5 Steps to Estimate Potential Costs of a Data Breach
According to the report, healthcare organizations can take immediate action against data breach risks using the Protected Health Information Value Estimator, a five-step method for assessing security risks. The five steps include:
1. Conduct a risk assessment: assess the risks, vulnerabilities and applicable safeguards for each "protected health information home;"
2. Determine a security readiness score for each PHI home by determining the likelihood of a data breach based on the security readiness score;
3. For each PHI home, examine the relevance, either applicability or likelihood, of a particular cost and apple a relevance factor;
4. Determine the impact by multiplying the relevance by the consequence;
5. Add up all adjusted costs to determine the total adjusted costs of a data breach to the organization.
For more information and to download a free copy of the report, click here.
More Articles on Data Breaches:St. Joseph Health System Data Breach Affects More Than 31k Patients
Report Provides Characteristics of Data Breach Vulnerability
IU Health Goshen Data Breach Affects 12k Job Applicants
© Copyright ASC COMMUNICATIONS 2012. Interested in LINKING to or REPRINTING this content? View our policies by clicking here.
To receive the latest hospital and health system business and legal news and analysis from Becker's Hospital Review, sign-up for the free Becker's Hospital Review E-weekly by clicking here.
New From Becker's Hospital CIO