These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

103 related articles for article (PubMed ID: 27032237)

  • 1. STOPPING HACKERS.
    Morrissey J
    Health Data Manag; 2016 Feb; 24(2):24-6, 28, 30. PubMed ID: 27032237
    [No Abstract]   [Full Text] [Related]  

  • 2. PROTECT YOUR DATA FROM HACKERS IN 5 STEPS.
    Merritt M
    Med Econ; 2015 Aug; 92(15):57. PubMed ID: 26427182
    [No Abstract]   [Full Text] [Related]  

  • 3. 5 steps to prevent a data breach in your practice.
    Rey J
    Med Econ; 2011 Oct; 88(20):54-5. PubMed ID: 22175183
    [No Abstract]   [Full Text] [Related]  

  • 4. Seizing the real opportunity presented by data breaches.
    Free J
    Health Manag Technol; 2015 Mar; 36(3):2. PubMed ID: 26204721
    [No Abstract]   [Full Text] [Related]  

  • 5. Protect your practice after a data breach.
    Sprey E
    Med Econ; 2016 Feb; 93(4):66-9. PubMed ID: 27079076
    [No Abstract]   [Full Text] [Related]  

  • 6. Providers face uphill battle on data breaches. Healthcare organizations need a new approach in dealing with this pervasive and costly problem.
    Degaspari J
    Healthc Inform; 2013 Feb; 30(1):52, 54, 56. PubMed ID: 23505950
    [No Abstract]   [Full Text] [Related]  

  • 7. Time for an update: Health data breaches cited in GAO's call for fix.
    Conn J
    Mod Healthc; 2012 Aug; 42(32):8-9. PubMed ID: 22953491
    [No Abstract]   [Full Text] [Related]  

  • 8. Experts doubt Anthem breach will boost security spending.
    Conn J
    Mod Healthc; 2015 Feb; 45(6):9. PubMed ID: 25826854
    [No Abstract]   [Full Text] [Related]  

  • 9. Protecting health data in a troubling time. Understand who and what you're up against.
    Ropp R; Quammen B
    Health Manag Technol; 2015 Jul; 36(7):14-5. PubMed ID: 26302609
    [No Abstract]   [Full Text] [Related]  

  • 10. What the 'Red Flags Rule' means for medical practices.
    Stanley R
    MGMA Connex; 2010 Apr; 10(4):25-6. PubMed ID: 20433013
    [No Abstract]   [Full Text] [Related]  

  • 11. How safe is your patient data?
    Lowes R
    Med Econ; 2006 Mar; 83(6):22-5. PubMed ID: 16619786
    [No Abstract]   [Full Text] [Related]  

  • 12. Security, durability & portable computers.
    Miller D
    Healthc Inform; 1993 May; 10(5):72, 74. PubMed ID: 10126082
    [No Abstract]   [Full Text] [Related]  

  • 13. Stopping Thieves in Their Tracks: What HIM Professionals Can Do To Mitigate Medical Identity Theft.
    Eramo LA
    J AHIMA; 2016 Aug; 87(8):40-3. PubMed ID: 29425013
    [No Abstract]   [Full Text] [Related]  

  • 14. Cybersecurity for the travelling scientist.
    Owens B
    Nature; 2017 Aug; 548(7665):123-124. PubMed ID: 28770861
    [No Abstract]   [Full Text] [Related]  

  • 15. Putting the brakes on identity theft.
    Hogan CE
    N Y State Dent J; 2008; 74(4):6-7. PubMed ID: 18788173
    [No Abstract]   [Full Text] [Related]  

  • 16. Risk management. Theft happens. Protecting the data is what matters.
    Terreri A
    Hosp Health Netw; 2009 Feb; 83(2):10. PubMed ID: 19294968
    [No Abstract]   [Full Text] [Related]  

  • 17. Taxpayer identification numbers and identity theft.
    Nagy R; Tuma K
    J Mich Dent Assoc; 2008 May; 90(5):34, 36. PubMed ID: 18557277
    [No Abstract]   [Full Text] [Related]  

  • 18. Hacking health care.
    McNeal M
    Mark Health Serv; 2014; 34(3):16-21. PubMed ID: 25322641
    [No Abstract]   [Full Text] [Related]  

  • 19. Medical identity theft and telemedicine security.
    Terry M
    Telemed J E Health; 2009 Dec; 15(10):928-32. PubMed ID: 19908998
    [No Abstract]   [Full Text] [Related]  

  • 20. Reducing security risk using data loss prevention technology.
    Beeskow J
    Healthc Financ Manage; 2015 Nov; 69(11):108-12. PubMed ID: 26685444
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.