By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

2012 Healthcare Data Breach Update
Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR
New Website Helps Patients Avoid Bad Medical Treatments
Driving Your Healthcare Marketing Further in 2016
Healthcare Leaders to Senate Finance Committee: “Transparency Can Only Go So Far”
Really Local Healthcare Marketing


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

high-risk mdical case
Countdown To Care: What Happens In The 48 Hours Before A High-Risk Medical Case
Health Infographics
March 12, 2026
healthcare facilities
Behind The Cabinets: Why Secure Storage Matters In Modern Healthcare Facilities
Global Healthcare Infographics
March 12, 2026
beyond emergency rooms
Beyond The Emergency Room: Long Term Health Effects After Major Accidents
Health Infographics
March 12, 2026
nurse leaders
Shaping Tomorrow’s Healthcare: The Role of Nurse Leaders
Nursing
March 10, 2026

You Might also Like

ONC Releases RFI on Catalyzing Interoperability of EHRs at HIMSS13

March 7, 2013
Conversion-Optimization-PPC-Healthcare-Marketing-Digital-Marketing.jpg
Social Media

How to Optimize Your Healthcare Marketing: Common Conversion Rate Improvement Tactics

January 15, 2016

Engaging Consumers for Improved Cost, Quality and Outcomes

December 16, 2012

We Know ‘There’s an App For That’–But Are Drug-Makers Ready to Catch Up?

July 20, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?