By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Video: How to Prevent Costly Healthcare IT Security Breaches
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Video: How to Prevent Costly Healthcare IT Security Breaches
eHealth

Video: How to Prevent Costly Healthcare IT Security Breaches

Fred Pennic
Fred Pennic
Share
1 Min Read
SHARE


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.


It’s every CIO’s worst nightmare: a laptop computer with patient health information goes missing or is stolen. Not only does this breach jeopardize your patients’ privacy, it almost always means costly penalties for your organization.
Now, thanks to advancements in anti-theft technology, many CIOs have enabled laptops to protect themselves in these types of situations. The latest anti-theft technology triggers an automatic remote lockdown scenario, or “poison-pill,” to keep patient data safe and secure.

We asked David Houlding, an Intel Healthcare Architect specializing in security and privacy, to walk us through the three ways that Intel’s anti-theft technology can be used to protect lost laptops.

More Read

mHealth Summit Conference 2011: Thoughts and Takeaways
Staying on top of the technology trend: 4 things to learn from young healthcare professionals
Hospitals Ineligible for Incentive Payments Lag Behind in EHR Adoption
Hospitals Suffer From Denied Claims – Can Proper Patient Identification Help?
How to Use the Multiplier App


TAGGED:HITPrivacysecurity
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

weight loss surgeon
How to Choose the Best Surgeon for Weight Loss Surgery
Weight Loss Wellness
February 11, 2026
aging care healthcare system
The Growing Role of Terminal Care Specialists in a Rapidly Aging Healthcare System
Global Healthcare Senior Care
February 11, 2026
Why Trauma and Addiction Are Linked and How Effective Programs Treat Both
Addiction Addiction Recovery
February 10, 2026
car accident injuries
The Hidden Healthcare Impact of Car Accident Injuries
News Policy & Law
February 8, 2026

You Might also Like

healthcare marketing statistics
BusinesseHealthFinanceHospital Administration

23: Number of Useful Internet Marketing Stats in This Healthcare Post

April 24, 2013

Box Challenges Developers to Build Apps for Patient Education

October 3, 2013
Image
eHealthSocial Media

How to Engage Patients and Gain Online Visibility

September 27, 2016
eHealthMedical RecordsTechnology

Protect Patient Information: Teaching Healthcare Employees about Phishing Scams

June 16, 2017
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?