Patient Records: A Crisis Waiting to Happen

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17
Previous Next

Click through for results from a patient privacy and data security study, conducted by the Ponemon Institute and commissioned by ID Experts.

The question isn’t if there will soon be a major security breach involving patient records, it’s when.

A new survey of 65 health care organizations, conducted by the Ponemon Institute and commissioned by ID Experts, a provider of data security software, finds that not only are breaches continuing to happen on a regular basis, they are costing these organizations on average $2 million each over a two-year period.

That may sound like a big number, but it’s actually relatively small given the number of breaches reported. That suggests that it’s only a matter of time before a major breach results in millions of dollars in lost income and revenue for health care organizations.

More Slideshows:


10 More Gadgets to Help Improve Productivity More must-have gadgets you should add to your repertoire.

Movers and Shakers: Where Some of IT's Top Executives Are Going September 2010 was a tumultuous month for CEOs as the turnover rate surged to a four-month high.


Seven Ways to Use LinkedIn to Mine for Talent LinkedIn is a veritable goldmine for those looking for potential candidates

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AVTEST2014Awards0x AV-TEST Identifies the 10 Best Security Products of 2014

AV-TEST recently announced the winners of the AV-TEST AWARDs for 2014. These awards were presented in five categories, including protection, performance, usability, Android security and best repair. ...  More >>

Security58-190x128 Top 25 Cybersecurity Companies to Watch in 2015

Cybersecurity Ventures recently announced their first Cybersecurity 500, a directory of the 500 hottest and most innovative cybersecurity companies to watch this year. ...  More >>

MenloSecurityMalware0x Five Cyber Attacks that Made CISOs Rethink Security

Security today is based on the premise that one can detect whether something is good or bad. This premise is fundamentally flawed as malware continues to evade even the latest security technologies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date