The worst IT threats can come from inside

December 2011
Same-Day Surgery;Dec2011, Vol. 35 Issue 12, p133
Academic Journal
The article reports on methods which health care facilities can use to prevent employees from compromising information technology security operations.


Related Articles

  • Focus on threats, not just ROI of virtualization.  // Same-Day Surgery;Dec2011, Vol. 35 Issue 12, p134 

    The article reports on a high number of healthcare facilities that focus on return on investment when evaluating the virtualization of patient health information instead of focusing on the the threats that virtualization protects patient information from.

  • The Enhancement of Security in Healthcare Information Systems. Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De // Journal of Medical Systems;Jun2012, Vol. 36 Issue 3, p1673 

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the...

  • A Low-cost Reader for Automatically Collecting Vital Signs in Hospitals. Chen, Kuo-Yi; Chen, Fuh-Gwo; Hou, Ting-Wei // Journal of Medical Systems;Aug2012, Vol. 36 Issue 4, p2599 

    No abstract available.

  • BUSINESS OF DERMATOLOGY. The business of selling patient records. Gross, Art // Dermatology Times;Feb2015, Vol. 36 Issue 2, p46 

    The article focuses on developing security measures to prevent the illegal access and theft of patients' medical records in hospitals and healthcare organizations. Topics discussed include a summary of the survey conducted by the Ponemon Institute concerning cyber attacks on healthcare...

  • Online Health Records. Gengler, Amanda // Money;Aug2008, Vol. 37 Issue 8, p23 

    The article reports on the increasing number of online programs offered by companies such as Google and Microsoft which allow individuals to store their personal health records online. A number of disadvantages of such online tools are given in the article including their lack of security and...

  • Quarter of providers report breach in past year.  // Same-Day Surgery;Dec2011, Vol. 35 Issue 12, p134 

    The article reports on a 2011 survey from the Healthcare Information Management and Systems Society which found that approximately one quarter of U.S. health care facilities had experienced a data security breach in 2011.

  • Many provider benefits are in the cloud.  // Healthcare Risk Management;Apr2012, Vol. 34 Issue 4, p42 

    In this article, Bernard Rosof, CEO of Quality in Healthcare Advisory Group, a consulting firm in Huntington, New York, comments on the benefits of cloud computing for healthcare providers including patient record protection from disasters, storage and ensuring disaster recovery.

  • PKI Security in Large-Scale Healthcare Networks. Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos // Journal of Medical Systems;Jun2012, Vol. 36 Issue 3, p1107 

    During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI...

  • Cloud-Based EHR Targets Small Hospitals.  // For the Record (Great Valley Publishing Company, Inc.);7/30/2012, Vol. 24 Issue 14, p35 

    The article reports an announcement by Alistair Crighton, Chief executive Officer (CEO) of Choice Hospital Systems on the availability of a cloud-based, certified Electronic Health Record (EHR), specifically designed as a low-cost alternative to legacy systems for small hospital organizations.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics