<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=196353&amp;fmt=gif">
Request a Demo

Your Questions Answered: Combatting the Threat of ASC Cyberattacks

Q&A with Dr. Paul M. Alcock, Chief Information Security Officer at Surgical Information Systems.

Cybersecurity Awareness Month: A Conversation with John Goehle

An excerpt from a recent episode of "ASC Podcast with John Goehle."

5 Tips to Strengthen Your ASC’s Cyber Defenses

Five essential practices to implement at your surgery center to better safeguard patient data and financial information.

Surgical Information Systems (SIS) Achieves HITRUST Implemented, 1-year (i1) Certification to Manage Data Protection and Mitigate Cybersecurity Threats

New HITRUST i1 Certification validates SIS is operating leading security practices to support the protection of sensitive information.

SIS' Paul Alcock to Present ASCA Webinar on ASC Cybersecurity

Dr. Paul Alcock to discuss the importance of protecting ASC patient data against financially motivated cybercriminals -- and the risks of not prioritizing this effort.

8 Key Steps to Strengthen ASC Cybersecurity

Eight actions ASCs can take to foster an environment that supports cybersecurity culture and lessens the likelihood of being targeted by malicious individuals.

3 Tips to Align Cybersecurity and Patient Safety Initiatives

Three tips to help ASCs align cybersecurity and patient safety initiatives into one unified culture and help mitigate negative impacts on the delivery of safe and effective care.

ASC Administrators Play a Key Role in Cybersecurity

Cybersecurity is everyone's responsibility. In this article, we share a few tips to help better protect you, your ASC, and your patients from malicious cyberattacks.

Cybersecurity with SIS: A Conversation with John Goehle

Cybersecurity Starts at the Top: The Importance of Having a Security Program

5 Hacks to Improve Your ASC’s Cybersecurity Today

If you are like administrators in most ASCs, you run a lean team and may not have the time and resources to give cybersecurity the attention it needs. Unfortunately, this is just what cybercriminals are hoping for so they can exploit vulnerabilities...

Innovation Delivered

Enter your email to receive insights from SIS leaders, partners and industry experts straight to your inbox.

SIS Innovation Delivered