsules VS Resveratrol Powder: Are There Differences?
Health
March 26, 2026
Clinical Trials Demystified: Yousuf A. Gaffar, M.D’s Guide to Research and Patient Impact
Clinical Trials Demystified: Yousuf A. Gaffar, M.D’s Guide to Research and Patient Impact
Health
March 25, 2026
woman wearing white long sleeved shirt
Common Mistakes When Trying to Treat Hair Fall at Home
Fitness
March 20, 2026

You Might also Like

patient satisfaction survey
BusinesseHealth

Patient Partnerships and Patient Satisfaction: Are They the Same?

May 6, 2014

Re-Engineering the Hospital Discharge and Reducing Readmissions

March 22, 2013
Image
eHealthMobile HealthNewsPublic Health

Wal-Mart Clinics Go Live In the Cloud with Smart Care Doc–Telemedicine

June 5, 2012
multi screen
BusinesseHealthFinance

Multi-Screen Marketing: 17 Things You Need to Know

April 13, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?