Health Care IT Still Needs Critical Care - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Health Care IT Still Needs Critical Care-6 Next

Most are lucky.

A new survey of 107 IT administrators, managers and C-level executives from organizations of various sizes conducted by GlobalSign, a provider of SSL certificates, finds that while there seems to be more focus on compliance and security issues than ever in the health care industry, progress to date has been somewhat limited.

While there appears to be a lot of manual effort devoted to these tasks, health care organizations are having a tough time identifying technology products that will help manage the process. The end result seems to be a growing acceptance that fines associated with compliance and privacy may soon be just another cost of doing business in the health care industry versus something that needs to be addressed by putting in better IT systems to manage the process.

More Slideshows:

Forces Shaping the CIO Agenda in 2011 CIOs need to get the balance right between utility and innovation in order to secure influence in the future.

Ten Tips for Getting the Most Out of Your Laptop Quick tips and configurations to help you optimize your laptop experience.

Ten Security Tips for iPhones and iPads Recommendations from the NSA for maintaining iOS 4 security.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.