Video Screencast Help

Healthcare Online User Group

Public Group | Founded: 09 Aug 2011 | Serving 1122 members

This group will help Symantec Healthcare Users stay informed of local events, webinars, and be a part of Symantec's Healthcare Community.

Filed Under:

Group Activity

New event 26 Sep 2011
New blog entry 07 Sep 2011
Today's healthcare IT environment is complex and reaches beyond the walls of your hospital. Federal regulations are incentivizing clinicians to cooperate across boundaries, but have also brought us stricter privacy rules. Within a few short years ...
New blog entry 05 Sep 2011
In addition to the Grand Ol’ Opry, Nashville recently hosted the Allscripts Client Experience 2011 (better known by attendees as ACE.11).  You may know that Allscripts and Symantec earlier this summer released a Privacy and Security Risk ...
New blog entry 29 Aug 2011
Author: Eric Lahoda, CISSP, Principal Systems Engineer at Symantec Where is your ePHI? Currently, PHI (Patient Health Information) is leaving your Health Care organization. Most of the time this information is shared with authorized providers and ...
New blog entry 23 Aug 2011
New Security and Privacy Offering from Symantec Currently Sold Exclusively Through Allscripts MOUNTAIN VIEW, Calif. – July 6, 2011 – Symantec Corp. (Nasdaq: SYMC) today introduced the Allscripts Privacy & Security Risk Assessment ...
New blog entry 19 Aug 2011
MOUNTAIN VIEW, Calif. – August 18, 2011– Symantec Corp. (Nasdaq: SYMC) today announced that HealthDataInsights, Inc.  (HDI), a company that reviews healthcare claims for fraud, waste, abuse, errors and improper payment identification, ...
New event 16 Aug 2011
Symantec is looking forward to being a sponser at this years New England HIMSS HIT Summit, September, 2011.  More details to come in the next few weeks.
New event 11 Aug 2011
Symantec is joining 25 Tech Data Resellers this week solely focused on Healthcare IT at TechMed, Tech Data's Healthcare Connection!
New event 11 Aug 2011
Hospitals of all sizes are looking for better protection of their information and systems against a growing list of threats and risks. Often this involves implementing numerous solutions from a variety of vendors. This approach is not only costly (3-5 ...