These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

99 related articles for article (PubMed ID: 26638311)

  • 1. Build your defense! Develop a strategic plan of action to combat cybercrime.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Oct; 36(10):8-9. PubMed ID: 26638311
    [No Abstract]   [Full Text] [Related]  

  • 2. Experts doubt Anthem breach will boost security spending.
    Conn J
    Mod Healthc; 2015 Feb; 45(6):9. PubMed ID: 25826854
    [No Abstract]   [Full Text] [Related]  

  • 3. PROTECT YOUR DATA FROM HACKERS IN 5 STEPS.
    Merritt M
    Med Econ; 2015 Aug; 92(15):57. PubMed ID: 26427182
    [No Abstract]   [Full Text] [Related]  

  • 4. Protect your practice after a data breach.
    Sprey E
    Med Econ; 2016 Feb; 93(4):66-9. PubMed ID: 27079076
    [No Abstract]   [Full Text] [Related]  

  • 5. 5 steps to prevent a data breach in your practice.
    Rey J
    Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
    [No Abstract]   [Full Text] [Related]  

  • 6. How safe is your patient data?
    Lowes R
    Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
    [No Abstract]   [Full Text] [Related]  

  • 7. Cyber threats to health information systems: A systematic review.
    Luna R; Rhine E; Myhra M; Sullivan R; Kruse CS
    Technol Health Care; 2016; 24(1):1-9. PubMed ID: 26578272
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cybersecurity: The heat is on.
    Morrissey J
    Trustee; 2015 Oct; 68(9):15-8. PubMed ID: 26665703
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Reducing security risk using data loss prevention technology.
    Beeskow J
    Healthc Financ Manage; 2015 Nov; 69(11):108-12. PubMed ID: 26685444
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Will we ever learn? A national healthcare identifier system may go a long way to reducing the danger of identity theft.
    Hieb B
    Healthc Inform; 2006 Jul; 23(7):42-3. PubMed ID: 16900966
    [No Abstract]   [Full Text] [Related]  

  • 11. California sets standard on identity theft safeguards.
    Patient Care Manag; 2003 Sep; 19(9):1-2. PubMed ID: 12968501
    [No Abstract]   [Full Text] [Related]  

  • 12. Medical identity theft--red flag and address discrepancy requirements.
    Springer R
    Plast Surg Nurs; 2009; 29(2):131-4. PubMed ID: 19528784
    [No Abstract]   [Full Text] [Related]  

  • 13. STOPPING HACKERS.
    Morrissey J
    Health Data Manag; 2016 Feb; 24(2):24-6, 28, 30. PubMed ID: 27032237
    [No Abstract]   [Full Text] [Related]  

  • 14. Keeping data safe. The threat of security breaches can fuel preventive strategies.
    Rogoski RR
    Healthc Inform; 2014 Mar; 31(2):37-9. PubMed ID: 24812992
    [No Abstract]   [Full Text] [Related]  

  • 15. Hacking health care.
    McNeal M
    Mark Health Serv; 2014; 34(3):16-21. PubMed ID: 25322641
    [No Abstract]   [Full Text] [Related]  

  • 16. Put a lock on security.
    Rizzo D
    Health Manag Technol; 2001 Jan; 22(1):62-4. PubMed ID: 11213620
    [No Abstract]   [Full Text] [Related]  

  • 17. Risk management. Theft happens. Protecting the data is what matters.
    Terreri A
    Hosp Health Netw; 2009 Feb; 83(2):10. PubMed ID: 19294968
    [No Abstract]   [Full Text] [Related]  

  • 18. But doctor, I still have both feet! Remedial problems faced by victims of medical identity theft.
    Sullivan KM
    Am J Law Med; 2009; 35(4):647-81. PubMed ID: 20196286
    [No Abstract]   [Full Text] [Related]  

  • 19. Medical, dental, data protection?
    Eng D
    Fortune; 2013 Jul; 168(1):26. PubMed ID: 23875269
    [No Abstract]   [Full Text] [Related]  

  • 20. Time for an update: Health data breaches cited in GAO's call for fix.
    Conn J
    Mod Healthc; 2012 Aug; 42(32):8-9. PubMed ID: 22953491
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 5.