Premium Reports
Data Security, Battle Readiness

Data Security, Battle Readiness
4 Healthcare Provider Organizations' Best Practices

Authored by:

As the rapidly evolving health-data-security landscape becomes increasingly confusing and chaotic, KLAS is embarking on a prolonged research initiative to help providers make sense of the hundreds of tools and services available to them. In August 2015, we will publish our first security perception report, which will include data on over 250 vendors that providers have mentioned during our recent conversations with them. The report will help providers better understand which vendors are being used most and what areas of data security they are being used in. This perception report will be followed over the next 18 months by multiple performance reports, which will discuss what tools and services vendors deliver and how well they perform (see our research areas and report schedule below). We have established an online Security Hub (klasresearch.com/lp/security), which will include a road map for the security reports we intend to publish, our areas of research, the latest security reports, and areas in which healthcare providers can collaborate with us and include their voice in this security research. KLAS recognizes the urgency healthcare providers feel in needing to understand which vendors are out there and how they perform, and we are committed to gathering performance information and publishing our findings with similar urgency. This white paper is a product of that commitment, and as a precursor to our first security report, it highlights several provider organizations that are progressive or unique in how they approach certain aspects of their security. We will continue to work closely with providers to identify crucial areas that are in need of vendor differentiation in this ever-changing industry.

Security Framework | Risk Stratification and Assessments | Education | Culture of Collaboration

klas healthcare data security research areas
what are some things progressive organizations do
what is the difference between a framework and a standard
standard vs framework defenitions and examples
after choosing a framework now what
test your framework
education is a top priority
keep information private
how should hospitals manage the overwelming volume of threats on an ongoing basis
operate under the assumption of risk
prioritize the top 50 or 100 most dangerous risks
how have you incorporated data security into your company culture
we have created a culture of confidentiality transparency collaboration and improvement
transparency and collaboration
improvement
phishing breach 5 stages of grief
number of individuals per capita whose health information was breached
breaches health plan healthcare clearinghouse and business associate entities
appendix
appendix 2
appendix 3
appendix 4
appendix 5
information security dashboard
institutional information systems and infrastructure technology
information security program elements
information security program elements page two
 Download Report Brief  Download Full Report

This material is copyrighted. Any organization gaining unauthorized access to this report will be liable to compensate KLAS for the full retail price. Please see the KLAS DATA USE POLICY for information regarding use of this report. © 2019 KLAS Research, LLC. All Rights Reserved. NOTE: Performance scores may change significantly when including newly interviewed provider organizations, especially when added to a smaller sample size like in emerging markets with a small number of live clients. The findings presented are not meant to be conclusive data for an entire client base.