SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
PULSE
TAKING
THE PHYSICIAN’S
TACKLING CYBER THREATS
IN HEALTHCARE
Accenture and the American
Medical Association (AMA)
surveyed U.S. physicians regarding
their experiences and attitudes
toward cybersecurity. The findings
suggest a strong need for improved
cybersecurity education for
physicians.
Cyberattacks
in physician
practices are
common
Cyberattacks
cause
operational
interruptions
Physicians
think ePHI
sharing is
important
Physicians
rely on third-
party security
assistance
New
technologies
bring new
challenges
1 2 3 4 5
Five key takeaways
55%
48%
37%
20%
12%
9%
9%
17%
5%
Phishing (e.g. someone clicked on a malicious link in an email)
Computers were infected with viruses or malware (e.g. through a
download)
Employee or insider inappropriately accessed or attempted to
access ePHI
A breach of ePHI
Network was hacked
Our practice's information was held ransom (e.g. 'Ransomware')
Other cybersecurity attack(s) not mentioned
Not applicable; my practice has not experienced any
issues/attacks
Don't know
Cyberattacks are common in clinical practices
Over four in five (83%) physicians have experienced some form of cyberattack
Types of cyberattacks that physicians’ experience
Base: Total sample; n=1,300; Q7: Which of the following has your practice ever experienced? (Multiple responses)
1
20% 35% 30% 13%
Extremely concerned Very concerned Moderately concerned Slightly concerned Not at all concerned
Physicians are concerned about future cyberattacks
Over half (55%) are very or extremely concerned about future attacks
2%
Level of concern for future cyberattacks
Base: Total sample; n=1,300; Q15: How concerned are you about future cybersecurity attacks in your practice?
1
74%
74%
53%
36%
34%
32%
30%
25%
19%
6%
0%
Interruption to business (e.g. EHR access)
EHR security (including compromised patient data)
Patient safety concerns
Civil or criminal liability
Concern over reputational harm
Costs (e.g. ransom, credit monitoring)
Loss of billing (from moving/cancelling appointments)
Government enforcement/fines
Medical device security
Do not have back-up records
None of the above
Areas of most concern
Base: Total sample; n=1,300; Q17: What concerns you most about future attacks (select up to five)?
2
Physicians are concerned about future attacks
Including interruption to their business (74%) and patient record data (74%)
64%
20%
12%
4%
4 hours or less
5-7 hours
1-2 days
More than 2 days
Amount of downtime as a result of cyberattack
2
Base = Experienced attacks; n=1,017; Q9: How long were your practice’s normal operations suspended due to the cybersecurity attack?
(Note: Normal operations means appointments were not rescheduled or cancelled, electronic records were accessible, etc.)
Extent of business interruption due to cyberattack
44% 41% 11% 3%
1%
Extremely important Very important Moderately important Slightly important Not important at all
Importance of sharing electronic patient data with outside entities
3
Base: Total; n=1,300; Q39: How important is your ability to share electronic patient data with entities outside of your health system in order
to efficiently provide quality healthcare?
Physicians think that ePHI sharing is important
Physicians’ trust third-parties to keep ePHI data secure
Base = Total sample; n=1,300; Q38: Of those who exchange ePHI, how do you know/ensure ePHI is sent and stored in a secure
manner by the other entity? (multiple response)
How do you know/ensure that ePHI is sent/stored securely by the other entity?
Vendor
assures it is
secure
I trust it is
secure
They sign a
contract
My privacy
officer handles
We discuss
with the entity
I don’t know if
it’s secure
Patients 28% 27% 27% 22% 14% 12%
Labs 34% 31% 25% 24% 13% 7%
Pharmacies 32% 34% 17% 21% 12% 10%
Payers 32% 31% 24% 23% 10% 9%
Other practices / outpatient 25% 33% 16% 24% 16% 12%
Clinical data registries 27% 32% 26% 28% 16% 10%
Hospitals / Inpatient 29% 37% 20% 25% 14% 8%
HIE 36% 31% 29% 28% 18% 6%
State / local health dept. 27% 35% 20% 29% 17% 10%
Research organizations 32% 29% 30% 31% 22% 7%
3
65%
67%
64%
32%
29%
32%
3%
4%
4%
Electronic access to data from
entities outside of my health system
Electronic access to patient data
from organizations within my health
system (where I don't currently
have access)
Ability to access data remotely (cell
phone, personal computer, etc.)
Definitely would Probably would Would not
Physicians believe electronic access to data improves care
Base: Total sample; n=1,300; Q40: To what extent would each of the following help you provide quality patient care more efficiently?
Extent of supporting the quality and efficiency of care
3
65%
61%
59%
56%
17%
11%
10%
8%
5%
3%
13%
0%
Notified internal IT group
Notified/educated employees
Implemented our practice's corresponding written policies and procedures
Notified EHR or health IT vendor
Shut down electronic records and moved temporarily to paper
Notified Department of Homeland Security or FBI
Notified Office of Civil Rights
Cancelled patient appointments
Moved patients to a different facility
Paid the ransom
Took action(s) not listed
Took no action
Responding to cyberattacks
Base: Experienced attack; n=1,017; Q8: How did you and/or your practice respond to the attack? Multiple responses.
How do physicians respond to the cyberattack?
4
26%
23%
49%
17%
28%
27%
17%
29%
24%
31%
22%
31%
22%
19%
12%
23%
Outsourced security management
Shared security management (e.g., with
another practice in your area)
In-house security official
Receiving donated security-related
hardware or software from other provider
groups or health systems (e.g., hospitals)
1 - Already have 2 - Don't have but are interested 3 - No interest 4 - Don't know
Roughly half of physicians have an in-house security official
Base: Total sample; n=1,300; Q48: Which of the following does your practice have or would your practice be interested in?
Cybersecurity capabilities
4
Training content is generated by the health IT vendor for most
20%
37%
7%
18%
18%
Someone in my practice
develops the content
My health IT vendor develops
the content
Our practice hired a lawyer to
develop the content
Another type of 3rd party
develops content
Don't know
Base: Training content; n=1,237; Q45: Who generates the content covered in your practice’s privacy and security training?
Cybersecurity capabilities
4
New technologies physicians are likely to adopt
33%
14%
6%
15%
21%
28%
21%
20%
11%
21%
23%
27%
14%
16%
13%
16%
14%
16%
5%
8%
13%
7%
6%
4%
12%
6%
17%
10%
5%
4%
14%
36%
40%
31%
32%
21%
Telemedicine
Precision medicine
Artificial Intelligence
Biometrics
Authentication
Risk-based security
(Analytics)
Patient-generated
health data
Within the next year 1-2 years 3-5 years More than 5 years Not likely to adopt Don't know
Base: Total sample; n=1,300; Q49: Please indicate when you are likely to adopt each of the following into your practice
Adoption of new technologies in physician practices
5
Security training for physicians
50%
47%
44%
40%
38%
33%
25%
22%
6%
Tips for good cyber hygiene
Simplifying the legal language of HIPAA
Easily digestible summary of HIPAA
Explaining some of the more complex rules of HIPAA
How to guide for conducting a risk assessment
Information on what to consider before hiring a consultant to help with…
Information on what to consider before hiring a consultant to help with…
Assistance with developing a compliant 'Notice of Privacy Practices'
None of the above
Base: n=1,300; Q21: Which of the following would enable you to feel more confident that you are keeping your practice secure? (multiple
responses)
@AmerMedicalAssn
American Medical Association
METHODOLOGY
Accenture and the AMA surveyed 1,300 physicians in the United States to assess their
experience and attitudes toward cybersecurity, data management and compliance with
the Health Insurance Portability and Accountability Act (HIPAA) guidelines. The online
survey was conducted between July 2017 and August 2017. Prior to the survey, in-depth
research and 12 phone interviews were conducted with physicians, technology officers
and administrators.
CONNECT WITH US
@AccentureHealth
AccentureHealth

