Data breach locations, types, and associated characteristics among US hospitals.
CONCLUSIONS: Hospitals should conduct routine audits to allow them to see their vulnerabilities before a breach occurs. Additionally, information security systems should be implemented concurrently with health information technologies. Improving access control and prioritizing patient privacy will be important steps in minimizing future breaches.
PMID: 29461854 [PubMed - in process]
Source: The American Journal of Managed Care - Category: Health Management Authors: Gabriel MH, Noblin A, Rutherford A, Walden A, Cortelyou-Ward K Tags: Am J Manag Care Source Type: research
More News: Databases & Libraries | Health Management | Information Technology | Managed Care | Statistics | Study