Comments
HIMSS Security Survey: Greatest Threat From Healthcare Insiders
Newest First  |  Oldest First  |  Threaded View
Gary_EL
50%
50%
Gary_EL,
User Rank: Ninja
2/20/2014 | 3:08:09 AM
Re: that 7%?
By audit logs, does that mean they collect the keystrokes of individuals who are authorized to use the system? If that's the case, if someone made an inappropriate access, couldn't they prove it by looking at the audit logs? And, if so, why not mandate that the other 7% are required to use a similar check, too?
Laurianne
50%
50%
Laurianne,
User Rank: Author
2/19/2014 | 2:44:33 PM
that 7%?
93% collect and analyze data from audit logs. What are the 7% of orgs that don't? This just seems mandatory in healthcare.


The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A UBM Tech Radio episode on the changing economics of Flash storage used in data tiering -- sponsored by Dell.
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.