It seems almost weekly there’s news of a security breach at a hospital or health care facility. Laptops are stolen or lost. Patient information is mishandled. Desktop computers are left vulnerable to malicious software or unauthorized access. The regulatory, legal, and reputational stakes are high for those health care organizations that find themselves confronted with an incident, while the public consequences are higher still.
There’s no better time than now to ensure your organization is mitigating the growing list of risks and threats to information security. This article looks at several leading types of health care breaches and reviews the core tenets of a successful information security program.
Length: 4 pages (PDF 159 kB)