By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

wearable technology
How Wearables Will Transform the Health Insurance Game
The Roles Of AI, IoT, And Cybersecurity In Transforming Healthcare
What to Look For in Patient Management Software
5 Plastic Surgery Marketing Tactics to Boost New Patient Response
The Dawn of the Worried Well


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

post-surgical recovery
Your Guide To Key Milestones In At Home Post-Surgical Recovery
Health Infographics
December 14, 2025
Dehydration Poses Serious Risks For Older Adults
Why Dehydration Poses Serious Risks For Older Adults
Infographics Senior Care
December 14, 2025
care settings
Hidden Risks In Care Settings: Who Faces The Greatest Threat From Healthcare-Associated Infections
Global Healthcare Health care Infographics
December 14, 2025
Medical Appointment
From Scheduling To Follow-Up: The Full Lifecycle Of A Medical Appointment
Infographics Medical Education Policy & Law
December 14, 2025

You Might also Like

eHealthHealth careTechnology

5 Positive Uses Of Healthcare IoT You Should Know About

June 26, 2020
The Yoga Nurse
Social MediaWellness

The Yoga Nurse: Annette Tersigni [PODCAST]

March 2, 2015
Image
eHealth

Medical Device Connectivity: Interview with Capsule’s Stuart Long

April 20, 2013

Crowdfunding American Veterans – A Brilliant Idea

July 16, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?