
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"HIMSS '12: Lessons Learned from Healthcare Security Breaches","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vwmKhMkvX1\"><a href=\"https:\/\/www.otava.com\/blog\/himss-12-lessons-learned-from-healthcare-security-breaches\/\">HIMSS &#8217;12: Lessons Learned from Healthcare Security Breaches<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/himss-12-lessons-learned-from-healthcare-security-breaches\/embed\/#?secret=vwmKhMkvX1\" width=\"600\" height=\"338\" title=\"&#8220;HIMSS &#8217;12: Lessons Learned from Healthcare Security Breaches&#8221; &#8212; OTAVA\" data-secret=\"vwmKhMkvX1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech is in\u00a0Las Vegas, site of the 12th Annual HIMSS\u00a0Conference &amp; Exhibition, exhibiting our\u00a0\u00a0HIPAA compliant hosting\u00a0solutions and our\u00a0HIPAA compliant clouds. Visit us at\u00a0booth #13528! With over 300+ educational sessions on healthcare IT topics, we&#8217;re highlighting this particular session on healthcare security breaches: Educational Session:\u00a0 Auditing Security: Lessons Learned From Healthcare Security Breaches Speakers: Adam H. Greene, J.D., M.P.H., Davis Wright Tremaine LLP, Washington, D.C. Micahel \u201cMac\u201d McMillan, CynergisTek, Inc., Austin, Texas View the presentation (PDF) Major Takeaway Points and Personal Analysis of Statistics: According to the Symantec 2011 report, data breaches rank the highest in the healthcare industry at 27 percent, trailed by education, government, and retail\/wholesale sectors. When it comes to identities exposed, the financial industry leads at 23 percent, followed by transportation (22 percent) and insurance (17 percent). Data breaches have risen 32 percent in 2011, according to the Ponemon Institute, and the widespread use of mobile devices has also added to the risk. What are the consequences? With an increase in number of incidents comes decreased productivity and major financial consequences. The most reoccurring type of breach can be attributed to paper records, at 26 percent, followed by laptops at 22 percent. Other portable electronic devices...","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/HIMSS-12-Presentation-Auditing-Security.png"}