10 results.
Understanding Cybersecurity: A Primer for HIM Professionals - Retired
Author: Dill, Mark W; Lucci, Susan; Walsh, Tom
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: April 2016
Cybersecurity 101
Author: Lucci, Susan; Walsh, Tom
Source: Journal of AHIMA
Publication Date: November 2015
Privacy and Security Audits of Electronic Health Information (2014 update)
Author: Walsh, Tom; Miaoulis, William M
Source: AHIMA practice brief | Journal of AHIMA
Publication Date: March 2014
Security Risk Analysis and Management: An Overview (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Privacy and Security Audits of Electronic Health Information (2013 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: November 2013
Security Risk Analysis and Management: an Overview (2011 update)
Author: Walsh, Tom
Source: AHIMA practice brief
Publication Date: January 2011
Workflow for Breach Notification
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: April 2010
26.2-mile Security Rule: Is Your Organization Gaining on Compliance or Just Running in Place?
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: March 2005
Proof Is in the Policy
Author: Walsh, Tom
Source: Journal of AHIMA
Publication Date: February 2004
Selecting Strong Passwords (HIPAA on the Job)
Author: Amatayakul, Margret; Walsh, Tom
Source: Journal of AHIMA
Publication Date: October 2001