Comparative Cost of Inadequate Protection: Healthcare Breaches Ranked the Most Expensive Author: AHIMA Staff Source: Journal of AHIMA Publication Date: October 2014
Trusted Health IT and IT-as-a-Service: A Prescription for Change Author: Katz, Roberta Source: Journal of AHIMA - website Publication Date: August 2014
Seven Select Questions to Ask Your Privacy Officer (Or Yourself) Author: Downing, Katherine Source: Journal of AHIMA Publication Date: April 2014
Man Your Battle Stations: Feds Plan Cyber Security Hack Attacks Author: Source: Journal of AHIMA Publication Date: March 2014
Information Security—An Overview (2014 update) Author: Miaoulis, William M Source: AHIMA practice brief Publication Date: January 2014
Securing Wireless Technology for Healthcare (2013 update) - Retired Author: Evans, Brian Source: AHIMA practice brief Publication Date: November 2013
Security Risk Analysis and Management: An Overview (2013 update) Author: Walsh, Tom Source: AHIMA practice brief Publication Date: November 2013
Privacy and Security Audits of Electronic Health Information (2013 update) Author: Walsh, Tom Source: AHIMA practice brief Publication Date: November 2013
HIPAA Security Overview - Retired Author: Miaoulis, William M Source: AHIMA practice brief Publication Date: November 2013
The 10 Security Domains (Updated 2013) - Retired Author: AHIMA Source: AHIMA practice brief Publication Date: October 2013