Premium Reports
Contact KLAS
 Download Report Brief  Download Full Report    Zoom in charts



Related Series

 No Related Series

 End chart zoom
Security and Privacy Protection 2014 Security and Privacy Protection 2014
* A page refresh may be necessary to see the updated image

Security and Privacy Protection 2014
High Stakes, Big Challenges

May 27, 2014 | Read Time: 1  minute

The stakes have never been higher as providers strive to meet meaningful use and HIPAA requirements and secure protected health information (PHI) in a world of increasing threats, technological evolution, and sophisticated hacking. One oversight can lead to heavy fines and damaging press coverage. This perception report examines where providers feel they are most risk for breaches, what some are doing to prepare, and who providers can turn to for third-party assistance.

most challenging issues facing organizations


No Clear Market Leader in Security Services: 

The 104 providers in this study mentioned 46 different firms for security services within healthcare. Of those mentioned, CynergisTek, Deloitte, and Verizon were mentioned the most, followed by Dell, Fortrex Technologies, Hayes Management Consulting, IBM, and Santa Rosa Consulting.

Santa Rosa Consulting Provides the Most Services among the Healthcare IT Consultants, Followed by Dell: 

According to providers, healthcare IT consulting firms are offering, on average, fewer security-related services than firms that focus predominately on security. Of the HIT consulting firms, Santa Rosa Consulting provides the most services, followed by Dell. HIT consulting firms mainly offer HIPAA and meaningful use risk assessments, while security-focused firms offer several additional services.

Unauthorized Access & Identity Management Biggest Challenges: 

Providers in this report rated unauthorized access by employees as their biggest concern. The second biggest concern stems from bring-your-own-device (BYOD) policies, which create risk for unmonitored system access, encryption failure, and theft or loss of devices containing PHI.

most mentioned vendorssecurity firms find most organizations to be hard on the outside and soft on the insidetypes of data breach loss from hhsvalidated security services by firm

 Download Report Brief  Download Full Report

This material is copyrighted. Any organization gaining unauthorized access to this report will be liable to compensate KLAS for the full retail price. Please see the KLAS DATA USE POLICY for information regarding use of this report. © 2024 KLAS Research, LLC. All Rights Reserved. NOTE: Performance scores may change significantly when including newly interviewed provider organizations, especially when added to a smaller sample size like in emerging markets with a small number of live clients. The findings presented are not meant to be conclusive data for an entire client base.