These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

115 related articles for article (PubMed ID: 29558176)

  • 1. Frontlines: Every Piece Counts in Cybersecurity.
    Sheffer J
    Biomed Instrum Technol; 2018; 52(2):82-83. PubMed ID: 29558176
    [No Abstract]   [Full Text] [Related]  

  • 2. A Primer on Cybersecurity for Physicians.
    Lea NC; De Meyer F
    Acta Med Port; 2019 Sep; 32(9):563-564. PubMed ID: 31493357
    [No Abstract]   [Full Text] [Related]  

  • 3. SEWING UP SOLUTIONS. The Role of Software Patch Management in Effective Cybersecurity.
    Hayhurst C
    Biomed Instrum Technol; 2018; 52(2):92-102. PubMed ID: 29558183
    [No Abstract]   [Full Text] [Related]  

  • 4. Commentary: Collaborating to Achieve a Mutual Cybersecurity Advantage.
    Hagestad B; Straumann A
    Biomed Instrum Technol; 2017; 51(1):34-39. PubMed ID: 28103101
    [No Abstract]   [Full Text] [Related]  

  • 5. Physician Practice Cybersecurity Threats: Ransomware.
    Budke CA; Enko PJ
    Mo Med; 2020; 117(2):102-104. PubMed ID: 32308225
    [No Abstract]   [Full Text] [Related]  

  • 6. Security is achievable even in today's complex networks.
    Lafrance S
    Health Manag Technol; 1995 Oct; 16(11):58. PubMed ID: 10151634
    [No Abstract]   [Full Text] [Related]  

  • 7. How secure is secure?
    Fotsch E
    Healthc Financ Manage; 1996 Nov; 50(11):30, 32. PubMed ID: 10162344
    [No Abstract]   [Full Text] [Related]  

  • 8. Bracing for a crash. While IT outages are rare, providers need a plan.
    Conn J
    Mod Healthc; 2012 May; 42(20):32-3. PubMed ID: 22666970
    [No Abstract]   [Full Text] [Related]  

  • 9. As networks multiply, privacy concerns grow.
    Siwicki B
    Health Data Manag; 1995 Feb; 3(2):57-8, 60, 62-4. PubMed ID: 10143841
    [TBL] [Abstract][Full Text] [Related]  

  • 10. An SOS on Cybersecurity To protect patient data, hospitals beef up risk management programs. Hello, chief security officers and 'white hat hackers'.
    Taylor M
    Hosp Health Netw; 2015 Feb; 89(2):36-38. PubMed ID: 30277345
    [No Abstract]   [Full Text] [Related]  

  • 11. Responding to Ever-Evolving Threats.
    Wirth A
    Biomed Instrum Technol; 2017; 51(3):269-273. PubMed ID: 28530860
    [No Abstract]   [Full Text] [Related]  

  • 12. Protect your net. Good policy + good technology = dependable security.
    Schneider P
    Healthc Inform; 1998 May; 15(5):33-4. PubMed ID: 10179843
    [No Abstract]   [Full Text] [Related]  

  • 13. Staving off big hack attack. Two delivery systems take different approaches to testing vulnerability.
    Briggs B
    Health Data Manag; 2003 Jun; 11(6):84-6. PubMed ID: 12825445
    [No Abstract]   [Full Text] [Related]  

  • 14. Information technology security.
    Elliott AT
    Nucl Med Commun; 2003 Dec; 24(12):1205. PubMed ID: 14627845
    [No Abstract]   [Full Text] [Related]  

  • 15. Organizational repertoires and rites in health information security.
    Cooper T; Collmann J; Neidermeier H
    Camb Q Healthc Ethics; 2008; 17(4):441-52. PubMed ID: 18724883
    [No Abstract]   [Full Text] [Related]  

  • 16. Gathering Basic Information in Support of Medical Network Risk Management.
    Copeland S
    Biomed Instrum Technol; 2018; 52(2):112-119. PubMed ID: 29558185
    [No Abstract]   [Full Text] [Related]  

  • 17. Anti-malware software and medical devices.
    Health Devices; 2010 Oct; 39(10):360-5. PubMed ID: 21306047
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Getting with the Program to Beef Up Cybersecurity.
    Stern G
    Biomed Instrum Technol; 2017; 51(1):70-75. PubMed ID: 28103087
    [No Abstract]   [Full Text] [Related]  

  • 19. The impact of technology on the confidentiality of health information.
    White AW; Wager KA; Lee FW
    Top Health Inf Manage; 1996 May; 16(4):13-21. PubMed ID: 10157657
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Addressing the new network security challenges.
    Siwicki B
    Health Data Manag; 1997 Dec; 5(12):45-6, 48. PubMed ID: 10175525
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.