The State of Health Care Security - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Next The State of Health Care Security-6 Next

Not much change year over year.

While there seems to be a significant increase in the number of security incidents occurring in health care organizations, no one is quite sure whether it is happening because more incidents are being reported or if the number of incidents is actually increasing.

In a survey of 72 healthcare organizations, conducted by the Ponemon Institute on behalf of ID Experts, a provider of data breach prevention software, it’s clear that the loss of mobile computing devices and breaches caused by third-party applications are contributing to the problem. It's also clear that most health care organizations do not have the processes or funding in place to deal effectively with these issues, and that there is a marked increase in the number of incidents related to identity theft.

The overall conclusion of the study is that there has not been much progress made in health care security in the last year, with one notable exception: Organizations that have implemented electronic health records (EHR) are reporting that security has improved significantly as part of the process of digitizing medical records.

More Slideshows:


Top Predictions for IT Organizations and Users for 2012 and Beyond Predictions show IT budgets are moving out of the control of IT departments.

Top Five Android Malware Families Report identifies five Android malware families, as well as a new Android root-level vulnerability.

Consumers' Increasing Reliance on Facebook and Other Social TrendsNew figures reveal rapid adoption of social media in consumer shopping behaviors.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.