Patient Records: A Crisis Waiting to Happen

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17
Previous Next

Click through for results from a patient privacy and data security study, conducted by the Ponemon Institute and commissioned by ID Experts.

The question isn’t if there will soon be a major security breach involving patient records, it’s when.

A new survey of 65 health care organizations, conducted by the Ponemon Institute and commissioned by ID Experts, a provider of data security software, finds that not only are breaches continuing to happen on a regular basis, they are costing these organizations on average $2 million each over a two-year period.

That may sound like a big number, but it’s actually relatively small given the number of breaches reported. That suggests that it’s only a matter of time before a major breach results in millions of dollars in lost income and revenue for health care organizations.

More Slideshows:


10 More Gadgets to Help Improve Productivity More must-have gadgets you should add to your repertoire.

Movers and Shakers: Where Some of IT's Top Executives Are Going September 2010 was a tumultuous month for CEOs as the turnover rate surged to a four-month high.


Seven Ways to Use LinkedIn to Mine for Talent LinkedIn is a veritable goldmine for those looking for potential candidates

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security54-290x195 Five Easy Steps for Securing Data

Businesses of all sizes can benefit from clear, actionable tips on how to improve their data security. ...  More >>

Security51-190x128 Six Security Predictions and Tips for SMBs in 2015

Small to midsized businesses (SMBs) are vital to the U.S. economy, yet they are often the most vulnerable when it comes to cybersecurity. ...  More >>

Global13-290x195 Six Reasons Why CES Should Scare the Hell out of Network Administrators

While the tech geek is busting at the seams with anticipation, the network admin is scared to death. All this technology results in bandwidth hoarding, security vulnerabilities and compliance concerns for IT departments. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date