Home
NicknameSozoID: , RiskID: , ID: -1076546727, : Case Studies,
Nickname:
Password:
Spanish, English, JapaneseImagine your unlimited creativity Change Password,
Your Community Carte
Universal Forum
Universal Forum

Category:
This Forum shows content across all Categories
Forum:
Case Studies

0.
伝統文化と創造によるまち創り

STA22

1.
商店街の振興

STA814

2.
障害者福祉施策

STA531

3.
お年寄りの福祉

STA55

4.
心の健康リスクと対応策

STA58

5.
母子の健康管理・児童手当

STA613

6.
乳幼児向けデイケア

STA614

7.
学齢期のリスクと対応

STA62

8.
再生可能エネルギーの普及

STA713

9.
地場企業・中小企業の振興

STA810

10.
社会的ファイナンス

STA82

11.
活力ある農林水産業の育成

STA83

12.
観光の振興

STA84

13.
高齢者向け優良住宅

STA962

Cleveland Health Clinic detected eight network-security breaches by employees
I'd like to support this social venture by donation:
I want this type of Social Venture to be created in my home town:
I'd like to jointly create this type of social venture in my home town:
E-mail: Cleveland Clinic Health Systems Unit:
Answer: The vast majority of the people who work at the Cleveland Clinic Health Systems are dedicated to helping customers get healthy-but a very few are doing more harm than good. In August and September alone, the Cleveland Clinic detected eight network-security breaches by employees. Six of the ruptures were innocent enough, originating from careless workers who infected servers by spreading worms via e-mail.
Hampstead Heath, London, in March
Sequence: Assign a number (with decimals) determining the sequence of your question.: Security You Can Live With, By Lisa Meyer, Fortune/CNET Map: 2001-12-26 00:00:00
Two Employees tried to atack the Government sites
The remaining two came from employees using office equipment to scan portals of U.S. government sites. Such scanning is the typical way hackers prepare an attack like denial of service. Before the events of September 11, such activity might not have stirred alarm, but it does now. Fortunately, the Cleveland Clinic detected the scans with its security system before employees or outsiders trying to co-opt company computers could launch any attacks. The Federal Bureau of Investigation is currently looking into the case. Such incidents are troubling because they reveal that employees aren't always working on their employer's behalf. And in an era when practically every enterprise is connected to the Internet, the danger doesn't stop at the office door.
Hospitals need tighter security to protect patients records
Certain industries require particularly strong security. Financial services and health care are at the top of the list. Companies in these sectors depend even more heavily than most on maintaining customers' trust. Says McCarthy, "The impact of a security breach on a Web banking company, Internet brokerage, insurance company, or hospital (if patient records got out), would be devastating." Cleveland Clinic chief security officer Matt Speare agrees. He says that while patient records at his company have so far remained secure, if they were ever released through an accidental or deliberate security breach, the business would see a huge loss in its patient base. Once a breach occurs, the cost can be steep. The average large company loses $20,000 per hour during the first 72 hours of its response to a security breach, according to a recent study by Gartner. A 2001 Omni Consulting Group study claimed that leaky security costs companies between 6% and 7% of annual revenue. Such costs could include loss of business from system failure and decreased customer confidence, as well as increased insurance rates and expenditures of a public relations campaign to counter lost credibility. Moreover, companies or even company officers could be liable for failing to protect information systems and data.
Security programs can br updated regularly via Web
One of the most common causes of network security breaches is the spread of viruses through e-mail. To remedy this problem at the Cleveland Clinic, Speare installed software that automatically scans incoming and outgoing e-mail. Yet security programs that protect firewalls and detect intruders won't help for long unless they are regularly updated and monitored. "Security threats are stealthy and always shifting," McCarthy says. "The right choice of technology creates a moving-defense system." Security is a realm where software as a service makes sense: Security programs can be updated regularly via the Web.
Anybody who read this case study can participate in the evaluation of this socail business concept
To Evaluation This Socail Business Social Impact Mutual Help Model Social Inclusion Business Sustainability Replicability Evaluation Total
Your Evaluation (1:Lowest to 5:Highest) 3 3 3 3 3 3
Japan Case_Studies Related Website Case_Studies
Average Score sent by users 3
Number of Rators 1
for authors:
Upload Business Plan of this Social Venture : If you are working for the organization, and want to create a Business Plan of your organization, please click the link and follow the instructions. Look at the Business Plan of this Case
Develop your own Business Plan using your location's data based on this Model :if you plan to create a social service in your favorite city/town, based on the basic vision of this Social Venture, please use this link to the Business Plan Writing software which guide you by giving necessary information how to create a BP using your city/town's data.
Key Word Search:
Edit the documents(Admin. use only)
Responding to Online Applications (Official use only) CCS_Dash_Board