Patient Records: A Crisis Waiting to Happen

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Previous Next

Click through for results from a patient privacy and data security study, conducted by the Ponemon Institute and commissioned by ID Experts.

The question isn’t if there will soon be a major security breach involving patient records, it’s when.

A new survey of 65 health care organizations, conducted by the Ponemon Institute and commissioned by ID Experts, a provider of data security software, finds that not only are breaches continuing to happen on a regular basis, they are costing these organizations on average $2 million each over a two-year period.

That may sound like a big number, but it’s actually relatively small given the number of breaches reported. That suggests that it’s only a matter of time before a major breach results in millions of dollars in lost income and revenue for health care organizations.

More Slideshows:

10 More Gadgets to Help Improve Productivity More must-have gadgets you should add to your repertoire.

Movers and Shakers: Where Some of IT's Top Executives Are Going September 2010 was a tumultuous month for CEOs as the turnover rate surged to a four-month high.

Seven Ways to Use LinkedIn to Mine for Talent LinkedIn is a veritable goldmine for those looking for potential candidates


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

email8-190x128 Phishing 101: Beware and Prepare this Holiday Season

With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. ...  More >>

Poremba2016Security0x 10 Security Trends to Look for in 2016

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. ...  More >>

Security86-290x195 Reduce Data Breach Damage by Improving Detection and Response

The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.