By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

health technology
What’s in a Breath? Much More Than You May Think
How Practices Can Benefit From Text Messaging
Did HIMSS deliver on its Charter? Transforming Health through IT
Healthcare’s New Imperative: Population Health Management
Connecting Social Media and EHRs as a Research Tool


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

doctor talking on the phone
How Home System Conditions Shape Daily Health and Long Term Comfort
Health
April 9, 2026
healthcare communication
Independent Practices Should Keep Real People at the Heart of Patient Communication
Global Healthcare
April 8, 2026
rehab for substance abuse
Is 30-Day Inpatient Rehab Enough Time to Recover?
Addiction Recovery
April 8, 2026
men in white coat standing beside woman in white coat
Why Methylene Blue Has Grown in Popularity Across Europe
Mental Health
April 1, 2026

You Might also Like

Image
BusinessNewsSocial Media

Person-Centered HealthCare: EndoGoal – the Diabetes App That Rewards

October 19, 2012

5 Healthcare Industry Issues of 2016

January 25, 2016

The difference between doctors, patients and campaigns

October 12, 2015
eHealthPublic HealthSocial Media

4 Common Myths About Online & Social Media Health Content Debunked

December 11, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?