HIMSS Security Survey: Greatest Threat From Healthcare Insiders - InformationWeek
IoT
IoT
Healthcare // Security & Privacy
News
2/19/2014
01:00 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

HIMSS Security Survey: Greatest Threat From Healthcare Insiders

The HIMSS survey of 283 IT and security professionals says the biggest concern is healthcare workers looking into electronic health records.

Ahead of next week's HIMSS conference for the healthcare information management industry, HIMSS reports that, despite despite progress toward secure patient information within hospitals and physician practices, more work must be done to mitigate internal security breaches and medical identity theft.

The HIMSS Security Survey profiles the data security experiences of 283 IT and security professionals. The greatest perceived "threat motivator" is that of healthcare workers snooping into the electronic health information of friends, neighbors, spouses, or co-workers (i.e., inappropriate data access).

The infographic below summarizes some of the key concerns.

Download Healthcare IT In The Obamacare Era, the InformationWeek Healthcare digital issue on changes driven by regulation. Modern technology created the opportunity to restructure the healthcare industry around accountable care organizations, but ACOs also put new demands on IT.

David F. Carr oversees InformationWeek's coverage of government and healthcare IT. He previously led coverage of social business and education technologies and continues to contribute in those areas. He is the editor of Social Collaboration for Dummies (Wiley, Oct. 2013) and ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Laurianne
50%
50%
Laurianne,
User Rank: Author
2/19/2014 | 2:44:33 PM
that 7%?
93% collect and analyze data from audit logs. What are the 7% of orgs that don't? This just seems mandatory in healthcare.
Gary_EL
50%
50%
Gary_EL,
User Rank: Ninja
2/20/2014 | 3:08:09 AM
Re: that 7%?
By audit logs, does that mean they collect the keystrokes of individuals who are authorized to use the system? If that's the case, if someone made an inappropriate access, couldn't they prove it by looking at the audit logs? And, if so, why not mandate that the other 7% are required to use a similar check, too?
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll