Guest Column | May 21, 2015

5 Ways To Spot Malicious Insiders

HITO Lisa Berry-Tayman, IDT911 Consulting

Medical data is under attack. Both patients and healthcare providers are becoming increasingly aware of the threats to information stored within the industry. And the trust in organizations’ ability to protect this highly sensitive data isn’t keeping pace. In a 2014 Ponemon Institute study, of the people who said their healthcare providers outlined the measures used to protect patients' medical records, 68 percent of those respondents revealed they weren't confident the measures would actually keep their medical data secure. By Lisa J. Berry-Tayman, senior privacy and information governance advisor, IDT911 Consulting

access the Guest Column!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of Health IT Outcomes? Subscribe today.

Subscribe to Health IT Outcomes X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to Health IT Outcomes