HIMSS Security Survey: Greatest Threat From Healthcare Insiders - InformationWeek
IoT
IoT
Healthcare // Security & Privacy
News
2/19/2014
01:00 PM
Connect Directly
LinkedIn
Google+
Twitter
RSS
E-Mail
50%
50%

HIMSS Security Survey: Greatest Threat From Healthcare Insiders

The HIMSS survey of 283 IT and security professionals says the biggest concern is healthcare workers looking into electronic health records.

Ahead of next week's HIMSS conference for the healthcare information management industry, HIMSS reports that, despite despite progress toward secure patient information within hospitals and physician practices, more work must be done to mitigate internal security breaches and medical identity theft.

The HIMSS Security Survey profiles the data security experiences of 283 IT and security professionals. The greatest perceived "threat motivator" is that of healthcare workers snooping into the electronic health information of friends, neighbors, spouses, or co-workers (i.e., inappropriate data access).

The infographic below summarizes some of the key concerns.

Download Healthcare IT In The Obamacare Era, the InformationWeek Healthcare digital issue on changes driven by regulation. Modern technology created the opportunity to restructure the healthcare industry around accountable care organizations, but ACOs also put new demands on IT.

David F. Carr oversees InformationWeek's coverage of government and healthcare IT. He previously led coverage of social business and education technologies and continues to contribute in those areas. He is the editor of Social Collaboration for Dummies (Wiley, Oct. 2013) and ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Gary_EL
50%
50%
Gary_EL,
User Rank: Ninja
2/20/2014 | 3:08:09 AM
Re: that 7%?
By audit logs, does that mean they collect the keystrokes of individuals who are authorized to use the system? If that's the case, if someone made an inappropriate access, couldn't they prove it by looking at the audit logs? And, if so, why not mandate that the other 7% are required to use a similar check, too?
Laurianne
50%
50%
Laurianne,
User Rank: Author
2/19/2014 | 2:44:33 PM
that 7%?
93% collect and analyze data from audit logs. What are the 7% of orgs that don't? This just seems mandatory in healthcare.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll