Quality e-Newsletter
Intelligence Unit Special Reports Special Events Subscribe Sponsored Departments Follow Us

Twitter Facebook LinkedIn RSS

Healthcare Data Breaches Lag Other Industries

Dom Nicastro, for HealthLeaders Media, August 20, 2010

 

 

 

  • Monitor and filter egress network traffic: Incoming traffic is one thing, but monitor, understand, and control outbound traffic.
  •  

     

     

     

     

     

  • Change your approach to event monitoring and log analysis. "In most attacks, the victim has several days or more before data are compromised," the report says. "Breaches take a long time to discover and when that finally happens, it usually isn't the victim who finds it. Finally, almost all victims have evidence of the breach in their logs. It doesn't take much to figure out that something is amiss and a few changes are in order."
  •  

     

     


    Dom Nicastro is a contributing writer. He edits the Medical Records Briefings newsletter and manages the HIPAA Update Blog.
    1 | 2 | 3 | 4

    Comments are moderated. Please be patient.