Home
Open City PortalOpenCity Portal

OpenCityPortal:
Nickname:
Password:
If you have not registered
SSL グローバルサインのサイトシール Spanish, English, Japanese

: Cleveland Health Clinic detected eight network-security breaches by employees
I'd like to jointly create this type of social venture in my home town:
You can create a Social Venture in your home town based on the business model in this page. The Social Entrepreneur Institute will assist you to make a business plan, funding the project and provide a More information on the Social Entrepreneurship Institute
ActivityID:
PartnerLong:
Country :
About Your Project: Reference Project:
Company/Organization: Cleveland Health Clinic detected eight network-security breaches by employees
Project Code:
CategoryID:
United_States
County:
City:
Please write about your business concept in five paragraphs with sub-title for each
Answer: Briefly describe the usefulness and uniqueness of your social venture The vast majority of the people who work at the Cleveland Clinic Health Systems are dedicated to helping customers get healthy-but a very few are doing more harm than good. In August and September alone, the Cleveland Clinic detected eight network-security breaches by employees. Six of the ruptures were innocent enough, originating from careless workers who infected servers by spreading worms via e-mail.
1: Two Employees tried to atack the Government sites
1: Issues to be addressed by this social venture (or case) The remaining two came from employees using office equipment to scan portals of U.S. government sites. Such scanning is the typical way hackers prepare an attack like denial of service. Before the events of September 11, such activity might not have stirred alarm, but it does now. Fortunately, the Cleveland Clinic detected the scans with its security system before employees or outsiders trying to co-opt company computers could launch any attacks. The Federal Bureau of Investigation is currently looking into the case. Such incidents are troubling because they reveal that employees aren't always working on their employer's behalf. And in an era when practically every enterprise is connected to the Internet, the danger doesn't stop at the office door.
2: Hospitals need tighter security to protect patients records
2: What is the unique idea to solve the issues? Certain industries require particularly strong security. Financial services and health care are at the top of the list. Companies in these sectors depend even more heavily than most on maintaining customers' trust. Says McCarthy, "The impact of a security breach on a Web banking company, Internet brokerage, insurance company, or hospital (if patient records got out), would be devastating." Cleveland Clinic chief security officer Matt Speare agrees. He says that while patient records at his company have so far remained secure, if they were ever released through an accidental or deliberate security breach, the business would see a huge loss in its patient base. Once a breach occurs, the cost can be steep. The average large company loses $20,000 per hour during the first 72 hours of its response to a security breach, according to a recent study by Gartner. A 2001 Omni Consulting Group study claimed that leaky security costs companies between 6% and 7% of annual revenue. Such costs could include loss of business from system failure and decreased customer confidence, as well as increased insurance rates and expenditures of a public relations campaign to counter lost credibility. Moreover, companies or even company officers could be liable for failing to protect information systems and data.
3: Security programs can br updated regularly via Web
3: Revenue Model & Organization One of the most common causes of network security breaches is the spread of viruses through e-mail. To remedy this problem at the Cleveland Clinic, Speare installed software that automatically scans incoming and outgoing e-mail. Yet security programs that protect firewalls and detect intruders won't help for long unless they are regularly updated and monitored. "Security threats are stealthy and always shifting," McCarthy says. "The right choice of technology creates a moving-defense system." Security is a realm where software as a service makes sense: Security programs can be updated regularly via the Web.
4:
4: Targeted Benefit & Outcome
5:
5: Strengths and Risks of the business model
The Project Owner: Explain your experience and skills within 150 words.
Business_Partners: Describe what types of business partners are you seeking
Position1 (Investors):
Position2 (Management & Staff):
Position3 (Management & Staff):
Position4 (Professional Staff):
Position4 (Professional Staff):
Position6 (Outside Experts):
Business Partners can jointly develop a business plan
Mode: