BreachExchange mailing list archives

Survey: Breaches Cost Some Healthcare Organizations $100K Per Day


From: security curmudgeon <jericho () attrition org>
Date: Tue, 31 May 2011 04:20:00 -0500 (CDT)



---------- Forwarded message ----------
From: InfoSec News <alerts () infosecnews org>

http://www.darkreading.com/database-security/167901020/security/news/229700106/survey-breaches-cost-some-healthcare-organizations-100k-per-day.html

By Kelly Jackson Higgins
Dark Reading
May 27, 2011

Most healthcare organizations have made compliance with security and 
privacy regulations a priority, but that hasn?t slowed the data-breach 
bleed, a new survey finds.

Some 56 percent of IT administrators in healthcare organizations say they 
spend anywhere from 25 to 100 percent of their time working on compliance, 
and 54 percent spend most of it on HIPPA, according to the survey 
conducted by GlobalSign, a certificate authority. Meanwhile, some 34 
percent of organizations suffered a breach of their patients' records in 
the past two years, and 10 percent say those breaches cost organizations 
$100,000 per incident each day.

Nearly 40 percent spend one-fourth of their work week "improving security 
and ensuring data privacy," and 19 percent say they spend 75 to 100 
percent of their time on compliance, the report found, based on a survey 
of 107 IT administrators, managers, and C-level executives. Half of the 
respondents are with organizations of 5,000 or more employees.

Lila Kee, chief product officer at GlobalSign, says the findings reveal 
that healthcare is working heavily on compliance for HIPPA, HITECH, and 
other state and federal regulations, but is still getting hacked. "They 
are still having breaches even though they are doing a lot with 
regulations and compliance," Kee says.

[...]

_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Learn encryption strategies that manage risk and shore up compliance.
Download Article 1 of CREDANT Technologies' The Essentials Series:
Endpoint Data Encryption That Actually Works
http://credant.com/campaigns/realtime2/gap-LP1/


Current thread: