Book A book icon Megaphone A megaphone icon Chat A chat bubble Calendar A calendar symbol Calendar alternative A calendar symbol Menu A menu symbol for navigation print A computer printer symbol Location A map location marker Location alternative A map location marker Phone A phone symbol User A human silhouette indicating login Document A document symbol Facebook Facebook social media icon Facebook Facebook social media icon Twitter Twitter social media icon Twitter circled Twitter social media icon YouTube YouTube social media icon YouTube YouTube social media icon YouTube Play icon YouTube social media icon Vimeo Vimeo social media icon Vimeo circled Vimeo social media icon LinkedIn LinkedIn social media icon LinkedIn circled LinkedIn social media icon Instagram Instagram social media icon Instagram circled Instagram social media icon Pinterest Pinterest social media icon Pinterest circled Pinterest social media icon Mobile A mobile phone Tablet A tablet symbol Laptop A laptop computer symbol Desktop A desktop computer display Pencil A pencil symbol Ok A checkmark symbol cancel-circle A X symbol Plus An addition symbol Minus A subtraction symbol Heart A heart symbol Star A star symbol Videocam A video camera symbol Caret A small triangle symbol Newspaper A newspaper symbol Cart A shopping cart Tools A hammer and a wrench symbol Flag A flag symbol home home-desc Photo A photograph symbol Audio A speaker with sound symbol Cog A group of cogs symbol RSS A RSS feed symbol Comment A speech bubble symbol Link A chain link symbol Export An export arrow symbol Envelope An envelope symbol Search A magnifying glass symbol Info An information symbol Info circled An information symbol Help circled A question mark symbol Clock A clock symbol Globe A globe symbol Globe alternative A globe symbol none none

Why Healthcare is the Least Secure Industry, and What You Can Do About It.

We recently came across an article that explains how Healthcare Leads All Industries in Data Breaches for the first half of 2015. From the article: "(T)he healthcare industry had 34 percent of its total records breached, amounting to 84 million data records compromised, the highest rate of any industry." This is a significant challenge for healthcare organizations, particularly in the context of their HIPAA regulatory obligations, but an opportunity for partners.

As a trusted adviser, partners should proactively initiate conversations about network security. The healthcare industry, like many others, struggles to meet the evolving information systems and information security requirements and threats. As a "trusted adviser to trusted advisers", AVANT has an offering of Healthcare enabled cloud providers like Cisco Powered Peak 10 and Cleardata that can help large and small organizations who need to comply with HIPAA.

If you're looking for Infrastructure as a Service for healthcare make sure your service provider will sign a Business Associate Agreement, discuss the responsibility matrix (RACI), and ensure that you have a data protection strategy that includes encryption and or tokenization.

Security and its role in regulatory compliance is an enormously complex subject, but don't let that be a barrier to you having these conversations with your customers. The reality is, your customers are having these conversations and if not with you, then likely with one of your competitors. If your company lacks the institutional knowledge to address security in a comprehensive way, you should be able to leverage the resources of your master agent or vendor partners.

Partners looking to learn more about InfoSec and Healthcare can click here.