By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

ICD-11 – The Next-Generation Coding System
Alleged Photo Leaks Prompt Question: Can Apple Keep Healthcare Data Secure?
Transitioning To Electronic Health Records: From Financing To Implementation
Collaborating with Patients in the Digital Information Age
How Do You Decide What Features to Add to Your Software?


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

patient care
Independent Practices Must Keep Human Connection at the Core of Patient Communication
Health
April 29, 2026
6 Best ABA Software Tools That Help Clinics Reduce Administrative Work
6 Best ABA Software Tools That Help Clinics Reduce Administrative Work
Hospital Administration Medical Innovations
April 29, 2026
Best Video Systems for Health Care
How to Choose the Best Video Systems for Health Care
Global Healthcare Technology
April 22, 2026
How Workplace Hygiene Impacts Community Health Outcomes 
How Workplace Hygiene Impacts Community Health Outcomes 
Health
April 21, 2026

You Might also Like

chasedave
eHealth

5 Questions With Dave Chase, CEO of Avado

May 2, 2013

What Healthcare Can Learn From the New Department of Defense (DoD) Mobility Device Strategy

June 18, 2012

Survey Reveals Patient Opinions on HealthCare Websites

April 30, 2012
Dr. Mike Sevilla
BusinessGlobal HealthcareSocial Media

Dr. Anonymous: Blogger, Podcaster, Early Adopter [PODCAST]

September 29, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?