The State of Health Care Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Previous The State of Health Care Security-1 Next

Click through for results from a health care security survey, conducted by the Ponemon Institute on behalf of ID Experts.

While there seems to be a significant increase in the number of security incidents occurring in health care organizations, no one is quite sure whether it is happening because more incidents are being reported or if the number of incidents is actually increasing.

In a survey of 72 healthcare organizations, conducted by the Ponemon Institute on behalf of ID Experts, a provider of data breach prevention software, it’s clear that the loss of mobile computing devices and breaches caused by third-party applications are contributing to the problem. It's also clear that most health care organizations do not have the processes or funding in place to deal effectively with these issues, and that there is a marked increase in the number of incidents related to identity theft.

The overall conclusion of the study is that there has not been much progress made in health care security in the last year, with one notable exception: Organizations that have implemented electronic health records (EHR) are reporting that security has improved significantly as part of the process of digitizing medical records.

More Slideshows:

Top Predictions for IT Organizations and Users for 2012 and Beyond Predictions show IT budgets are moving out of the control of IT departments.

Top Five Android Malware Families Report identifies five Android malware families, as well as a new Android root-level vulnerability.

Consumers' Increasing Reliance on Facebook and Other Social TrendsNew figures reveal rapid adoption of social media in consumer shopping behaviors.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.