DEC 12, 2012

Related Links

Are Stage 1 and 2 Really Achieving Meaningful EHR Use?
April 17, 2014
Integrating Images with EHR at Cleveland Clinic: Lessons Learned
April 17, 2014
Work Continues On Predictive Acute Renal Failure EHR Algorithm
April 16, 2014
No Quality of Care Benefit for Doctors Using MU EHRs
April 15, 2014
Feds Schedule Meeting on HIT Regulation, Seek Comments
April 15, 2014
85% of Medicare MU Early Adopters Attested for 2011-2013
April 15, 2014
Tips for Healthcare Organizations Migrating to the Cloud
April 14, 2014

Data Security is Most Vulnerable on the Inside

DEC 12, 2012
Print
Reprints
Email

The greatest threat to company data isn’t coming from those young hackers on the other side of the world, it's coming from your trusted administrator down the hall, or your trusted third-party service partner. They may not mean to cause problems, but if security policies are lax, they may inadvertently leave laptops full of personally identifiable information in coffee shops or in the backs of cars.

Get access to this article and thousands more...

All Health Data Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to exclusive industry white paper downloads, web seminars, podcasts, e-books, and conference discounts. Qualified members may also choose to receive our free monthly magazine and any of our e-newsletters covering the latest breaking news, opinions from industry leaders, developing trends and specialized topics like EHR's, revenue cycle management, health insurance exchanges, analytics, and more!

Already Registered?