Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

InfoSight Inc. Partners with the Essential Education Webinar Network to Provide Information Security Awareness Training for Healthcare Providers

28/07/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmzivnduvmtywl2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

InfoSight Inc., provider of Managed IT Security, HIPAA Compliance and Risk Management services for the healthcare industry, is partnering with the Essential Education Webinar Network to provide Information Security Awareness education to their hospice and palliative care members. InfoSight has served regulated industries nationwide by minimising risk exposure for more than 15 years, providing the highest levels of IT security assurance and regulatory compliance. InfoSight provides straightforward, highly-robust, affordable solutions. Offering a broad portfolio of IT security and compliance solutions designed to solve information technology challenges unique to the healthcare industry.

On Thursday, July 24th, InfoSight will present an educational webinar entitled: “Hospice & Palliative Care: Essentials of Information Security & Privacy”. The live presentation, followed by a question and answer session, will provide hospice and palliative care providers with the knowledge they need to protect their patients and themselves from breach, theft, and fraud.

Information security awareness education is critical to hospice care due to the great deal of sensitive patient information, including social, medical, and financial data that is handled by medical staff. Medical identity theft accounts for 43% of all identity theft in the U.S. and the number of medical identity theft victims is increasing, the potential for medical casualties is very high, and possibly life threatening. Hospice and palliative care professionals must understand the dangers and consequences of data breach and medical identity fraud and how to protect their patient’s and organisation’s sensitive information.

This article has been extracted from http://www.virtual-strategy.com, please click on this link to read the article in full http://www.virtual-strategy.com/2014/07/28/infosight-inc-partners-essential-education-webinar-network-provide-information-security-a

Montash is a multi-award winning, global IT recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Scientific Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...