Health Care IT Still Needs Critical Care - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Health Care IT Still Needs Critical Care-3 Next

A new cost of doing business.

A new survey of 107 IT administrators, managers and C-level executives from organizations of various sizes conducted by GlobalSign, a provider of SSL certificates, finds that while there seems to be more focus on compliance and security issues than ever in the health care industry, progress to date has been somewhat limited.

While there appears to be a lot of manual effort devoted to these tasks, health care organizations are having a tough time identifying technology products that will help manage the process. The end result seems to be a growing acceptance that fines associated with compliance and privacy may soon be just another cost of doing business in the health care industry versus something that needs to be addressed by putting in better IT systems to manage the process.

More Slideshows:


Forces Shaping the CIO Agenda in 2011 CIOs need to get the balance right between utility and innovation in order to secure influence in the future.

Ten Tips for Getting the Most Out of Your Laptop Quick tips and configurations to help you optimize your laptop experience.


Ten Security Tips for iPhones and iPads Recommendations from the NSA for maintaining iOS 4 security.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.