Contenu connexe

Tendances

Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionEdelman
 
The dawn-of-data-driven-healthcare
The dawn-of-data-driven-healthcareThe dawn-of-data-driven-healthcare
The dawn-of-data-driven-healthcareAlessandro Mazzarisi
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey InfographicInforsystemi
 
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trustaccenture
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2jmariani14
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020IDG
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Advent IM Ltd
 
2014 July 15 - eHI CAMPAIGN - COVERGE RESULTS AND HIGHLIGHTS
2014 July 15 - eHI CAMPAIGN -  COVERGE RESULTS AND HIGHLIGHTS2014 July 15 - eHI CAMPAIGN -  COVERGE RESULTS AND HIGHLIGHTS
2014 July 15 - eHI CAMPAIGN - COVERGE RESULTS AND HIGHLIGHTSCarrie Bauman
 
Social Media Marketing: India Trends Study 2013
Social Media Marketing: India Trends Study 2013Social Media Marketing: India Trends Study 2013
Social Media Marketing: India Trends Study 2013Vikrant Mudaliar
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the NetworkIDG
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities IDG
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce    2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce Alessandro Mazzarisi
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact StudyIDG
 
Connected Patient Report
Connected Patient ReportConnected Patient Report
Connected Patient ReportTrustRobin
 
System i user survey 2013
System i user survey 2013System i user survey 2013
System i user survey 2013Inforsystemi
 
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...Jill Gilbert
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 

Tendances (20)

Privacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and ActionPrivacy & Security: The New Drivers of Brand, Reputation and Action
Privacy & Security: The New Drivers of Brand, Reputation and Action
 
The dawn-of-data-driven-healthcare
The dawn-of-data-driven-healthcareThe dawn-of-data-driven-healthcare
The dawn-of-data-driven-healthcare
 
Point of Care Messaging
Point of Care MessagingPoint of Care Messaging
Point of Care Messaging
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey Infographic
 
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
2017 Consumer Survey: Healthcare Cybersecurity and Digital Trust
 
Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2Idge dell reignite2014 qp #2
Idge dell reignite2014 qp #2
 
CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020CSO Pandemic Impact Survey, 2020
CSO Pandemic Impact Survey, 2020
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
2014 July 15 - eHI CAMPAIGN - COVERGE RESULTS AND HIGHLIGHTS
2014 July 15 - eHI CAMPAIGN -  COVERGE RESULTS AND HIGHLIGHTS2014 July 15 - eHI CAMPAIGN -  COVERGE RESULTS AND HIGHLIGHTS
2014 July 15 - eHI CAMPAIGN - COVERGE RESULTS AND HIGHLIGHTS
 
Social Media Marketing: India Trends Study 2013
Social Media Marketing: India Trends Study 2013Social Media Marketing: India Trends Study 2013
Social Media Marketing: India Trends Study 2013
 
2018 State of the Network
2018 State of the Network2018 State of the Network
2018 State of the Network
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce    2016 Connected Patient Report - Sponsor Content From: Salesforce
2016 Connected Patient Report - Sponsor Content From: Salesforce
 
CIO CV-19 Impact Study
CIO CV-19 Impact StudyCIO CV-19 Impact Study
CIO CV-19 Impact Study
 
Connected Patient Report
Connected Patient ReportConnected Patient Report
Connected Patient Report
 
System i user survey 2013
System i user survey 2013System i user survey 2013
System i user survey 2013
 
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...
StartUp Health’s Annual Insights Report: The Year Digital Health Hit its Stri...
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 

Similaire à Taking the Physician's Pulse on Cybersecurity

The challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffThe challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffDanie Schoeman
 
