10 Reasons to Move to the Cloud. Are you a healthcare organization still on the fence about cloud computing? Be an IT hero, here are some scenarios and solutions to help you convince your C-suite management about healthcare cloud.
3. Only 6 percent of
companies survive
longer than two
years after a
major data loss.*
* Gartner
6%
4. Legal Hold and
eDiscovery for
email, IM and
files
…and we need to provide
them with a copy of every
email, file and instant
message that Sam sent to
XYZ Corp. by end of day
tomorrow...
6. At Rest and In
Transit Encryption
Inside and Outside
Your Organization
…I am sending them the
financials, however, I don’t
want them to forward, print, or
copy it. Oh yeah, and we also
need their access to the file to
expire on the 1st of next month.
10. Affordable Telemedicine
to Provide Better Care
to Your Underserved
Populations “We need to send one of
the doctors all the way out
to that remote location
every other Thursday to see
just 2 patients...”
12. Data Visualization
to Identify
Emerging Risk and
Opportunity Trends
“… we need to generate a
dynamic map that shows all
of our patients and referring
physicians across the state
and then securely share that
with our new partners.”
15. 15
63%
Of users admit to
forgetting a
password, or had
a password
compromised, in
their professional
life.*
*Microfocus
16. Data Loss
Prevention to
Detect Potential
Data Breaches
“Thanks so much for Lunch
Joan…Here is the list of
patients with that medical
condition we talked about.”
20. Secure Partner Portal
with Data Encryption
and Advanced
Security Features
“…and of course we
need to securely send
them a 250MB file each
week.”
21. 21
1/3
1 out of 3
organizations
do not know if
3rd party data
access policies
are in place.*
*Microfocus
22. Thoughtful integration of healthcare and technology
IS IT TIME TO
Want to know more about healthcare cloud?
Schedule a meeting with our health IT experts
MOVE?
Office
365
Azure Intune
Power
BI
Notas do Editor
Gartner: only 6 percent of companies survive longer than two years after losing data
http://www.homelandsecuritynewswire.com/gartner-only-6-percent-companies-survive-longer-two-years-after-losing-data
Gartner Group says that 43 percent of companies were immediately put out of business by a “major loss” of computer records, and another 51 percent permanently closed their doors within two years — leaving a mere six percent “survival” rate; Zenith Infotech says it can help
Steinberg Group: Legal Hold Tracking Is Still in “Adolescent” Phase
http://www.arma.org/r1/news/newswire/2013/10/22/legal-hold-tracking-is-still-in-adolescent-phase
Most organizations are lagging in automating the tracking of legal holds. According to the “Legal Holds and Data Preservation Survey 2013,” 50% of organizations still track legal holds manually, while only one-third have implemented software for tracking.The study conducted by Steinberg Group LLC surveyed 525 legal professionals responsible for overseeing the legal holds process, making it the largest study of its kind focused specifically on how organizations are handling legal data preservation.
Thales and Ponemon Institute: 2015 Global Encryption and Key Management Trends Study
https://www.thales-esecurity.com/company/press/news/2015/april/2015-global-encryption-and-key-management-trends-study-release
More than 4,700 business and IT managers were surveyed in the US, UK, Germany, France, Australia, Japan, Brazil, Russia and for the first time India and Mexico, examining global encryption trends and regional differences in encryption usage. The report is now in its tenth year since its launch in 2005.
News facts:
Use of encryption continues to rise with 34% of respondents reporting that their organization uses encryption extensively
Deployment of encryption is steadily shifting from a tactical to a strategic activity with 36% of organizations having an enterprise wide encryption strategy
The top three reasons for deploying encryption are compliance with data protection mandates, to address specific security threats and to reduce the scope of compliance audits
Health Information Trust Alliance: A Look Back: U.S. Healthcare Data Breach Trends
https://hitrustalliance.net/content/uploads/2014/05/HITRUST-Report-U.S.-Healthcare-Data-Breach-Trends.pdf
58% of breached records implicating business associates
Foley and Lardner LLP: 2014 Telemedicine Survey Executive Summary
http://www.beckershospitalreview.com/healthcare-information-technology/10-statistics-on-the-current-use-of-telemedicine-in-hospitals-health-systems.html
The report is based on survey responses from 57 healthcare leaders, most of whom are C-level executives from for-profit and nonprofit hospitals, home health organizations and physician group practices. The survey was conducted between September and October of this year. Findings from the survey are shown below.
Eighty-four percent of respondents believe the development of telemedicine services is either very important or important to their organizations. Only 3 percent said the technology is unimportant.
While only 6 percent of respondents described their telemedicine programs as "mature," just 8 percent said they had none at all.
Thirty-four percent said their telemedicine programs are under construction or in development, 18 percent said their programs are in the optimization phase and the remaining 36 percent are piloting or implementing their programs.
Society of Actuaries: HEALTHCARE DECISION MAKERS’ PERSPECTIVES ON BIG DATA
http://assets.fiercemarkets.com/public/newsletter/fiercehealthit/soaresearch-healthcare-big-data.pdf
87% Perceive big data as Impactful on future business
84% Have had Difficulty finding staff skilled in Optimizing big data
45% Plan to hire more skilled staff within the next year
Microfocus: 2015 Cyberthreat Defense Report
https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security-statistics/
• 92% of IS professionals believe that social network use increases likelihood of a successful APT attack.6• 88% on IS professionals think that BYOD combined with rooting or jailbreaking makes a successful APT attack more likely.6• More than 1 in 4 IS professionals believe the highest risk from APTs is loss of personal information of employee or customer.6• 63% of users admit to forgetting a password, or had a password compromised, in their professional life.7
IBM: Quantifying the data breach epidemic
http://www-935.ibm.com/services/uk/en/it-services/data-breach/data-breach-statistics.html
43 percent of C-level executives say negligent insiders are the greatest threat to sensitive data.
Bitglass: Majority of healthcare data breaches due to theft
http://www.nuemd.com/news/2014/11/13/study-majority-healthcare-data-breaches-due-theft
Research from Bitglass, a information security provider, showed that the majority of PHI data breaches are not caused by outsiders hacking electronic health records. The company analyzed data from the U.S. Department of Health and Human Services' "Wall of Shame," which displays reports on data breaches and HIPAA violations over the past three years.
The study showed that 68 percent of security breaches were due to the loss or theft of mobile devices or files. Further, 48 percent of data lost was on a laptop, desktop computer or mobile device. Only 23 percent of the breaches on the HHS "Wall of Shame" were a result of hacking. These statistics show that practices need to make the security of PHI on mobile devices a greater priority to avoid data breaches and HIPAA violations.
Microfocus: 2015 Cyberthreat Defense Report
https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security-statistics/
• 49% of companies do not perform periodic “fire drills” to test IT Security event response plans.8• 54% of US healthcare provider IT & IS professionals have tested their data breach response plan.5• 1 in 3 organizations do not or do not know if third-party data access contracts / policies are in place.8• 77% of IS professionals have not updated agreements with third parties for protection against APTs.6• Less than 40% of organizations conduct full-network active vulnerability scans more than once per quarter.1• Only 20% of IT security professionals are confident their organizations have made adequate investments in educating users on how to avoid phishing attacks.1