Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    Health Care IT Security a Major Issue for Vendors

    By
    Nathan Eddy
    -
    July 14, 2014
    Share
    Facebook
    Twitter
    Linkedin
      health care it and it management

      While most health care organizations focus due diligence on their largest vendors, more than half of data breaches are attributed to small businesses, according to a CORL Technologies survey on the security level of vendors in the health care industry.

      The report revealed that the majority of health care vendors lack minimum security, which is illuminated by the fact that more than 58 percent scoring in the “D” grade range for their culture of security.

      In fact, only 4 percent of vendors scored in the “A” high confidence grade range, while 16 percent scored in the “B” moderate confidence grade range and 14 percent scored in the “C” indeterminate confidence grade range.

      “The average hospital’s data is accessible by hundreds to thousands of vendors with abysmal security practices providing a wide range of services,” Cliff Baker, CEO of CORL Technologies, said in a statement. “When health care and industry organizations don’t hold vendors accountable for minimum levels of security, these vendors establish an unlocked backdoor to sensitive health care data.”

      Even more surprising, health care organizations are not holding vendors accountable for meeting even the minimum acceptable standards, and only 32 percent of vendors have security certifications.

      More than half of vendors providing services to an average health care organization are small to medium sized businesses (SMBs) with less than 1,000 employees.

      According to security software specialist Symantec’s 2014 Internet Security Threat Report, targeted attacks aimed at small businesses accounted for 30 percent of targeted spear-phishing attacks.

      Building on this problem, a PricewaterhouseCoopers (PwC) cyber-crime survey released last month highlighted the fact that business partners fly under the security radar.

      Just 44 percent of organizations have a process for evaluating third parties before launch of business operations and only 31 percent include security provisions in contracts with external vendors and suppliers.

      “Third-party breaches and regulations are increasing drastically in the health care industry, but effective third-party security risk management is expensive, time consuming, and resource intensive. CORL is in a unique position to have access to security data across the health care vendor ecosystem,” Baker said. “We hope to use this information to illuminate gaps and provide recommendations to health care organizations and vendors alike that will help improve their risk management processes – and, ultimately, improve their overall security and risk posture.”

      The Vendor Intelligence Report, which kicks off a new series of studies to be published by the CORL research team, is based on the analysis of security related practices for a sample of more than 150 vendors providing services to leading health care organizations from June 2013 to June 2014.

      Avatar
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×