HIT Consultant Insightful coverage of healthcare innovation
 

it employees

Results 301 - 325 of 1236Sort Results By: Published Date | Title | Company Name
Published By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
Retailers face many challenges to attracting top talent in today's market. Job seekers often apply for multiple positions simultaneously, so building a strong brand is critical to winning the best candidates. This white paper describes a 3-step process for recruiting and retaining the best employees—and keeping them performing at their highest potential.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
At the heart of organizational transformation are people and culture. For executives charged with managing talent, big changes can translate into big challenges. How do you help employees navigate the new work environment? Here are four proven strategies that help HR leaders inspire and retain top talent.
Tags : 
    
Oracle HCM Cloud
Published By: Oracle HCM Cloud     Published Date: Aug 02, 2016
Healthcare payers need to think cost effectively to accomplish the goals of recruiting and retaining top talent, providing excellent patient care and consolidating healthcare with partners. Updating talent acquisition tactics and technologies doesn't have to be expensive. Find out how Best-in-Class companies recruit, hire, on board, and retain employees.
Tags : 
    
Oracle HCM Cloud
Published By: Jamf     Published Date: May 04, 2017
"With technology seemingly everywhere, a new generation of employees seeks a seemingly modern technology experience at work. This shift in employee mentality is prompting IT to reevaluate the definition of IT service, and the practices and workflows they deploy to users. The question is how does IT shift their practices to embrace the user-centric trend? Download this e-book for answers and learn: - The origins of the user-centric trend - Apple's role in evolving IT practices - Ways to implement and benefit from this new IT
Tags : 
    
Jamf
Published By: Jamf     Published Date: Jan 18, 2018
Organizations with employees in the field need to ensure access to the right tools and information when and where employees need it. To help on-the-go employees, crafting an app strategy to empower field teams is crucial for success and productivity. Highlighted below are a few examples of what’s possible in the construction vertical, as well as general field sales, when resources are paired with iOS.
Tags : 
    
Jamf
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
finance, data encryption, mobility, security, data
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : 
healthcare, mobility, data security, security tips, personal device
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Hardworking, passionate, and tech-literate — by 2020, more than half of your employees will be from the often-misunderstood “Millennial” generation. However, many millennials hold a different benchmark of expectations from their place of work than previous generations. Download this e-Book to prepare your business. Here’s a list of five expert tips to attracting and retaining the best young talent available, such as: Understanding “work-life balance” beyond the buzzwords Prioritizing professional development for this passionate demographic Satisfying a net-native’s need for tech tools that actually wor
Tags : 
millennials, work-life balance, professional development, tech tools, business management
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
mobile device, flexibility, risk reduction, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
business mobility, efficiency, productivity, data security, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them: 98% of respondents deal with the loss of sensitive data Up to 50% of employees regularly share files outside your organization EFSS solutions are seen as a primary tool to enable mobility and enforce security
Tags : 
risk reduction, flexibility, mobility, data security, agility
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
It’s 2017. 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business, such as: Security: How do you make a plan to secure your data against infinite possibilities? Efficiency: How much ROI can you expect, and what expenses should you budget? Implementation: How do you create a mobile solution your employees will love?
Tags : 
data security, business mobility, efficiency, employee satisfaction, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
In just a few years, we’ve learned to rely on our phones for everything from banking to email to watching cat videos. Most importantly, it’s a safe bet your employees are using mobile devices for work-related activities as well – whether your IT department is prepared for it or not. The proliferation of internet devices makes it simply too easy for employees to check emails en route to the office or give a project that final once over from their couch at home. Smart businesses are already taking advantage of this trend, and reaping the benefits of productivity and employee satisfaction. Is yours?
Tags : 
mobility, productivity, employee satisfaction
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 24, 2017
Known popularly as “Bring your own device”, or BYOD, the practice of working from personal devices is growing at a rapid pace.. And while security is real concern with BYOD, a recent survey found that employees are actually more cautious when using a personal device for work purposes
Tags : 
personal device, byod, survey
    
Citrix ShareFile
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Lookout     Published Date: Dec 11, 2018
There are three key statements enterprises must hear in order to move forward in protecting corporate resources from leakage and attack: The perimeter has disappeared. Legacy security technologies do not work. Devices cannot be trusted. A new security architecture is needed to protect data as employees and devices connect to corporate resources in the cloud, all over the world. That architecture is post-perimeter security. Read this whitepaper to: Learn why perimeter security is not longer viable Understand the new, necessary security architecture: post-perimeter security Learn how phishing attacks are thwarting traditional firewalls Find out how Lookout enables enterprises to embrace post-perimeter security in their own environments
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Zebra Technologies     Published Date: Dec 20, 2017
Delivering the best possible care to every patient is a complex, interconnected process that involves every department in a healthcare facility. From the moment a patient enters a facility, a wide range of activities must be performed by many different employees from different functional areas — in a timely and efficient way—to ensure the best possible outcome, including performing tests, collecting specimens, administering medications and delivering treatments. Each one of these activities must be coordinated and documented as part of an overall care plan. But the first step is making sure clinicians are treating the right patient—in the right way—every time. Zebra’s white paper explores the critical impact positive patient identification (PPID) has on patient safety throughout the administrative, diagnostic and treatment phases of a patient’s stay. The paper also explores how PPID can improve staff efficiency and help healthcare organizations meet the needs of changing patient dem
Tags : 
    
Zebra Technologies
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Today’s procurement leaders are using technology to achieve greater procedural and financial efficiencies, secure the best products and services, and improve vendor relationships. However with the lack of technology to boost efficiency and strengthen the partnership with vendors and employees, saving costs and speeding up procurement processes can be quite cumbersome. Industry experts predict that successful businesses will soon become 100% digital for all transactions. The challenge is how to “go digital” in the right ways. Download this best practices paper to learn the eight important ways that procurement teams can make meaningful progress in their digital transformations. "
Tags : 
procurement, professionals, practices, departments, digital, docusign, esignature
    
DocuSign UK
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the “Edge”. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Abacus Labs     Published Date: Jan 11, 2019
Abacus is a real time expense reporting solution that processes individual expenses as they flow into the system. No expense report required. It provides finance teams unprecedented visibility into spend and minimizes the work required to submit expenses. At one time, the most efficient way to get expense documentation from employees to the finance team was to tape receipts together and fill out templated forms. Today we have mobile cameras, automated accounting software, and convenient apps for peer-to-peer payments. We live in a world of real time data. You should be able to submit your expenses as easily as you pay a friend for your half of dinner!
Tags : 
    
Abacus Labs
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.