<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | security

Posted on 03.06.17 by Missy Januszko

Relationship Between CISOs and IT Teams

The CISO (Chief Information Security Officer) position is complex and demanding. With an ever-expanding threat landscape, the CISO navigates a complex web of responsibilities that run the gamut from staying ahead of cyberattacks, managing security teams, and analyzing...

Posted on 03.03.17 by Sophie Pellissier

5 Tips IT Managers Can Use to Protect Sensitive Data

Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.

Posted on 03.01.17 by Alex Jablokow

New York’s New Cyber Security Regulation in Effect

Compliance with security and privacy requirements is difficult. Compliance with a number of different regulations, some geographic, some industry-specific, can seem almost impossible. And when a new, large-scale requirement, like New York’s new cybersecurity regulation...

Posted on 02.21.17 by Kevin Conklin

837 Claims – 835 Remit Optimization

Want to know how healthcare IT organizations can best prove their worth to the business? Optimize the 835 Remit and 837 Claim process so there are fewer rejections, clarifications, missed files and delays.

Posted on 02.17.17 by Missy Januszko

A DevOps Primer For Healthcare IT Teams

DevOps, the latest in software engineering and IT operations trends, defines a set of processes, tools, practices, and interactions that foster collaboration between developers and operations to achieve high-quality business outcomes. In this article, we are going to...

Posted on 02.15.17 by Steven King

HIMSS17 – Proactive Security Solutions For Healthcare IT

There is something new to talk about every year in Healthcare IT. It’s hard enough that healthcare IT teams need to be lean and efficient, but keeping up with an ever-changing IT landscape that continues to take on more technical debt as time goes on just exacerbates the...

Posted on 02.09.17 by Jacqueline Lee

How Financial Services Firms Can Prevent SLA Penalties

For 95 percent of enterprises, one hour of downtime costs $100,000 or more in SLA penalties according to data from ITIC. If you run a brokerage service, Ecessa reports you'll lose $6.48 million, citing numbers provided by Network Computing, the Meta Group and Contingency...

Posted on 02.07.17 by Joe Hewitson

Security, Efficiency, and a Better Healthcare IT Strategy

When it comes to healthcare IT strategy, data security and efficiency are two of the top priorities when budgets are drawn out. Though IT teams are no strangers to tight budgets and dwindling resources, a recent survey reported by PR Newswire reveals some good news for...

Posted on 02.01.17 by Greg Mooney

Deep Web Monitoring and the Future of Data Breach Detection

If you're like me and have a knack for cyber security trends, you will find yourself having many sleepless nights. Our lives and data is are the internet for the taking and the weakest link in finding compromised data is knowing it's been compromised in the first place.

Posted on 01.31.17 by Kevin Conklin

A New Resource for Healthcare IT Teams

Healthcare IT teams don't get enough credit. While doctors and nurses deliver the testing, diagnoses and treatments, healthcare IT teams deliver the enabling infrastructure.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.