Healthcare Data Security Breaches

by | Jun 16, 2010 | Uncategorized

In my conversations regarding technology with healthcare professionals, privacy and security throughout the business/clinical process is a common source of pain.  After all, whether a medical practice is well into the use of an EHR or at some stage of selection/implementation, the business process is critical to determining how effective technology will be as a tool for everyone.  Each person in the practice has important responsibilities to fulfill and that, in many cases, requires access to patient records in some level of detail.  Having a concise technology management and use policy can go a long way in the development of best practices within the practice for concerns such as privacy and security because technology does have implications on both your people and processes.  The point is that whatever your process is today, using an EHR can be a great tool when it is surrounded by sound technology management policies for the practice.  What’s more, this is an ongoing process with much iteration.

Here are some interesting statistics regarding breaches of healthcare data and other personal information:

P2P Networks a Treasure Trove of Leaked Health Care Data, Study Finds





John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.


Related posts

Interesting Tech

Interesting Tech

                      Hushme - A muzzle you wear for those important office calls that you do not want to be overheard. Or give one to that loud guy you work with to wear… KittyKorner – Turn almost any interior door into one with a cat door. The Edge Desk – Ever...

Security – Just Deal With It Already!

Security – Just Deal With It Already!

There are way too many stories about companies that discover a security breach and then find out that the actual breach happened months or even years ago. Yikes. No one ever wants to be in that position so why not try to avoid it? Krebs on Security wrote a good...

A Dark Web Story

A Dark Web Story

I have written about the Dark Web in the past, and nothing has changed, but I did want to share a real life story. Now that we have access to the Dark Web to run reports on client data breaches, we have seen interesting results. Only once did the report come back...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This