Further Evidence of How Technology Availability Doesn’t Guarantee Usage
Further Evidence of How Technology Availability Doesn’t Guarantee UsageFurther Evidence of How Technology Availability Doesn’t Guarantee Usage
Further Evidence of How Technology Availability Doesn’t Guarantee UsageHealth Informatics New Zealand
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
AMA Digital Health Study
AMA Digital Health Study AMA Digital Health Study
AMA Digital Health Study Brian Ahier
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsSpok
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla borokayla_ann_30
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cistb45004
 
Medical Records Privacy Confidentiality And Security
Medical Records Privacy Confidentiality And SecurityMedical Records Privacy Confidentiality And Security
Medical Records Privacy Confidentiality And SecurityAbbas Shojaee MD, CHDA
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersJoshua Spencer
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Kareo - 2014 Great American Physician Survey
Kareo - 2014 Great American Physician SurveyKareo - 2014 Great American Physician Survey
Kareo - 2014 Great American Physician SurveyKareo
 
The Security of Electronic Health Information Survey
The Security of Electronic Health Information SurveyThe Security of Electronic Health Information Survey
The Security of Electronic Health Information Surveyloglogic
 
Wearables-Provider-Research_iTriage November 2015
Wearables-Provider-Research_iTriage November 2015Wearables-Provider-Research_iTriage November 2015
Wearables-Provider-Research_iTriage November 2015Peggy Lawless
 
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxChapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxmccormicknadine86
 
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxChapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxtiffanyd4
 

Similaire à Taking the Physician's Pulse on Cybersecurity (20)

OHMC 201509 lin
OHMC 201509 linOHMC 201509 lin
OHMC 201509 lin
 
The challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staffThe challenge of ensuring secure clinics and hospitals for patients and staff
The challenge of ensuring secure clinics and hospitals for patients and staff
 
Future of Connected Health Survey from Ipsos Healthcare
Future of Connected Health Survey from Ipsos HealthcareFuture of Connected Health Survey from Ipsos Healthcare
Future of Connected Health Survey from Ipsos Healthcare
 
Further Evidence of How Technology Availability Doesn’t Guarantee Usage
Further Evidence of How Technology Availability Doesn’t Guarantee UsageFurther Evidence of How Technology Availability Doesn’t Guarantee Usage
Further Evidence of How Technology Availability Doesn’t Guarantee Usage
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
AMA Digital Health Study
AMA Digital Health Study AMA Digital Health Study
AMA Digital Health Study
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
Nursing Informatics
Nursing InformaticsNursing Informatics
Nursing Informatics
 
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boroEhr by jessica austin, shaun baker, victoria blankenship and kayla boro
Ehr by jessica austin, shaun baker, victoria blankenship and kayla boro
 
Nur3563group8 cis
Nur3563group8 cisNur3563group8 cis
Nur3563group8 cis
 
Medical Records Privacy Confidentiality And Security
Medical Records Privacy Confidentiality And SecurityMedical Records Privacy Confidentiality And Security
Medical Records Privacy Confidentiality And Security
 
Protecting Healthcare Data from Hackers
Protecting Healthcare Data from HackersProtecting Healthcare Data from Hackers
Protecting Healthcare Data from Hackers
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Kareo - 2014 Great American Physician Survey
Kareo - 2014 Great American Physician SurveyKareo - 2014 Great American Physician Survey
Kareo - 2014 Great American Physician Survey
 
The Security of Electronic Health Information Survey
The Security of Electronic Health Information SurveyThe Security of Electronic Health Information Survey
The Security of Electronic Health Information Survey
 
Wearables-Provider-Research_iTriage November 2015
Wearables-Provider-Research_iTriage November 2015Wearables-Provider-Research_iTriage November 2015
Wearables-Provider-Research_iTriage November 2015
 
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxChapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
 
