These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

111 related articles for article (PubMed ID: 26427182)

  • 1. PROTECT YOUR DATA FROM HACKERS IN 5 STEPS.
    Merritt M
    Med Econ; 2015 Aug; 92(15):57. PubMed ID: 26427182
    [No Abstract]   [Full Text] [Related]  

  • 2. Preventing laptop theft.
    Perry PM
    Case Manager; 2004; 15(4):67-9. PubMed ID: 15247900
    [No Abstract]   [Full Text] [Related]  

  • 3. Privacy & security. Worried about stolen laptops? Help is here.
    Scott M
    Hosp Health Netw; 2007 Feb; 81(2):24-5. PubMed ID: 17373531
    [No Abstract]   [Full Text] [Related]  

  • 4. STOPPING HACKERS.
    Morrissey J
    Health Data Manag; 2016 Feb; 24(2):24-6, 28, 30. PubMed ID: 27032237
    [No Abstract]   [Full Text] [Related]  

  • 5. Security for microcomputers in public areas.
    Brown JF
    Med Ref Serv Q; 1993; 12(3):69-74. PubMed ID: 10132289
    [No Abstract]   [Full Text] [Related]  

  • 6. Protect your practice after a data breach.
    Sprey E
    Med Econ; 2016 Feb; 93(4):66-9. PubMed ID: 27079076
    [No Abstract]   [Full Text] [Related]  

  • 7. 5 steps to prevent a data breach in your practice.
    Rey J
    Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
    [No Abstract]   [Full Text] [Related]  

  • 8. Tips for personal computer security.
    Mele JA
    J Healthc Prot Manage; 1990; 6(2):119-22. PubMed ID: 10105269
    [No Abstract]   [Full Text] [Related]  

  • 9. The threat of hackers. The need to secure patient data & other important records on your agency's notebook computers.
    Ott W
    JEMS; 2008 Aug; 33(8):68-71. PubMed ID: 18692732
    [No Abstract]   [Full Text] [Related]  

  • 10. Microcomputers--a checklist of security and recovery considerations.
    J Healthc Prot Manage; 1985; 2(1):85-92. PubMed ID: 10276195
    [No Abstract]   [Full Text] [Related]  

  • 11. Build your defense! Develop a strategic plan of action to combat cybercrime.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Oct; 36(10):8-9. PubMed ID: 26638311
    [No Abstract]   [Full Text] [Related]  

  • 12. How safe is your patient data?
    Lowes R
    Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
    [No Abstract]   [Full Text] [Related]  

  • 13. California sets standard on identity theft safeguards.
    Patient Care Manag; 2003 Sep; 19(9):1-2. PubMed ID: 12968501
    [No Abstract]   [Full Text] [Related]  

  • 14. Don't let "visual hackers" invade your privacy.
    Van Alstin CM
    Health Manag Technol; 2015 Jun; 36(6):16. PubMed ID: 26357760
    [No Abstract]   [Full Text] [Related]  

  • 15. Risk management. Theft happens. Protecting the data is what matters.
    Terreri A
    Hosp Health Netw; 2009 Feb; 83(2):10. PubMed ID: 19294968
    [No Abstract]   [Full Text] [Related]  

  • 16. Put a lock on security.
    Rizzo D
    Health Manag Technol; 2001 Jan; 22(1):62-4. PubMed ID: 11213620
    [No Abstract]   [Full Text] [Related]  

  • 17. Keeping data safe. The threat of security breaches can fuel preventive strategies.
    Rogoski RR
    Healthc Inform; 2014 Mar; 31(2):37-9. PubMed ID: 24812992
    [No Abstract]   [Full Text] [Related]  

  • 18. Do you know who is walking into your building?
    Edgeller J
    Health Estate; 1999 Jul; 53(6):23-4. PubMed ID: 10621229
    [No Abstract]   [Full Text] [Related]  

  • 19. Will we ever learn? A national healthcare identifier system may go a long way to reducing the danger of identity theft.
    Hieb B
    Healthc Inform; 2006 Jul; 23(7):42-3. PubMed ID: 16900966
    [No Abstract]   [Full Text] [Related]  

  • 20. Reducing security risk using data loss prevention technology.
    Beeskow J
    Healthc Financ Manage; 2015 Nov; 69(11):108-12. PubMed ID: 26685444
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.