The greatest threat to company data isn’t coming from those young hackers on the other side of the world, it's coming from your trusted administrator down the hall, or your trusted third-party service partner. They may not mean to cause problems, but if security policies are lax, they may inadvertently leave laptops full of personally identifiable information in coffee shops or in the backs of cars.
All Health Data Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to exclusive industry white paper downloads, web seminars, podcasts, e-books, and conference discounts. Qualified members may also choose to receive our free monthly magazine and any of our e-newsletters covering the latest breaking news, opinions from industry leaders, developing trends and specialized topics like EHR's, revenue cycle management, health insurance exchanges, analytics, and more!