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docxChapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
Chapter 9 Patient Safety, Quality and ValueHarry Burke MD P.docx
 

Plus de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 

Dernier

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 

Dernier (20)

Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 

Taking the Physician's Pulse on Cybersecurity

  • 1. PULSE TAKING THE PHYSICIAN’S TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity. The findings suggest a strong need for improved cybersecurity education for physicians.
  • 2. Cyberattacks in physician practices are common Cyberattacks cause operational interruptions Physicians think ePHI sharing is important Physicians rely on third- party security assistance New technologies bring new challenges 1 2 3 4 5 Five key takeaways
  • 3. 55% 48% 37% 20% 12% 9% 9% 17% 5% Phishing (e.g. someone clicked on a malicious link in an email) Computers were infected with viruses or malware (e.g. through a download) Employee or insider inappropriately accessed or attempted to access ePHI A breach of ePHI Network was hacked Our practice's information was held ransom (e.g. 'Ransomware') Other cybersecurity attack(s) not mentioned Not applicable; my practice has not experienced any issues/attacks Don't know Cyberattacks are common in clinical practices Over four in five (83%) physicians have experienced some form of cyberattack Types of cyberattacks that physicians’ experience Base: Total sample; n=1,300; Q7: Which of the following has your practice ever experienced? (Multiple responses) 1
  • 4. 20% 35% 30% 13% Extremely concerned Very concerned Moderately concerned Slightly concerned Not at all concerned Physicians are concerned about future cyberattacks Over half (55%) are very or extremely concerned about future attacks 2% Level of concern for future cyberattacks Base: Total sample; n=1,300; Q15: How concerned are you about future cybersecurity attacks in your practice? 1
  • 5. 74% 74% 53% 36% 34% 32% 30% 25% 19% 6% 0% Interruption to business (e.g. EHR access) EHR security (including compromised patient data) Patient safety concerns Civil or criminal liability Concern over reputational harm Costs (e.g. ransom, credit monitoring) Loss of billing (from moving/cancelling appointments) Government enforcement/fines Medical device security Do not have back-up records None of the above Areas of most concern Base: Total sample; n=1,300; Q17: What concerns you most about future attacks (select up to five)? 2 Physicians are concerned about future attacks Including interruption to their business (74%) and patient record data (74%)
  • 6. 64% 20% 12% 4% 4 hours or less 5-7 hours 1-2 days More than 2 days Amount of downtime as a result of cyberattack 2 Base = Experienced attacks; n=1,017; Q9: How long were your practice’s normal operations suspended due to the cybersecurity attack? (Note: Normal operations means appointments were not rescheduled or cancelled, electronic records were accessible, etc.) Extent of business interruption due to cyberattack
  • 7. 44% 41% 11% 3% 1% Extremely important Very important Moderately important Slightly important Not important at all Importance of sharing electronic patient data with outside entities 3 Base: Total; n=1,300; Q39: How important is your ability to share electronic patient data with entities outside of your health system in order to efficiently provide quality healthcare? Physicians think that ePHI sharing is important
  • 8. Physicians’ trust third-parties to keep ePHI data secure Base = Total sample; n=1,300; Q38: Of those who exchange ePHI, how do you know/ensure ePHI is sent and stored in a secure manner by the other entity? (multiple response) How do you know/ensure that ePHI is sent/stored securely by the other entity? Vendor assures it is secure I trust it is secure They sign a contract My privacy officer handles We discuss with the entity I don’t know if it’s secure Patients 28% 27% 27% 22% 14% 12% Labs 34% 31% 25% 24% 13% 7% Pharmacies 32% 34% 17% 21% 12% 10% Payers 32% 31% 24% 23% 10% 9% Other practices / outpatient 25% 33% 16% 24% 16% 12% Clinical data registries 27% 32% 26% 28% 16% 10% Hospitals / Inpatient 29% 37% 20% 25% 14% 8% HIE 36% 31% 29% 28% 18% 6% State / local health dept. 27% 35% 20% 29% 17% 10% Research organizations 32% 29% 30% 31% 22% 7% 3
