PODCAST: What is Causing So Many Data Breaches? (Part 1)

Oct. 2, 2012
As more healthcare providers digitize their data, breaches have become commonplace in an industry that lacks advanced security practices. Every week we’re seeing providers, payers, and government agencies, of all shapes and sizes, fall victim to a data breach. To get a better look at why this is happening, where the issues lay, and what healthcare providers can do to stop their data from getting breached, Healthcare Informatics Associate Editor Gabriel Perna welcomes James Rountree, senior consultant at Aspen Advisors for a two-part podcast series.

As more healthcare providers digitize their data, breaches have become commonplace in an industry that lacks advanced security practices. Every week we’re seeing providers, payers, and government agencies, of all shapes and sizes, fall victim to a data breach. In the most recent issue of Healthcare Informatics Associate Editor Gabriel Perna wrote an industry-wide report that attempts to look at this growing issue in a larger scope and found that data breaches are costing the healthcare industry an average of $6.5 billion on an annual basis.  

To get a better look at why this is happening, where the issues lay, and what healthcare providers can do to stop their data from getting breached, Perna welcomes James Rountree, senior consultant at Aspen Advisors for a two-part podcast series. James has more than 10 years of healthcare technology expertise, including a stint as a consultant at Northwestern Memorial Hospital. In part one, James discusses how it’s the human error, more often than not, that is causing these breaches, and the process of learning data protection is not uniformly up to par across the board.      

James Rountree    

Stay tuned for part two.

To download this or other HCI Podcasts from iTunes, click here.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...