Patient Records: A Crisis Waiting to Happen - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Next Patient Records: A Crisis Waiting to Happen-10 Next

There is a very limited number of data guardians.

The question isn’t if there will soon be a major security breach involving patient records, it’s when.

A new survey of 65 health care organizations, conducted by the Ponemon Institute and commissioned by ID Experts, a provider of data security software, finds that not only are breaches continuing to happen on a regular basis, they are costing these organizations on average $2 million each over a two-year period.

That may sound like a big number, but it’s actually relatively small given the number of breaches reported. That suggests that it’s only a matter of time before a major breach results in millions of dollars in lost income and revenue for health care organizations.

More Slideshows:

10 More Gadgets to Help Improve Productivity More must-have gadgets you should add to your repertoire.

Movers and Shakers: Where Some of IT's Top Executives Are Going September 2010 was a tumultuous month for CEOs as the turnover rate surged to a four-month high.

Seven Ways to Use LinkedIn to Mine for Talent LinkedIn is a veritable goldmine for those looking for potential candidates


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.