  • 9. 65% 67% 64% 32% 29% 32% 3% 4% 4% Electronic access to data from entities outside of my health system Electronic access to patient data from organizations within my health system (where I don't currently have access) Ability to access data remotely (cell phone, personal computer, etc.) Definitely would Probably would Would not Physicians believe electronic access to data improves care Base: Total sample; n=1,300; Q40: To what extent would each of the following help you provide quality patient care more efficiently? Extent of supporting the quality and efficiency of care 3
  • 10. 65% 61% 59% 56% 17% 11% 10% 8% 5% 3% 13% 0% Notified internal IT group Notified/educated employees Implemented our practice's corresponding written policies and procedures Notified EHR or health IT vendor Shut down electronic records and moved temporarily to paper Notified Department of Homeland Security or FBI Notified Office of Civil Rights Cancelled patient appointments Moved patients to a different facility Paid the ransom Took action(s) not listed Took no action Responding to cyberattacks Base: Experienced attack; n=1,017; Q8: How did you and/or your practice respond to the attack? Multiple responses. How do physicians respond to the cyberattack? 4
  • 11. 26% 23% 49% 17% 28% 27% 17% 29% 24% 31% 22% 31% 22% 19% 12% 23% Outsourced security management Shared security management (e.g., with another practice in your area) In-house security official Receiving donated security-related hardware or software from other provider groups or health systems (e.g., hospitals) 1 - Already have 2 - Don't have but are interested 3 - No interest 4 - Don't know Roughly half of physicians have an in-house security official Base: Total sample; n=1,300; Q48: Which of the following does your practice have or would your practice be interested in? Cybersecurity capabilities 4
  • 12. Training content is generated by the health IT vendor for most 20% 37% 7% 18% 18% Someone in my practice develops the content My health IT vendor develops the content Our practice hired a lawyer to develop the content Another type of 3rd party develops content Don't know Base: Training content; n=1,237; Q45: Who generates the content covered in your practice’s privacy and security training? Cybersecurity capabilities 4
  • 13. New technologies physicians are likely to adopt 33% 14% 6% 15% 21% 28% 21% 20% 11% 21% 23% 27% 14% 16% 13% 16% 14% 16% 5% 8% 13% 7% 6% 4% 12% 6% 17% 10% 5% 4% 14% 36% 40% 31% 32% 21% Telemedicine Precision medicine Artificial Intelligence Biometrics Authentication Risk-based security (Analytics) Patient-generated health data Within the next year 1-2 years 3-5 years More than 5 years Not likely to adopt Don't know Base: Total sample; n=1,300; Q49: Please indicate when you are likely to adopt each of the following into your practice Adoption of new technologies in physician practices 5
  • 14. Security training for physicians 50% 47% 44% 40% 38% 33% 25% 22% 6% Tips for good cyber hygiene Simplifying the legal language of HIPAA Easily digestible summary of HIPAA Explaining some of the more complex rules of HIPAA How to guide for conducting a risk assessment Information on what to consider before hiring a consultant to help with… Information on what to consider before hiring a consultant to help with… Assistance with developing a compliant 'Notice of Privacy Practices' None of the above Base: n=1,300; Q21: Which of the following would enable you to feel more confident that you are keeping your practice secure? (multiple responses)
  • 15. @AmerMedicalAssn American Medical Association METHODOLOGY Accenture and the AMA surveyed 1,300 physicians in the United States to assess their experience and attitudes toward cybersecurity, data management and compliance with the Health Insurance Portability and Accountability Act (HIPAA) guidelines. The online survey was conducted between July 2017 and August 2017. Prior to the survey, in-depth research and 12 phone interviews were conducted with physicians, technology officers and administrators. CONNECT WITH US @AccentureHealth AccentureHealth